We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMadison Kilgore
Modified over 3 years ago
TNC 2002, Limerick©The JNT Association, 2002 Moores Law of Computer Security Andrew Cormack UKERNA A.Cormack@ukerna.ac.uk
TNC 2002, Limerick©The JNT Association, 2002 Moores Law (1965) Gordon Moore, co-founder of Intel Number of transistors per square inch on integrated circuits had doubled every year since the IC was invented. Predicted that this trend would continue for the foreseeable future. In subsequent years, the pace slowed down a bit, but data density has doubled approximately every 18 months, and this is the current definition of Moore's Law, which Moore himself has blessed. Most experts, including Moore himself, expect Moore's Law to hold for at least another two decades. Webopedia.com (1998)
TNC 2002, Limerick©The JNT Association, 2002 Moores Law of Intel CPUs George Watson, University of Delaware
TNC 2002, Limerick©The JNT Association, 2002 A sample of papers and articles Is there a Moores Law for data traffic? Our incredibly shrinking storage Can we get our economy to grow in synch with Moores Law? Moores Law influences fiber optic development Music, Morality and Moores Law
TNC 2002, Limerick©The JNT Association, 2002 Moores Law of other things Network traffic Disk space Money Bandwidth Crime What about security?
TNC 2002, Limerick©The JNT Association, 2002 CERT/CC vulnerability notes From: http://www.kb.cert.org/vuls
TNC 2002, Limerick©The JNT Association, 2002 CERT/CC incident reports From: http://www.cert.org/stats/cert_stats.html
TNC 2002, Limerick©The JNT Association, 2002 Moores Law of Security: Bad news!
TNC 2002, Limerick©The JNT Association, 2002 Why this exponential growth? Growth in Number of computers on the Internet Complexity of standard computers Bandwidth connecting those computers Number of would-be intruders And their level of technology ( not their skill) Bandwidth connecting intruders to computers CPU power available to the intruders
TNC 2002, Limerick©The JNT Association, 2002 And at the same time More reliance on computers For home banking, study, employment… How many of us rely on them for our reputations? More demand for ease of use Internet-ready computers in supermarkets More inter-dependent systems New routes for attack Unexpected consequences of attack
TNC 2002, Limerick©The JNT Association, 2002 Who benefits from growth? ?
TNC 2002, Limerick©The JNT Association, 2002 Talking of exponential growth… David Moore, CAIDA
TNC 2002, Limerick©The JNT Association, 2002 How bad can it get? Moores Law doubles every 18 months Incident reports double every 12 months Code Red II infections doubled every 20 minutes!
TNC 2002, Limerick©The JNT Association, 2002 Does it matter? Not (much) if networks are for research and play But governments are planning an e-future All government services on line by 2005 (UK) So computer (in)security affects Taxes Health Elections …
TNC 2002, Limerick©The JNT Association, 2002 Perception is even worse than reality Computer error is the commonest excuse We expect computers to fail So we wont even shop on line Resulting in Lack of understanding Irrational assessment of risks Wildly unpredictable behaviour
TNC 2002, Limerick©The JNT Association, 2002 What can we do about it? Safe computing needs to be the accepted norm Needs pro-active security by everyone Designers Programmers Implementers & maintainers Operators Users …and everyone else!
TNC 2002, Limerick©The JNT Association, 2002 Understand risks Everything has risks Lower tolerance on systems we dont understand Help others to understand Production Internet cant be the Wild West
TNC 2002, Limerick©The JNT Association, 2002 Safety Safety on the tarmac highway depends on Safe design and build Safe maintenance Safe vehicles Safe drivers Safe passengers Safety on the information super-highway does too!
TNC 2002, Limerick©The JNT Association, 2002
Technology Past & Present
Christina Cuervo, Kenny Roth, and Daniel Merrill.
Moore’s Law Kyle Doran Greg Muller Casey Culham May 2, 2007.
Lecture 1: What is a Computer? Lecture for CPSC 2105 Computer Organization by Edward Bosworth, Ph.D.
Web Site Security Andrew Cormack JANET-CERT ©The JNT Association, 1999.
