We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMadison Kilgore
Modified over 2 years ago
TNC 2002, Limerick©The JNT Association, 2002 Moores Law of Computer Security Andrew Cormack UKERNA
TNC 2002, Limerick©The JNT Association, 2002 Moores Law (1965) Gordon Moore, co-founder of Intel Number of transistors per square inch on integrated circuits had doubled every year since the IC was invented. Predicted that this trend would continue for the foreseeable future. In subsequent years, the pace slowed down a bit, but data density has doubled approximately every 18 months, and this is the current definition of Moore's Law, which Moore himself has blessed. Most experts, including Moore himself, expect Moore's Law to hold for at least another two decades. Webopedia.com (1998)
TNC 2002, Limerick©The JNT Association, 2002 Moores Law of Intel CPUs George Watson, University of Delaware
TNC 2002, Limerick©The JNT Association, 2002 A sample of papers and articles Is there a Moores Law for data traffic? Our incredibly shrinking storage Can we get our economy to grow in synch with Moores Law? Moores Law influences fiber optic development Music, Morality and Moores Law
TNC 2002, Limerick©The JNT Association, 2002 Moores Law of other things Network traffic Disk space Money Bandwidth Crime What about security?
TNC 2002, Limerick©The JNT Association, 2002 CERT/CC vulnerability notes From:
TNC 2002, Limerick©The JNT Association, 2002 CERT/CC incident reports From:
TNC 2002, Limerick©The JNT Association, 2002 Moores Law of Security: Bad news!
TNC 2002, Limerick©The JNT Association, 2002 Why this exponential growth? Growth in Number of computers on the Internet Complexity of standard computers Bandwidth connecting those computers Number of would-be intruders And their level of technology ( not their skill) Bandwidth connecting intruders to computers CPU power available to the intruders
TNC 2002, Limerick©The JNT Association, 2002 And at the same time More reliance on computers For home banking, study, employment… How many of us rely on them for our reputations? More demand for ease of use Internet-ready computers in supermarkets More inter-dependent systems New routes for attack Unexpected consequences of attack
TNC 2002, Limerick©The JNT Association, 2002 Who benefits from growth? ?
TNC 2002, Limerick©The JNT Association, 2002 Talking of exponential growth… David Moore, CAIDA
TNC 2002, Limerick©The JNT Association, 2002 How bad can it get? Moores Law doubles every 18 months Incident reports double every 12 months Code Red II infections doubled every 20 minutes!
TNC 2002, Limerick©The JNT Association, 2002 Does it matter? Not (much) if networks are for research and play But governments are planning an e-future All government services on line by 2005 (UK) So computer (in)security affects Taxes Health Elections …
TNC 2002, Limerick©The JNT Association, 2002 Perception is even worse than reality Computer error is the commonest excuse We expect computers to fail So we wont even shop on line Resulting in Lack of understanding Irrational assessment of risks Wildly unpredictable behaviour
TNC 2002, Limerick©The JNT Association, 2002 What can we do about it? Safe computing needs to be the accepted norm Needs pro-active security by everyone Designers Programmers Implementers & maintainers Operators Users …and everyone else!
TNC 2002, Limerick©The JNT Association, 2002 Understand risks Everything has risks Lower tolerance on systems we dont understand Help others to understand Production Internet cant be the Wild West
TNC 2002, Limerick©The JNT Association, 2002 Safety Safety on the tarmac highway depends on Safe design and build Safe maintenance Safe vehicles Safe drivers Safe passengers Safety on the information super-highway does too!
TNC 2002, Limerick©The JNT Association, 2002
CIS570 WS3 Project Planning Business Systems Joseph Lewis Aguirre.
The. of and a to in is you that it he for.
Institute of Regulatory Excellence The Use of Technology in Regulatory Reform and Public Policy Initiatives Mark Majek Director, Operations Texas Board.
BENCHMARKS AND WORK PLANS PLANNING TO ORGANISE Benchmarks and work plans 0.
Insert your company logo here (on slide master). Insert your company logo here (on slide master) Developed by the Department of Communications, Information.
CS330 Management Information Systems IT Infrastructure: Introduction and Overview 1.
Of. and a to the in is you that it at be.
Windermere Real Estate A Changing Landscape Michael Fanning VP, Business Development
5038/2009: The Electronic Society Systems Thinking, Systems Sciences & Systems Modelling.
PC Basics and the Net. Our goals... Discover how your hard drive, RAM, and Internet connection actually workDiscover how your hard drive, RAM, and Internet.
Using Technology as a Window on the World Professor David Kleykamp Department of Economics Tamkang University.
Analysis of Computer Algorithms. What is Algorithm? Algorithm is any well-defined computational procedure that takes some value, or set of values, as.
1 Computational Complexity Size Matters!. 2 Suppose there are several algorithms which can all be used to perform the same task. We need some way to judge.
1 Chapter 13 Information Technology Economics. 2 Learning Objectives Identify the major aspects of the economics of information technology. Explain the.
Contents: History of computers The first mass PC The first mass PC The most popular PC The most popular PCInternet The beginning of the Internet The beginning.
Introduction to UIS data collection tools and guidelines. SEMINAR – WORKSHOP ON SCIENCE, TECHNOLOGY AND INNOVATION INDICATORS Phnom.
What happened to IPv5? and other oft asked IPv6 questions The Internet Society, IPv6 and You Susan Estrada.
Russ Ristine – Radical Blue Gaming. Slide 2 Moving to a networked gaming floor? Be informed Strive for a future-proof solution This is just a primer Focus.
The. of and a to in is you that it he was.
IT: Communication and Impacts Jamie Graham. How IT impacts Society IT has effected society massively since the start of the 1970s. Who here uses a phone.
Network Security Threats to the E-Learner Steven Furnell Steven Furnell Network Research Group University of Plymouth United Kingdom.
. © 2003 Ownership Associates Home Standard Deal How it works Three Pieces Return on Effort The Deals Summary New Deal < Go.
© Jonathan Reynolds, 2005 E-business: Strategy, skills and careers issues Dr Jonathan Reynolds Oxford Institute of Retail Management Saïd Business School.
What is co-production? Presentation for the housing and support community.
Hosted PBX And VoIP Phone Systems LOGICAL Alternatives to Traditional PBXs ELLEGENT SYSTEMS, Inc.
3 Wk Midterm Exam Feedback What we did well –Effort –Engagement –Connections to your real life –What this type of test can tell us How well you understand.
Top Tips on Funding Bids Maximizing your organisation’s chances.
Packet Switching vs. Circuit Switching Packet-switched and circuit-switched networks use two different technologies for sending messages and data from.
2012 Future of LG Summit FOLG Will Be Different : exploring/defining first principles –‘We can be heroes just for one day’ 2012: the ‘DO’
Information Systems Management CIS 318
© 2016 SlidePlayer.com Inc. All rights reserved.