The Next 50 Years of Computer Security


There’s an interesting audio file about the next 50 years of computer security, it’s from a talk Alan Coxa a fellow at Red Hat Linux gave recently at the European OSCON.

It talks about the implementations of modularity, trusted computing hardware (we are already seing this in part, hardware anti-virus implementations and DRM to be built into CPUs), ‘separation of secrets,’ and overcoming the challenge of users not reading dialog boxes, will be crucial milestones as we head on to the future. He states: “As security improves, we need to keep building things which are usable, which are turned on by default, which means understanding users is the target for the next 50 years. You don’t buy a car with optional bumpers. You can have a steering wheel fitted if you like, but it comes with a spike by default.” All of this has to be shipped in a way that doesn’t stop the user from doing things.

Security and validation are critical issues in computing, and the next fifty years will be harder than the last. There are a number of proven programming techniques and design approaches which are already helping to harden our modern systems, but each of these must be carefully balanced with usability in order to be effective. In this talk, Alan Cox, fellow at Red Hat Linux, explores the future of what may be the biggest threat facing software engineers, the unverified user.

Of course security is always a balance between usability and actual security, the more secure something is, generally the less usable it becomes and vice versa, imminently usable…totally unsecure.

What else do you think is going to happen? For better or worse..

Source: IT Conversations

Posted in: Hacking News

,


Latest Posts:


Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.


2 Responses to The Next 50 Years of Computer Security

  1. Someone May 11, 2006 at 7:33 am #

    What is going to happen over the next 50 years? General purpose computing will be less general. More appliances, one for gaming, one for media, one for communication and so on. We still have General purpose computers but their adoption in society would be less frequent.

  2. Navaho Gunleg May 14, 2006 at 1:02 pm #

    Yeah, I have to agree with Someone, there will be more different devices for specific uses.

    I also expect that, internally, these appliances shall still be general-purpose capable, so to speak. However, Digital Restriction Management and/or sneaky EULA’s (which by itself are Digital Restriction-tools, too), or too extreme ‘cyber’-laws will prevent the hackers (in the positive sense) to crack the appliances open and see how it works, to improve it or to add the functionality that we want and share the information.

    An otherwise so innocent and intellectually challenging an experience will become ‘illegal’ and make one an instant criminal. (In contrast: the whole Industrial Revolution wouldn’t have been possible if there weren’t any people tinkering with other people’s inventions, aiming to improve and secure things.)

    Heck, maybe it’ll even be impossible to open these appliances by embedding them in some type of epoxy that is impossible to remove without harning the device.

    That’s the more sadder route that events could take — future might show us we have been priviledged to live in current times…