Consideration of Targeted Hostile Software in Homeland Security by Peter V. Radatti, Ph.D....

15
Consideration of Targeted Hostile Software in Homeland Security by Peter V. Radatti, Ph.D. Distinguished Visiting Research Professor Florida Institute of Technology University Collage 150 West University Blvd., Melbourne, FL 32901 USA www.fit.edu CEO/President CyberSoft Operating Corporation 1508 Butler Pike, Conshohocken, PA 19428 USA +1 610-825-4748 * [email protected] www.cybersoft.com © Copyright April 2006 by Peter V. Radatti

Transcript of Consideration of Targeted Hostile Software in Homeland Security by Peter V. Radatti, Ph.D....

Consideration of Targeted Hostile Software in Homeland Security

byPeter V. Radatti, Ph.D.

Distinguished Visiting Research ProfessorFlorida Institute of Technology

University Collage 150 West University Blvd., Melbourne, FL 32901 USAwww.fit.edu

CEO/PresidentCyberSoft Operating Corporation

1508 Butler Pike, Conshohocken, PA 19428 USA+1 610-825-4748 * [email protected]

www.cybersoft.com

© Copyright April 2006 by Peter V. Radatti

Computer Security

Today is a Failure

The Largest Single Hole

in Computer Security

Scanner Effectiveness

Behavior Blockersand

Code Emulators

Heuristics

Solutions

Baseline IntegrityAggregate DataSelf-HealingPhysical Separation

False Assumptions

Sleeper Virus

Are Solutions Possible?

Significant Changes Are Needed

Number One Problem For Security

Humans

Factors of Identification

Radatti’s Rules of Computer Security

1. Computer Security Failure Costs2. Outcome of Financial Costs Always Higher

Than Anticipated3. Common Security Solution Problems4. Networks5. Computer Security Intrusion6. Computer Security Performance7. Security Vigilance8. Security Cost/Effectiveness9. Security Design10. Requirements for Great Security11. Locks12. Who is Available on Both Sides?

Radatti’s Factors of Computer Security

1. Attacks2. Attack Planning3. User Actions4. System Readiness5. The Unexpected

To Download Presentation NotesGo To:

www.cyber.com/cs_whitepapers/archives/govsec06.pdf