Overview
WHY MODERN OPERATING SYSTEMS CAN'T STOP MALWARE AND HOW TO FIX THEMImagine a computer as a boat -- and every cyberattack as a leak.
The fact that so many leaks keep appearing shows that we never built a very sturdy boat in the first place. Despite decades of effort to make software more secure, vulnerabilities remain alarmingly common.
In Zero Day Secure, I introduce a new theory -- the Computer Operations Continuum of Power (COCOP) -- that explains how to build that sturdy boat. COCOP reveals a fundamental design flaw in modern operating systems: file access is governed by who is logged in, not which program is making the request. This flaw allows any program (including malware or a Trojan) to open, encrypt, or steal user's files.
Using COCOP, I show that only a small set of file system changes are needed to stop malware from accessing user data, without breaking existing software or workflows. These improvements can be adopted incrementally, and developers can adapt their programs with minimal effort.
Finally, Zero Day Secure explores how other long-standing security challenges can be addressed in the same way by making practical, incremental, and non-disruptive changes to computer operations. Real-world demonstrations show that the theory isn't just elegant but can fix security problem without breaking computing infrastructure.
Zero Day Secure offers a practical blueprint for making computers truly secure -- finally building a boat that doesn't leak.
The book, Zero Day Secure: A Radical Guide to Successful Computer Security [Bulk, Wholesale, Quantity] ISBN#9781968865078 in Paperback by Karen Heart may be ordered in bulk quantities. Minimum starts at 25 copies. Availability based on publisher status and quantity being ordered.
Details