Security Experience (1) When ~ 1998 What – Sun workstations connected to the Internet How – hacker invaded and corrupted our Unix operating systems Solution – Disconnect machines from the internet and reinstall the operating system Vulnerability – connecting computers to the internet
Security Experience (2) When ~ 2002 What – “I love you virus” destroyed a lot of the files on my desktop and related disk drives How – attachment activated when message was opened Solution – filtering programs for Vulnerability – interconnected systems
Security Experience (3) When ~ 2004 What – Contamination of NSF’s computer network How – Virus brought in through external laptops Solution – the NSF screening procedure for security patches and viruses Vulnerability – Wireless network connecting laptops to a resident network
Computer interconnectivity creates vulnerability for security breaches A major “crash” creates incentive to improve security Sources of Vulnerability Experience (1) – interconnection of computers using the internet Experience (2) – interconnection of systems through address books Experience (3) – interconnection of foreign laptops via wireless to a resident network
Issues How to balance security and accessibility of information? Who is responsible for providing security packages for open source software? Will Grid computing as a new interconnection technology create new vulnerabilities for security breaches? What security breach could produce a major crash in Grid computing?