Common Criteria – Information Technology Security Evaluation

Most of today’s world trade is based on information technology. From the accounting software that handles your accounts and payroll to your website, IT infrastructure and services are increasingly supporting businesses. But like all good tools, IT is limited by our understanding of it and the uses we make of it.

When looking at an information technology or IT services model and its infrastructure, it may not be surprising to find a correlation between the creation and its creator. More than that, it is a hologram of the creator. There are obvious similarities to hardware and parts of the human anatomy. There is a central processor, like the brain. Information travels through the computer via wiring similar to nerve axons. Input units such as mouse, keyboard, etc. are similar to human senses that collect information. But take it to the next level and you’ll see a maze of reflections, each mirroring the other in form and function.

In the beginning there was ENIAC, a monstrous modular computer giant that, for all its speed and mathematical prowess, couldn’t hold onto a program. It was a brain without memory. He was fed and spit out punch cards. Technology advanced to Main Frame computers with dumb terminals. These giants gave off so much heat that they had to be cooled with water. Like their counterparts in the biological world, computers have evolved to adapt to today’s climate. They are elegant, powerful and, in addition to individual applications, they are designed to share data and services. Mainframes have become servers supporting the brave new Pantheon: a heavenly convergence of power and knowledge, delivered in the blink of an eye.

We are the masters of super-intelligent minions whose amazing abilities are limited only by our own ignorance or lack of creativity. We are on the verge of capacity: “Your wish is my command.” Power of this type is best used when balanced with knowledge and wisdom.