The long-term prosperity of cyber-dependent society depends on digital integrity. Digital integrity is an absolute, non-negotiable requirement, without which the rules of law and order in a computer dependent society will fade and vanish. The growth of global trade also requires digital law and order. Digital integrity is the common denominator for prosperity and progress. It is the critical factor in a computer dependent life style. While digital integrity remains elusive, trade, prosperity and survival are all at stake. The digital computer must be trustworthy.
This is an engineering problem no different from others. The ultimate test for digital integrity will be the development of a global digital currency. This would …show more content…
This is true in the natural world or in cyberspace. In fact, it is the problem with cyberspace. Abstraction is the basis of computers work, so fraud and forgery are basic threats. The stored programs define the digital implementations of abstract ideas. The abstraction has value and like gold must be held safe or the use of the abstraction is worthless. Paper money cannot be traded and financial instruments that are more complex cannot exist unless the foundation currency is sound. The abstract representation must always be protected from fraud and …show more content…
They both depend upon proven, daily confidence in the system. The measure of crime on a daily basis is the ultimate test of public confidence. Financial integrity and digital integrity are directly are not simply equivalent and as cyber dependency grows they are intimately linked and mutually dependent. To have one we must also have the other. To solve the problem of cybercrime the problem of pointer fraud and forgery in computers must be resolved. Unless and until instruction can be trusted nothing is safe from unexpected digital corruption.
• Pointer fraud includes the ability to corrupt memory by constructing and using an inappropriate address in a shared static address space. The address is logically out of scope but static addressing allows this error because all static addresses are equally valid.
• Forgery is the construction of a crafted static address and passing it on as a (deliberately or accidentally) corrupt value in a digital exchange. Perhaps in API call to the operating system. The unsuspecting and naïve client is fooled causing further