Peter Tippett on Biomedicine and Security 81
gManZboy writes "IT security borrows some of its most basic terminology (e.g., virus) from biomedicine. It's therefore no surprise then that some of the top minds in the field have backgrounds in biomedicine. Two such figure are Peter Tippett, CTO of Cybertrust, who earned a medical degree and went on to develop what later became Norton Antivirus; and Steve Hofmeyr, who studied the marriage of biology and computation at MIT and later founded Sana Security. In this roundtable discussion, the two discuss how biomedicine informs their thinking about security and when and when not to apply the metaphor. Of particular note is their discussion of the pros and cons of using both signature and non signature-based methods of intrusion detection."
Media Frenzy (Score:2)
Leaves those of us who are english geeks frustrated with word misuse, but for the average person, it's irrelivent it seems.
Luke
----
Have a webpage that teaches computer basics [christiannerds.com] too? Contact me. Maybe we can swap links.
Re:Media Frenzy (Score:2)
It's the same with bioengineered food, nuclear energy and a lot of other things. People don't understand it, the press exploits that and professional protesters use it to justify their beliefs.
BioComputerStuff (Score:1)
Re:BioComputerStuff (Score:1)
Re:BioComputerStuff (Score:1)
Re:BioComputerStuff (Score:1)
I think that the reason for this is the huge amount of arbitrary knowledge required to be a functioning molecular biologist. You can't just cram this in over a weekend no matter how smart you are.
Re:BioComputerStuff (Score:2)
Re:INTRO (Score:1)
I think this statement might be a little overstated. The field of artificial immune systems was well established well before Hofmeyr arrived on the scene. [wikipedia.org]. In addition to what wikipedia says, one can trace its roots back to the 1960s with the likes of John Holland and genetic algorithms. (If I remember correctly, Holland was a supervisor for Stephanie Forrest, w
Re:INTRO (Score:1)
wacky ass doctors (Score:2)
Re:wacky ass doctors (Score:1)
Re:wacky ass doctors (Score:2)
take it easy
Re:wacky ass doctors (Score:1)
More than just these to in the 90's the number one (Score:2)
Re:More than just these to in the 90's the number (Score:1)
Re:More than just these to in the 90's the number (Score:1)
I know you're joking, but at this point you have devolved it to physics, not biology or even chemistry.
Re:More than just these to in the 90's the number (Score:1)
Nature and virus writers both converged on the same (only?) optimal solution.
Layering (Score:1)
After reading the interview... (Score:4, Interesting)
Otherwise, I found this a very interesting read. I've always wondered why people prefer signature-based active detection over the passive method of hashing (and checksumming) all the critical system files. I use the freeware Tiny Personal Firewall 2 (subsequent versions suck), which happens to include a feature that informs me if an application trying to connect out or listen for connections has had its MD5 changed. While it is particularly painful when a system file gets tampered with (a message pops up every time the modified executable tries to interface with the network and the messages won't stop appearing until the change is accepted), it was crucial in my finding that my Firefox executable had been modified without my knowledge.
The other thing I found interesting is the remark that the internet has lost its innocence. Back even ten years ago, so-called hackers were either kids too smart for their own good, or script kiddies wanting to impress their friends by opening CD trays. Those who exploited security holes for money were a minority. These figures have flipped over the past seven or eight years; today's equivalents are largely in it for the financial gains, with the ones feeling adventurous being in the minority now. When they were talking about worms being less prevelant these days and how it's possible we've seen the end of virii like Sasser and Code Red, I find myself wondering if the internet has left (or is in the process of leaving) its adolescence phase and has fully matured.
Re: (Score:1)
Re:computer dr (Score:1)
You think you've got problems. I was an Access developer. Bill Gates owes me a new liver.
"Biomedicine?" (Score:1)
Or is it just a way for plain ol' medicine to sound cooler and get more research grants?
Re:"Biomedicine?" (Score:1)
Biomedical research is the juncture between clinical research (say human trials of a drug) and more basic research (say an animal model of a disease). For example, a promising compound that slows tumor growth in an animal model of cancer might be applied to human cells of the same type of cancer grown in culture (as opposed to actually giving the compound to living patients.)
Re:"Biomedicine?" (Score:1)
Re:"Biomedicine?" (Score:1)
Re:Biology versus Medicine (Score:1)
Pathology is not irrelevant. For Biologists, it is sometimes as if organisms function at their prime, at all times, and that's a very theoretical and unrealistic viewpoint, that often leads to oversimpli
Re:Einstein and God (Score:1)
Re:"Biomedicine?" (Score:1)
Re:Medicine as a science (Score:1)
If you had done any readings in Mathematics as it applies to Biology, you wouldn't post such stuff.
Biology metaphors for Computers (Score:1)
In any case, there's no surprise in my mind that people chose biology analogies when confronted with novel concepts - you can always find an ana
Norton Anti-Virus (Score:1)
Re:Norton Anti-Virus (Score:2)
Re:Norton Anti-Virus (Score:2)
I don't believe Peter Tippett was working for Symantec at the time while developing his first AV software. The software was aquired by Symantec.
