SlideShare a Scribd company logo
Open Source Systems &
Security
Sherif El-Kassas
OSS & Security
● Outline:
– Principles, Motives, & Opportunity
– Trends and attitudes
– Case and examples
(The small matter of Mr. Snowden)
– The way forward
principles
Design Principles
• Well known set of principles
– Saltzer, J.H.; Schroeder, M.D., "The protection of
information in computer systems," Proceedings
of the IEEE , vol.63, no.9, pp.1278,1308, Sept.
1975
– Smith, R.E., "A Contemporary Look at Saltzer
and Schroeder's 1975 Design Principles,"
Security & Privacy, IEEE , vol.10, no.6, pp.20,25,
Nov.-Dec. 2012
– See also:
http://www.cryptosmith.com/book/export/html/365
Saltzer & Schroeder
1. Economy of mechanism
2. Fail-safe defaults
3. Complete mediation
4. Open design
5. Separation of privilege
6. Least privilege
7. Least common mechanism
8. Psychological acceptability
Saltzer & Schroeder
1. Economy of mechanism
2. Fail-safe defaults
3. Complete mediation
4.Open design
Kerckhoffs (19th century)
Shannon: “The enemy knows the system”
5. Separation of privilege
6. Least privilege
7. Least common mechanism
8. Psychological acceptability
motive
Motive
“While security for the user might
mean the repulse of `evil hackers […]
security for the vendor means
growing the market and crushing the
competition.”
– Ross Anderson, "Security in Open versus Closed
Systems - The Dance of Boltzmann, Coase and
Moore", Open Source Software : Economics, Law
and Policy, Toulouse, France, June 20-21, 2002.
opportunity
Reflections on
Trusting Trust
Ken Tompson
Communication of the ACM, Vol. 27, No. 8,
August 1984
Opportunity
Reflections on
Trusting Trust
Ken Tompson
Communication of the ACM, Vol. 27, No. 8,
August 1984
Opportunity
“The moral is obvious. You
can't trust code that you
did not totally create
yourself. (Especially code
from companies that
employ people like me.)”
http://www.cs.tufts.edu/comp/98/Ken_Thompson_84-Reflections_on_Trusting_Trust.pdf
What if we don’t manage
trust & ignore scrutiny?
Lastupdated6July,2011
The Two Faces of Hackinghttp://spctrum.ieee.og/static/hacker-matrix
dependability of the connected world
Open Source Systems & Security - EiTESAL Digital Transformation "Role of Open Source" Event 29/11/2017
https://www.wired.com/story/car-hack-shut-down-safety-features/
Open Source Systems & Security - EiTESAL Digital Transformation "Role of Open Source" Event 29/11/2017
War stories
http://www.quadibloc.com/crypto/ro0204.htm
http://www.iwm.org.uk/online/eniga/eni-intro.htm
French Weapons in the Falklands
• France manufactured the Exocet
[…]
– France also provided a vast,
virtually unprecedented
amount of technical
assistance, including
information on how to combat
the Exocet missile, which
could well have been
decisive in assuring a British
victory.
http://en.wikipedia.org/wiki/Exocet
conspiracies as facts
www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-google
en.wikipedia.org/wiki/2013_mass_surveillance_disclosures
https://www.schneier.com/crypto-gram-1311.html
https://www.schneier.com/crypto-gram-1311.html
“Attacks only get better”
the way forward
Physical vs. Digital world
• what Morpheus might have said
– “Do you believe that my being stronger or
faster has anything to do with my muscles in
this place?”
• mediation, proxies, and trust
● Stallman: How Much Surveillance
Can Democracy Withstand?
“Robust protection for privacy must be
technical”
wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/
R&D agenda
R&D agenda
• Trustworthy technology
– Build our own?
– Open source strategy
– Open scrutiny
– Certification program to ensure quality
●
Note worthy:
• People
• Ensure no harmful shortcuts are taken
Opportunity
CRA, November 2003, [unsolved] grand challenges:
● Economic
● Epidemic
● Engineering
● Human
http://archive.cra.org/Activities/grand.challenges/security/home.html
– The Economist, November 2015:
● “The cost of immaturity”
– Average time to breach detection 205 days
– Estimated global cost of 90m cyber-attacks: $575 billion
● “cyber-security industry is booming”
– Market: $75 billion a year now [...] $170 billion by 2020
– 2016:
● cloud, mobile, social media, and more: “Cybersecurity is terrible,
and will get worse”; IoT “will be a security disaster”
https://www.lightbluetouchpaper.org/2016/02/22/financial-cryptography-2016/
Thank you..
Questions?
www.cse.aucegypt.edu/~skassas/Eitesal-oss-2017
Trusting organization
http://spectrum.ieee.org/telecom/security/the-athens-affair
Kill switches!
spectrum.ieee.org/may08/6171
trends
2013 2014 2105
.00
500,000.00
1,000,000.00
1,500,000.00
2,000,000.00
2,500,000.00
3,000,000.00
3,500,000.00
4,000,000.00
4,500,000.00
insider
unintended
physical loss
portable device
stationary device
“DataBreachesbytheNumbers,”http://www.securityweek.com/data-breaches-numbers
2013 2014 2105
.00
20,000,000.00
40,000,000.00
60,000,000.00
80,000,000.00
100,000,000.00
120,000,000.00
140,000,000.00
hacking
“DataBreachesbytheNumbers,”http://www.securityweek.com/data-breaches-numbers
other conspiracies
http://www.f-
secure.com/weblog/archives/00002226.html
http://vincentarnold.com/blog/chinese-backdoors-hidden-in-router-
firmware/
What can be done about trust?
Only the paranoid survive!
“Anything that happens, happens.
Anything that, in happening, causes
something else to happen, causes
something else to happen.
Anything that, in happening, causes
itself to happen again, happens again.
It doesn't necessarily do it in
chronological order, though.”
--Douglas N. Adams, “Mostly
Harmless”

