TNC 2002, Limerick©The JNT Association, 2002 Moores Law of Computer Security Andrew Cormack UKERNA

Slides:



Advertisements
Similar presentations
Driver’s Ed. Chapter 1 Test Review.
Advertisements

How to Select an Analytic DBMS Overview, checklists, and tips by Curt A. Monash, Ph.D. President, Monash Research Editor, DBMS2
Autotuning in Web100 John W. Heffner August 1, 2002 Boulder, CO.
Computer Emergency Response Teams
ISO 9126: Software Quality Internal Quality: Maintainability
Journey Management Nigel DAth Journey Manager Bay of Plenty RTIM Seminar 18 March 2014.
Negotiations on trade facilitation at the World Trade Organization Geneva, November 2012
Information Technology and the World Economy By Dale W. Jorgenson Harvard University March 5, 2005.
Lincolnshire Research Observatory Global and National Economic Context The Global and National Economic Context Professor Glyn.
Implementing the 16 Firefighter Life Safety Initiatives IAFC Leadership Summit 2005.
The for the modern computer user. In the beginning  Our universe created in a big bang  Planets formed from the remnants of dead stars  Life evolves.
Industry and Competitive Analysis
Exponential Growth According to legend, chess was invented by Grand Vizier Sissa Ben Dahir, and given to King Shirham of India. The king offered him a.
IT GOVERNANCE COMMITTEE MEETING February 19, 2008.
Technology Past & Present
Integrated Digital Electronics Module 3B2 Lectures 1-8 Engineering Tripos Part IIA David Holburn January 2006.
Moore’s Law Kyle Doran Greg Muller Casey Culham May 2, 2007.
What is Grid Computing? Grid Computing is applying the resources of many computers in a network to a single entity at the same time;  Usually to a scientific.
Moore’s Law By: Avery A, David D, David G, Donovan R and Katie F.
Christina Cuervo, Kenny Roth, and Daniel Merrill.
Jeff Kabachinski October 31 st, 2003 CESO 2003 IT Baseline Knowledge for the Biomedical Professional.
Jevons’ paradox: “Resource use efficiency increases tend to increase the rate of consumption of that resource” Moore’s law:
Department of Computer and Information Science, School of Science, IUPUI Dale Roberts, Lecturer Computer Science, IUPUI CSCI.
The Social Effect of Information System
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 1 This material was developed by Oregon Health & Science.
Web Site Security Andrew Cormack JANET-CERT ©The JNT Association, 1999.
Lecture 1: What is a Computer? Lecture for CPSC 2105 Computer Organization by Edward Bosworth, Ph.D.
History of Integrated Circuits  In 1961 the first commercially available integrated circuits came from the Fairchild Semiconductor Corporation.  The.
1 Dr. Michael D. Featherstone Introduction to e-Commerce Laws of the Web.
Lecture 1: Performance EEN 312: Processors: Hardware, Software, and Interfacing Department of Electrical and Computer Engineering Spring 2013, Dr. Rozier.
INSURANCE Terms and Overview Created in part by The Texas Department of Insurance.
CS 352 : Computer Organization and Design University of Wisconsin-Eau Claire Dan Ernst Memory Systems How to make the most out of cheap storage.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Parallel Processing Sharing the load. Inside a Processor Chip in Package Circuits Primarily Crystalline Silicon 1 mm – 25 mm on a side 100 million to.
What does the future hold? Threat Horizon 2011 Adrian Davis 2009 Workshop on Cyber Security and Global Affairs August 2009.
What else can we do on the Internet? Today, we are going to a new place. It isn’t a real place. It is the place where we can talk with each other online,
Computer Organization & Assembly Language © by DR. M. Amer.
Get Safe Online Expert advice for everyone In association with.
Morgan Kaufmann Publishers
Computer Science in Context Evangelos E. Milios Professor and Graduate Coordinator Faculty of Computer Science Dalhousie University.
FPGA-Based System Design: Chapter 1 Copyright  2004 Prentice Hall PTR Moore’s Law n Gordon Moore: co-founder of Intel. n Predicted that number of transistors.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 5 The Motherboard.
Moore’s Law and Its Future Mark Clements. 15/02/2007EADS 2 This Week – Moore’s Law History of Transistors and circuits The Integrated circuit manufacturing.
Introduction Why Study Algorithms? Design and Analysis of Algorithms I.
Hardware Trends CSE451 Andrew Whitaker. Motivation Hardware moves quickly OS code tends to stick around for a while “System building” extends way beyond.
1 Week 1: The History of Computing (PART II) READING: Chapter 1.
Computer Stuff By Raj and Brad. Virtual Memory This takes place if your computer is running low on RAM. It stimulates more RAM when your computer reaches.
Computer Performance & Storage Devices Computer Technology #2.
Introduction to Computers - Hardware
Integration Lower sums Upper sums
Regional Road Safety Workshop
Computers & Internet.
William Stallings Computer Organization and Architecture 6th Edition
Introduction to e-Commerce
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Threats to computers Andrew Cormack UKERNA.
Architecture & Organization 1
IC TECHNOLOGY.
CSE/INFO 100: Fluency in Information Technology
Operations Management Part V
Architecture & Organization 1
By Nealesh Ragoodial - Security Capstone
Technology Forecasting: Moore’s Law
E-Commerce Futures Bill Thompson 12/31/2018.
Transformations Limit Continuity Derivative
Unit -4 Introduction to Embedded Systems Tuesday.
Intel CPU for Desktop PC: Past, Present, Future
Overview Background Methods Findings Future research
Presentation transcript:

TNC 2002, Limerick©The JNT Association, 2002 Moores Law of Computer Security Andrew Cormack UKERNA

TNC 2002, Limerick©The JNT Association, 2002 Moores Law (1965) Gordon Moore, co-founder of Intel Number of transistors per square inch on integrated circuits had doubled every year since the IC was invented. Predicted that this trend would continue for the foreseeable future. In subsequent years, the pace slowed down a bit, but data density has doubled approximately every 18 months, and this is the current definition of Moore's Law, which Moore himself has blessed. Most experts, including Moore himself, expect Moore's Law to hold for at least another two decades. Webopedia.com (1998)

TNC 2002, Limerick©The JNT Association, 2002 Moores Law of Intel CPUs George Watson, University of Delaware

TNC 2002, Limerick©The JNT Association, 2002 A sample of papers and articles Is there a Moores Law for data traffic? Our incredibly shrinking storage Can we get our economy to grow in synch with Moores Law? Moores Law influences fiber optic development Music, Morality and Moores Law

TNC 2002, Limerick©The JNT Association, 2002 Moores Law of other things Network traffic Disk space Money Bandwidth Crime What about security?

TNC 2002, Limerick©The JNT Association, 2002 CERT/CC vulnerability notes From:

TNC 2002, Limerick©The JNT Association, 2002 CERT/CC incident reports From:

TNC 2002, Limerick©The JNT Association, 2002 Moores Law of Security: Bad news!

TNC 2002, Limerick©The JNT Association, 2002 Why this exponential growth? Growth in Number of computers on the Internet Complexity of standard computers Bandwidth connecting those computers Number of would-be intruders And their level of technology ( not their skill) Bandwidth connecting intruders to computers CPU power available to the intruders

TNC 2002, Limerick©The JNT Association, 2002 And at the same time More reliance on computers For home banking, study, employment… How many of us rely on them for our reputations? More demand for ease of use Internet-ready computers in supermarkets More inter-dependent systems New routes for attack Unexpected consequences of attack

TNC 2002, Limerick©The JNT Association, 2002 Who benefits from growth? ?

TNC 2002, Limerick©The JNT Association, 2002 Talking of exponential growth… David Moore, CAIDA

TNC 2002, Limerick©The JNT Association, 2002 How bad can it get? Moores Law doubles every 18 months Incident reports double every 12 months Code Red II infections doubled every 20 minutes!

TNC 2002, Limerick©The JNT Association, 2002 Does it matter? Not (much) if networks are for research and play But governments are planning an e-future All government services on line by 2005 (UK) So computer (in)security affects Taxes Health Elections …

TNC 2002, Limerick©The JNT Association, 2002 Perception is even worse than reality Computer error is the commonest excuse We expect computers to fail So we wont even shop on line Resulting in Lack of understanding Irrational assessment of risks Wildly unpredictable behaviour

TNC 2002, Limerick©The JNT Association, 2002 What can we do about it? Safe computing needs to be the accepted norm Needs pro-active security by everyone Designers Programmers Implementers & maintainers Operators Users …and everyone else!

TNC 2002, Limerick©The JNT Association, 2002 Understand risks Everything has risks Lower tolerance on systems we dont understand Help others to understand Production Internet cant be the Wild West

TNC 2002, Limerick©The JNT Association, 2002 Safety Safety on the tarmac highway depends on Safe design and build Safe maintenance Safe vehicles Safe drivers Safe passengers Safety on the information super-highway does too!

TNC 2002, Limerick©The JNT Association, 2002