Computer Emergency Response Teams
Industry and Competitive Analysis
1 Dr. Michael D. Featherstone Introduction to e-Commerce Laws of the Web.
Moore’s Law By: Avery A, David D, David G, Donovan R and Katie F.
Department of Computer and Information Science, School of Science, IUPUI Dale Roberts, Lecturer Computer Science, IUPUI CSCI.
History of Integrated Circuits In 1961 the first commercially available integrated circuits came from the Fairchild Semiconductor Corporation. The.
Get Safe Online Expert advice for everyone In association with.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 1 This material was developed by Oregon Health & Science.
INSURANCE Terms and Overview Created in part by The Texas Department of Insurance.
What else can we do on the Internet? Today, we are going to a new place. It isn’t a real place. It is the place where we can talk with each other online,
Lincolnshire Research Observatory Global and National Economic Context The Global and National Economic Context Professor Glyn.
Computer Performance & Storage Devices Computer Technology #2.
Computer Organization & Assembly Language © by DR. M. Amer.
What does the future hold? Threat Horizon 2011 Adrian Davis 2009 Workshop on Cyber Security and Global Affairs August 2009.
ISO 9126: Software Quality Internal Quality: Maintainability
Computer Science in Context Evangelos E. Milios Professor and Graduate Coordinator Faculty of Computer Science Dalhousie University.
Driver’s Ed. Chapter 1 Test Review.
Exponential Growth According to legend, chess was invented by Grand Vizier Sissa Ben Dahir, and given to King Shirham of India. The king offered him a.
SB500: Information Systems Instructor: Dr. Boris Jukic Evolution of Information Systems (1950’s – 2000’s)
How to Select an Analytic DBMS Overview, checklists, and tips by Curt A. Monash, Ph.D. President, Monash Research Editor, DBMS2
Hardware Trends CSE451 Andrew Whitaker. Motivation Hardware moves quickly OS code tends to stick around for a while “System building” extends way beyond.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Implementing the 16 Firefighter Life Safety Initiatives IAFC Leadership Summit 2005.
Chapter 1 — Computer Abstractions and Technology — 1 Technology Trends Electronics technology continues to evolve – Increased capacity and performance.
What is Grid Computing? Grid Computing is applying the resources of many computers in a network to a single entity at the same time; Usually to a scientific.
Journey Management Nigel DAth Journey Manager Bay of Plenty RTIM Seminar 18 March 2014.
The for the modern computer user. In the beginning Our universe created in a big bang Planets formed from the remnants of dead stars Life evolves.
Lecture 1: Performance EEN 312: Processors: Hardware, Software, and Interfacing Department of Electrical and Computer Engineering Spring 2013, Dr. Rozier.
Parallel Processing Sharing the load. Inside a Processor Chip in Package Circuits Primarily Crystalline Silicon 1 mm – 25 mm on a side 100 million to.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 5 The Motherboard.
Reaganomics = supply side/trickle down economics Cut taxes, especially for the wealthy and big business. Cut govt spending. No govt deficit. Keynesian.
The Social Effect of Information System
Health, place and nature How outdoor environments influence health and well-being.
Information Technology and the World Economy By Dale W. Jorgenson Harvard University March 5, 2005.
Jevons’ paradox: “Resource use efficiency increases tend to increase the rate of consumption of that resource” Moore’s law:
Chapter VI What should I know about the sizes and speeds of computers?
Safe Speed presents... Driver quality - The essential foundation of all road safety.
18/09/2006©RSH Online Services. 18/09/2006©RSH Online Services A vast range of services is available on the internet. Some of these are mentioned in the.
William Stallings Computer Organization and Architecture 6 th Edition Chapter 2 Computer Evolution and Performance.
Managing Risk When Driving. All Licensed Drivers – 191,275,719 All Drivers Involvement Rate in Fatal Crashes/100,000 Licensed Drivers – (37,795.
Copyright 2007 Thomson South-Western Chapter 6 Personal Risk Management.
Introduction to VLSI Design Amit Kumar Mishra ECE Department IIT Guwahati.
The role of government in the United States economy How does the United States government promote and regulate competition?
© 2017 SlidePlayer.com Inc. All rights reserved.