More Related Content

PDF
Security & privacy on the internet: things you should now
PPTX
Cybersecurity Strategies - time for the next generation
PPT
Cyber(in)security: systemic risks and responses
PPT
Systemic cybersecurity risk
PDF
Preventing Predictable Problems (Possibly)
PDF
Technologies and Policies for a Defensible Cyberspace
PPTX
Lofty Ideals: The Nature of Clouds and Encryption
PDF
Computer & Data Security
Security & privacy on the internet: things you should now
Cybersecurity Strategies - time for the next generation
Cyber(in)security: systemic risks and responses
Systemic cybersecurity risk
Preventing Predictable Problems (Possibly)
Technologies and Policies for a Defensible Cyberspace
Lofty Ideals: The Nature of Clouds and Encryption
Computer & Data Security

Similar to Open Source Systems & Security - EiTESAL Digital Transformation "Role of Open Source" Event 29/11/2017 (20)

PDF
COMP 424 Computer System Security Fall 2016
PDF
The Architecture of Privacy 1st Edition Courtney Bowman
PDF
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
PPTX
Bl cybersecurity z_dooly
PDF
2600 v24 n4 (winter 2007)
PPTX
Trust and the web veria 11 12- 09
PDF
Dinis Cruz IBWAS'10 Conference Keynote
PDF
Infosecurity2013nl 131103184054-phpapp01
PDF
Trust_Security-Serene-Risc-2015-marsh
PPTX
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
PPTX
Civilian OPSEC in cyberspace
PDF
Evolving it security Threats and Solutions
PDF
Computer Security
PPT
Rainer+3e Student Pp Ts Ch03
PDF
Security, Privacy and the Future Internet
PPT
Lecture 4 presentation of cyber security
PDF
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
PPTX
Lecture 3 Country Specific Strategy.pptx
PDF
Open Security and Privacy Reference Architecture
PPTX
Data Privacy for Activists
COMP 424 Computer System Security Fall 2016
The Architecture of Privacy 1st Edition Courtney Bowman
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
Bl cybersecurity z_dooly
2600 v24 n4 (winter 2007)
Trust and the web veria 11 12- 09
Dinis Cruz IBWAS'10 Conference Keynote
Infosecurity2013nl 131103184054-phpapp01
Trust_Security-Serene-Risc-2015-marsh
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
Civilian OPSEC in cyberspace
Evolving it security Threats and Solutions
Computer Security
Rainer+3e Student Pp Ts Ch03
Security, Privacy and the Future Internet
Lecture 4 presentation of cyber security
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Lecture 3 Country Specific Strategy.pptx
Open Security and Privacy Reference Architecture
Data Privacy for Activists
Ad

More from EITESANGO (20)

PDF
Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
PDF
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
PDF
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
PDF
Open source communities - EiTESAL Digital Transformation "Role of Open Source...
PDF
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
PDF
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
PDF
EiTESAL event UK Market challenges & opportunities 18/7/2017
PPTX
EiTESAL Gender Diversity Initiative Launching day 12/7/2014
PPTX
EiTESAL Gender Diversity Initiative Launching day 12/7/2017
PDF
EiTESAL eHealth Conference 14&15 May 2017
PPTX
EiTESAL eHealth Conference 14&15 May 2017
PPT
EiTESAL eHealth Conference 14&15 May 2017
PPTX
EiTESAL eHealth Conference 14&15 May 2017
PPTX
EiTESAL eHealth Conference 14&15 May 2017
PPTX
EiTESAL eHealth Conference 14&15 May 2017
PPTX
EiTESAL eHealth Conference 14&15 May 2017
PPSX
EiTESAL eHealth Conference 14&15 May 2017
PPTX
EiTESAL eHealth Conference 14&15 May 2017
PPTX
EiTESAL eHealth Conference 14&15 May 2017
PPTX
EiTESAL eHealth Conference 14&15 May 2017
Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
Open source communities - EiTESAL Digital Transformation "Role of Open Source...
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
EiTESAL event UK Market challenges & opportunities 18/7/2017
EiTESAL Gender Diversity Initiative Launching day 12/7/2014
EiTESAL Gender Diversity Initiative Launching day 12/7/2017
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
Ad

Recently uploaded (20)

PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
project resource management chapter-09.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Mushroom cultivation and it's methods.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Hybrid model detection and classification of lung cancer
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hindi spoken digit analysis for native and non-native speakers
Group 1 Presentation -Planning and Decision Making .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
project resource management chapter-09.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Mushroom cultivation and it's methods.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
1 - Historical Antecedents, Social Consideration.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Hybrid model detection and classification of lung cancer
Web App vs Mobile App What Should You Build First.pdf
OMC Textile Division Presentation 2021.pptx
A Presentation on Artificial Intelligence
DP Operators-handbook-extract for the Mautical Institute
Building Integrated photovoltaic BIPV_UPV.pdf
WOOl fibre morphology and structure.pdf for textiles

Open Source Systems & Security - EiTESAL Digital Transformation "Role of Open Source" Event 29/11/2017