Until recently, security was a backwater in the world of computing.
Many people cite Albert Einstein’s aphorism “Everything should be made as simple as possible, but no simpler.” Only a handful, however, have had the opportunity to discuss the concept with the physicist over breakfast.
One of those is Peter G. Neumann, now an 80-year-old computer scientist at SRI International, a pioneering engineering research laboratory here.
As an applied-mathematics student at Harvard, Dr. Neumann had a two-hour breakfast with Einstein on Nov. 8, 1952. What the young math student took away was a deeply held philosophy of design that has remained with him for six decades and has been his governing principle of computing and computer security.
For many of those years, Dr. Neumann (pronounced NOY-man) has remained a voice in the wilderness, tirelessly pointing out that the computer industry has a penchant for repeating the mistakes of the past. He has long been one of the nation’s leading specialists in computer security, and early on he predicted that the security flaws that have accompanied the pell-mell explosion of the computer and Internet industries would have disastrous consequences.
“His biggest contribution is to stress the ‘systems’ nature of the security and reliability problems,” said Steven M. Bellovin, chief technology officer of the Federal Trade Commission. “That is, trouble occurs not because of one failure, but because of the way many different pieces interact.”
Dr. Bellovin said that it was Dr. Neumann who originally gave him the insight that “complex systems break in complex ways” — that the increasing complexity of modern hardware and software has made it virtually impossible to identify the flaws and vulnerabilities in computer systems and ensure that they are secure and trustworthy.
The consequence has come to pass in the form of an epidemic of computer malware and rising concerns about cyberwarfare as a threat to global security, voiced alarmingly this month by the defense secretary, Leon E. Panetta, who warned of a possible “cyber-Pearl Harbor” attack on the United States.
It is remarkable, then, that years after most of his contemporaries have retired, Dr. Neumann is still at it and has seized the opportunity to start over and redesign computers and software from a “clean slate.”
He is leading a team of researchers in an effort to completely rethink how to make computers and networks secure, in a five-year project financed by the Pentagon’s Defense Advanced Research Projects Agency, or Darpa, with Robert N. Watson, a computer security researcher at Cambridge University’s Computer Laboratory.
“I’ve been tilting at the same windmills for basically 40 years,” said Dr. Neumann recently during a lunchtime interview at a Chinese restaurant near his art-filled home in Palo Alto, Calif. “And I get the impression that most of the folks who are responsible don’t want to hear about complexity. They are interested in quick and dirty solutions.”
This might be of interest also: Cyberwarfare statistics: A decade of geopolitical attacks
Go deeper with Bing News on:
Computer security
- Complex adversarial attacks can force generative AI services to bypass security filters and limitations
Facepalm: Machine learning algorithms are the foundation of well-known products like OpenAI's ChatGPT, and people are using these new AI services to ask the weirdest things. Commercial chatbots should ...
- New tool pinpoints security fixes in open-source software updates
Researchers have demonstrated a new tool that analyzes open-source software updates to specify which sections of code are being modified to address recently identified security vulnerabilities. The ...
- Cyberattack hits Ascension hospitals' computer networks: 'It's affecting everything'
Employees noticed the computer network problems about 7 a.m. Wednesday, said three workers who spoke on the condition of anonymity out of fear of job repercussions. "There was a security concern, so ...
- Best Android & iOS Security Apps for Safeguarding Your Phone
Free to download; monthly subscriptions range from no charge to $4 Good passwords are hard to come up with on your own. Cybersecurity experts suggest using a different random password for every online ...
- Students master computer security essentials at 17th UB Lockdown competition
Thirteen teams from universities from across the U.S. competed at the University at Buffalo’s Collegiate Lockdown cyberdefense competition April 20.
Go deeper with Google Headlines on:
Computer security
[google_news title=”” keyword=”computer security” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]
Go deeper with Bing News on:
Cybersecurity
- Rajkumar bill aims to fortify cybersecurity and data protection for New Yorkers
Rajkumar said she is committed to the safety of New Yorkers, which includes cybersecurity. She also added that the public’s awareness of how companies use ...
- U of I Honors Idaho’s First Bachelor’s of Cybersecurity Graduates
University of Idaho’s College of Engineering will recognize the state’s first undergraduate class of cybersecurity professionals as they head off to positions in Idaho and nationwide.
- AI and Cybersecurity: Transforming Digital Defense
Palo Alto Networks CIO Meerah Rajavel discussed how the intersection of artificial intelligence and cybersecurity is reshaping the landscape of digital defense and ...
- Ascension investigating 'cybersecurity event'
WISCONSIN (CBS 58) -- Ascension says their clinical operations were disrupted by what they're calling a cybersecurity event Wednesday, May 9. The hospital says an investigation and remediation efforts ...
- 12 Cybersecurity Startups To Watch From RSAC 2024
Numerous cybersecurity startups—including in fast-growing areas such as cloud security and identity security—showcased at RSAC 2024 this week.
Go deeper with Google Headlines on:
Cybersecurity
[google_news title=”” keyword=”cybersecurity” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]