Guess that will sell, huh? (Score:2)
Who are these guys kidding? They're part of the problem. They make obscene ammounts of money on a diseased platform (now there's a good biological metaphor).
If they were really up to it, they'd be working on cutting-edge stuff like capabilities. [eros-os.org] Even relatively simple measures [auug.org.au] like those taken by some UNIXes have s
Re:Guess that will sell, huh? (Score:2)
I'm not saying Windows is more secure -- I'm just saying that glomming capabilities onto *any* OS (Windows, Linux, or otherwise) doesn't make it secure.
The OpenBSD exploit mitigation stuff is great -- way better than what Windows XP of
Architects, rather? (Score:1)
IT security borrows some of its most basic terminology (e.g., virus) from biomedicine. It's therefore no surprise then that some of the top minds in the field have backgrounds in biomedicine.
What? IT security also borrows some of its basic terminology from construction ("firewall"). Shouldn't these people be architects?Re:Architects, rather? (Score:1)
Re:Architects, rather? (Score:1)
Does that mean that Boyd Coddington should become an Information Security writer?
Re:Architects, rather? (Score:2)
Was he always like that or did he get tetanus from working around all that rusted metal?
Re:Architects, rather? (Score:1)
Re:Architects, rather? (Score:2)
The original "architect" quote is usually attrib
Re: Doctors != Engineers (Score:1)
That is also why the bio-analogy is total BS. Life can evolve and adapt without the help of a creator. Techical systems on the other hand are constructs that depend on someone to build and update them.
pros and cons of signature and non-sig methods (Score:2)
signature based == $$$$ from signature updates
non-signature based: Tight sandboxing around network priviledged apps, and new 'untrusted' content on the system. Behavioural monitoring, like an internal firewall - mime type priveledges - hang on '-rwxr-xr-x ana.kournivova.jpg' cannot access other executable files! It is not allowed to!
-rwxr-xr-x gimp however is allowed to
Massive crossover (Score:2)
When you are talking about sequencing DNA, you are talking about building a massive database. With an insane number of cross-connections.
The ability to DO microbiology at the level we are now able is pretty much codependant on the development of the computer technology needed to process this incredible quantity of information.
It's been said that a single human DNA s
Re:Massive crossover (Score:1)
It's been said that a single human DNA sample contains about 20 GB of data.
I work on the human genome and I've never heard anyone say that until your comment. The human genome is about 3 billion nucleotides long. You can store each nucleotide as an octet, but that's somewhat wasteful, since each nucleotide only contains two bits of information, not eight. So really, we're talking about 750 M
Re:Massive crossover (Score:2)
It's been said that a single human DNA sample contains about 20 GB of data.
I work on the human genome and I've never heard anyone say that until your comment. The human genome is about 3 billion nucleotides long. You can store each nucleotide as an octet, but that's somewhat wasteful, since each nucleotide only contains two bits of information, not eight. So really, we're talking about 750 MB of highly compressible data.
I got my "20 GB" information from a Carl Sagan book, I believe it was "The evolution of
Re:Massive crossover (Score:1)
A biological analogy that occurred to me... (Score:3, Interesting)
Introducing new predators into an existing ecosystem can increase the overall diversity as they become keystone predators. This effect is seen even if the predator doesn't preferentially hunt the former dominant species, though it can be amplified in that case. In extreme cases, the former dominant species is replaced by other species, though the former dominant species doesn't necessarily go extinct.
What does this have to do with computers? The Internet has changed significantly in the last few years. Broadband connections are fundamentally different from dialup connections. First, obviously, they are much faster. Second, they are 'always on'. As broadband has spread, a new ecological niche has opened up - that of spyware/adware.
Even if it were just malicious teenagers writing these things, they'd be a significant problem. But there's a business model now - (unethical) people can make money with this stuff. Ads, selling demographic info, redirecting referral clicks, spam, protection rackets, fraud and identity theft. Of course, these guys are preferentially hunting Windows boxes right now. They're the current dominant species, and tend to be easy to subvert.
I think spyware is going to be the keystone predator of the operating system ecology. And I think we're going to see a lot more diversity in that area in the future.
biomedically informed != engineer (Score:2)
Re:biomedically informed != engineer (Score:1)
Peter Tippett started FoundationWare... (Score:1)
This was a while ago, so I don't have exact dates but Peter Tippett founded a company named FoundationWare [securitydigest.org] around 1987-1989 nwhich made an integrity checking program called Vaccine. Vaccine was eventually renamed to Certus [victoria.tc.ca] and the company followed suit in the early 1990s, renaming itself after its flagship product.
Certus was initially an integrity checker and behavior blocker. The integrity checker calculated a CRC or hash value on files and system areas, stored them in a database and compared t