Lessons From The History of Computer Security
Bob Abbott - Consultant
Oct 23, 2002
AbstractMr. Abbott will give a contemporary view of the History of Computer
Security. Security has been associated with computing since the
days of Pascal, Boole, and Turin. Computer Security has been shaped
by constantly advancing computer technology that provides an
ever-changing playground for the Wily Hacker. Provided with new
ways to commit computer related crime, fraud, and abuse, Mr. Hacker
repeatedly challenges laws, regulations, and requirements. In turn,
the justice system is sometimes forced to apply inadequate or even
antiquated laws to a given instance of Hacker abuse. But then, the
whole cycle starts over again!
Someone has said that an ignorance of history dooms mankind to
repeating the same mistakes over and over again. Were lessons
learned in the early days of Computer Security that have been
forgotten today? Mr. Abbott will examine this question as well as
the interplay of technology, Hacker, and courts in the period from
1970 to 1980.
About the SpeakerMr. Abbott is an early pioneer in Computing and Computer Security.
His initial employment was producing application software for the
5th UNIVAC I - the 1st mass-produced, general purpose, computer. His
programming and system design efforts culminated in the design and
implementation of the 1st multi-user, multi-tasking Operating System
(O/S) to go into 24x7x365 use. This O/S, later renamed LTSS
(Livermore Time Sharing System), ran for over 30 years on Cray class
computers in a number of different scientific research centers.
His knowledge of the internal workings of operating systems made him a likely
candidate for Principal Investigator of a research program to
investigate the security properties of the operating systems of the mid-to-late
1970s. This DARPA1 funded research effort was code named \"The RISOS
(Research in Secured Operating Systems) Project\". When The RISOS
Project ended, Mr. Abbott founded one of the 1st consulting
companies to offer its clients IT Security reviews, Risk &
Vulnerability Assessments, and enterprise wide IT Security Planning.
He has maintained a private practice in IT Security for the past 10
years. He is the 2002 recipient of the FitzGerald Award for his
lifelong, and continuing, contributions to the field of IT Security.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.
- Ultra-Secure, Ultra-Reliable Trusted Microelectronics Development Project to Focus on Hardware First
- Purdue’s Garimella Gets U.S. Presidential Nod for National Science Board
- More News »