Until recently, security was a backwater in the world of computing.
Many people cite Albert Einstein’s aphorism “Everything should be made as simple as possible, but no simpler.” Only a handful, however, have had the opportunity to discuss the concept with the physicist over breakfast.
As an applied-mathematics student at Harvard, Dr. Neumann had a two-hour breakfast with Einstein on Nov. 8, 1952. What the young math student took away was a deeply held philosophy of design that has remained with him for six decades and has been his governing principle of computing and computer security.
For many of those years, Dr. Neumann (pronounced NOY-man) has remained a voice in the wilderness, tirelessly pointing out that the computer industry has a penchant for repeating the mistakes of the past. He has long been one of the nation’s leading specialists in computer security, and early on he predicted that the security flaws that have accompanied the pell-mell explosion of the computer and Internet industries would have disastrous consequences.
“His biggest contribution is to stress the ‘systems’ nature of the security and reliability problems,” said Steven M. Bellovin, chief technology officer of the Federal Trade Commission. “That is, trouble occurs not because of one failure, but because of the way many different pieces interact.”
Dr. Bellovin said that it was Dr. Neumann who originally gave him the insight that “complex systems break in complex ways” — that the increasing complexity of modern hardware and software has made it virtually impossible to identify the flaws and vulnerabilities in computer systems and ensure that they are secure and trustworthy.
The consequence has come to pass in the form of an epidemic of computer malware and rising concerns about cyberwarfare as a threat to global security, voiced alarmingly this month by the defense secretary, Leon E. Panetta, who warned of a possible “cyber-Pearl Harbor” attack on the United States.
It is remarkable, then, that years after most of his contemporaries have retired, Dr. Neumann is still at it and has seized the opportunity to start over and redesign computers and software from a “clean slate.”
He is leading a team of researchers in an effort to completely rethink how to make computers and networks secure, in a five-year project financed by the Pentagon’s Defense Advanced Research Projects Agency, or Darpa, with Robert N. Watson, a computer security researcher at Cambridge University’s Computer Laboratory.
“I’ve been tilting at the same windmills for basically 40 years,” said Dr. Neumann recently during a lunchtime interview at a Chinese restaurant near his art-filled home in Palo Alto, Calif. “And I get the impression that most of the folks who are responsible don’t want to hear about complexity. They are interested in quick and dirty solutions.”
This might be of interest also: Cyberwarfare statistics: A decade of geopolitical attacks
Go deeper with Bing News on:
- Healthcare Cyber Security Market Size, Statistics, Growth, Revenue, Analysis & Trends - Industry Forecast Report 2019-2026on June 30, 2020 at 10:22 am
Healthcare Cyber Security Market is accounted for $6.88 billion in 2017 and is expected to reach $36.88 billion ...
- Elite CIA unit that developed hacking tools failed to secure its own systems, allowing massive leak, an internal report foundon June 16, 2020 at 6:22 am
His attorneys argued at a trial this year that security on the computer network was so poor that any one of hundreds of employees or contractors may have had access to the same information Schulte ...
- Deal: Pay what you want to access up to seven computer security courseson June 15, 2020 at 8:02 pm
Pay as much – or as little – as you want to gain lifetime access to five all level courses that offers key Wi-Fi and Windows security training as well as ethical hacking techniques.
- This Week in Computer Securityon June 13, 2020 at 5:00 pm
While there is certainly a self-serving angle to consider, it’s much better for iOS and consumers if flaws are fixed and publicized, rather than kept secret and sold to an offensive security vendor.
- Computer Securityon June 11, 2020 at 5:00 pm
Sensible Vision Announces Next-Generation Face RecognitionThe Covert computer security firm Sensible Vision Thursday announced the release of a next-generation facial recognition algorithm for its ...
Go deeper with Google Headlines on:
Go deeper with Bing News on:
- Realizing cybersecurity risks does not mean sticking to the ruleson June 30, 2020 at 8:03 pm
Just because most people are realizing cybersecurity risks does not mean they stick to the rules, according to research from Trend Micro.
- Cloud Security Alliance and ISSA unite to build, support, and strengthen the cybersecurity communityon June 30, 2020 at 4:54 pm
The Cloud Security Alliance (CSA) and the ISSA have signed a MOU to collaborate on a variety of initiatives to support the cybersecurity profession.
- Cooper signs bills into law on prisoner education, cybersecurity and teaching programs | Charlotte Observeron June 30, 2020 at 1:59 pm
Roy Cooper on Tuesday signed 12 bills into law, including funding for university projects, ensuring state prisoners have access to community college classes, expanding a teaching fellows program and ...
- 5 Mistakes That Threaten Infrastructure Cybersecurity And Resilienceon June 30, 2020 at 6:31 am
With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten ...
- Top 25 Auto Cybersecurity Hacks: Too Many Glass Houses To Be Throwing Stoneson June 30, 2020 at 4:36 am
FCA has been the poster child of cybersecurity since NHTSA’s forced recall six years ago, but here’s the nasty truth: nearly every manufacturer has been hacked. To support that claim, here is a list ...