|Enhanced Cyber Security; Control System invention, Cyber security implementation tasks
It is best to find and eliminate the cause of a problem instead of treating the symptom or trying things and hoping they fix the problem.
TELNET is said to be the first code installed on computers to enable remote takeover of a computer. Before 1983 when TELNET was
first installed, it was impossible to hack a computer.
To implement cyber security, there are four main general requirements and many specific detail requirements.
1. Remove TELNET and all subsequent code that permits remote takeover or hacking. Closing existing openings that permit code
activation when clicking on any link in an email or site.
2. Enable remote communication but not remote control. Install access security managers that take business requests then hand off
formatted dated. This enables business but blocks remote takeover hacking.
3. Establish national and international public databases that provide real documentation about all end users, applications and sites.
This enable individuals, and enterprises to control trading partner activity based on real data before enabling communication through
their access security manager.
4. Implement enhanced local and remote logon. Once the user is securely known to the local device, the remote session can be
managed by secure computer to computer access manager control making legacy remote Ids and passwords obsolete.
Those requirements and more are addressed in the ENHANCED ONLINE COMPUTER ACCESS CYBER SECURITY SYSTEM.
|MOBILE COMPUTING DEVICE CONTROL SYSTEM
People know they should not use their cell phone keyboard and display when driving. You can ask people to not
drive and use cell phone keyboard and display. You can pass laws that make it illegal to use them. Or, you can
use technology to prevent people from using the keyboard and text display. Then pass regulations to cause the technology
change. A technology based device restriction does not make it against the law to use the device. It simply disables some device
capability that should not be used under the specified conditions.
NTSB Distracted Driver regulations
I recently found that the NTSB defined requirements to address Distracted Truck Drivers and is now working on requirements for
Distracted Car Drivers. It seems that the solutions to prevent driver distraction from cell phone text entry and viewing are dependent
on technology in the vehicles. I found that the NTSB had a comment period but it is now closed. Actually, It is never be too late to
contribute valuable ideas.
There should be one common solution to address all distracted drivers using cell phones or other mobile devices regardless of
mode of transportation including trains, trucks, buses, and cars. The solution can and should be self contained in the phone so it is
not dependent on age or technology in the vehicle and will work the same way to disable driver text entry and viewing regardless of
mode of transportation.
|IBM Information Network
In 1982, IBM announced it’s commercial online service. The IBM Information Network (IBM IN), later named the IBM Global Network
(IBM GN), was the first online service provider to focus on open multi-enterprise online interconnection of networks. In just a few
years, IBM IN grew from nothing to the world leader and model for any to any online activity. By 1996 when it converted from IBM SNA
to IP, the IBM GN had grown to be the world’s largest most successful commercial online service provider.
Read more about the IBM Information Network
|2005 Cyber Security Architecture Written by the Global Network Architect.
2005 Cyber Security Architecture Read more
|Internet TImeline 1949 to 1996
Sage, initiated in 1949, the first computer network.
SABRE, Initiated in 1953, the first online order and the first online order application.
IBM Information Network, the first network designed and implemented to interconnect all
networks for any to any.
The popular descriptions of the history of the Internet are basically correct as far they go. They describe a
DARPA and ARPANET centric path to the Internet. They do not include the first computer network which was
initiated in 1949 or the first online order application which was initiated in 1953. The first file transfer was on
SAGE which was running years before ARPANET was first imagined. The first online order application was
running before the ARPANET was imagined. There are many things that are left out of the popular description
of the Internet history.
This effort includes some major activity about both the commercial and government paths to the Internet from
1949 to 1996.
|What Is The Internet?
The popular definition vs the official government definition.
It is a commercial interconnected shared data networks based on a business model that has two main architectural design
- Any user on any network can communicate with any other user on any other network when authorized, and
- Anything that can be recorded electronically can be delivered electronically.
The user community depends on the two business model principles to be met by the commercial service providers regardless
of the underlying delivery technology.
On October 24, 1995, the FNC (Federal Networking Council) unanimously passed a resolution defining the
term Internet. This definition was developed in consultation with members of the Internet and intellectual
property rights communities.
"The Federal Networking Council (FNC) agrees that the following language reflects our definition of the term
"Internet" refers to the global information system that --
(i) is logically linked together by a globally unique address space based on the Internet Protocol (IP) or its
(ii) is able to support communications using the Transmission Control Protocol/Internet Protocol (TCP/IP) suite
or its subsequent extensions/follow-ons, and/or other IP-compatible protocols; and
(iii) provides, uses or makes accessible, either publicly or privately, high level services layered on the
communications and related infrastructure described herein."
In short, the generic Internet used IP at the time but IP is not required. Before IP and after IP any network that
meets the remainder of the generic definition is Internet.