Fighting Cyber War: US Secure Operating Systems

Some would say that the only way to defend a system against a cyber-attack is to cut the cord that connects it to the internet. Sadly, in many cases, this is true. When you look at it, systems have several points of attack where they can be exploited. Though the human factor will always be the Achilles heel of network security, many businesses, and now even countries are focusing their attention on securing the Operating System.

Here is a look at what the United States is doing to secure their systems from cyber-attack:

The United States

Though the use of secure versions of Linux has increased, America is looking to design a secure OS from the ground up. Currently, the US has been depending on the Trusted Computing (TC) technology. TC relies on an onboard chip called the Trusted Platform Module to provide cryptographic keys to help secure the system. Microsoft, AMD, Dell, IBM and Intel all plan on using Trusted Computing in current and future products.

Microsoft currently uses The TPM Module in its Bitlocker drive security utility. Bitlocker allows entire volumes to be encrypted. TC is not without its detractors though. Many are concerned that the TPM is better equipped for digital rights management than securing the PC. Also, the secure chip has already been hacked.

TC has been widely adopted by the government. According to Wikipedia, “The U.S. Army requires that every new small PC it purchases must come with a Trusted Platform Module (TPM). As of July 3, 2007, so does virtually the entire United States Department of Defense.” I think it interesting to note that our military is relying on the TPM, even though the circuit board is clearly marked “Made in China” in the photo above.

America is not depending on current operating systems to be the secure platform of the future. Microsoft is working on the new Next-Generation Secure Computing Base (NGSCB). Previously called “Palladium”, this future version of Windows will rely on the TPM to provide a secure OS. This project may be stalled as according to Wikipedia, no new information has been released on NGSCB since 2004. Even if Microsoft does come out with a secure OS, one would have to wonder how they will handle compatibility issues that have always been a thorn in Microsoft’s side.

Most promising, the University of Illinois recently received a $1.15 Million Dollar grant to develop “Ethos”. This operating system is being built with security in mind from the ground up. It will run on the XEN Hypervisor virtual machine platform, driving home the importance of isolation.

Building a secure OS platform will go a long way in protecting our nation from cyber attacks.


5 thoughts on “Fighting Cyber War: US Secure Operating Systems”

  1. A badly researched article. Citing Wikipedia as a source is questionable a best. I suggest that the author talk to the Trusted Computing Group or to Intel or any other leading company in the Trusted Computing space. The NSA (National Security Agency (NSA) might be a good source too.

    By the way, this NSA sponsored exhibition is coming up soon:

    The National Security Agency invites you to attend the first NSA Trusted Computing Conference and Exposition hosted by the Trusted Computing Division of the NSA/CSS Commercial Solutions Center (NCSC), in partnership with the High Assurance Platform® (HAP) Program Office. The theme for this year’s event is Using the High Assurance Platform® to Create Security in a Connected World.

    1. I am truly honored to have a member of Trusted Computing, with your credentials, take time out of your busy schedule to comment on my blog. Thank you for your input. I do understand being upset when someone questions technology and techniques that you have a personal interest in. And I do value your opinion.

      In response to the quality of the research done, I actually use Wikipedia quite a bit. If you would have looked at the material that I quoted out of Wikipedia, it was from Microsoft, Dell and the US Army.

      It is my personal opinion that it is better to build the system with security in mind from inception, than trying to add it in later to off the shelf products.

  2. Hmmm, I would think that if a member of TC sees something written about their product that they dispute, they would at the very least give a couple examples of the inaccurate information, with corrections.

    That being said, as always, beware those who sell “hack-proof” or “totally secure” systems.

    P.S. Hey Dieterle, I turned some people from one of my classes on to your site, so you might be seeing some new pings from students.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.