In our most recent issue, Scott Berinato dug up some expert opinions about how we could fix Internet security. Among the options was the concept of “disposable” computing—basically a system with two processors, one of which could be wiped clean after every secure transaction.It sounds like hardware overkill to me, but there’s another option that would work with today’s hardware—the live CD.Live CDs, such as those built on the Knoppix Linux distribution, could someday revolutionize Internet security—though perhaps at a serious cost to personal computing freedom.The idea is a bootable CD-ROM that takes users immediately to a secure, unchangeable operating environment tailored to a specific task where security is a priority. For instance, you could do what Australian firm Cybersource recently did and build a CD that booted to a banking interface. A user boots up, performs their transaction, and logs off before returning to their day-to-day work environment. It doesn’t matter if the hard drive is a seething morass of every virus, Trojan and keystroke logger available—the transaction remains secure. The concept certainly isn’t new: Knoppix has has been around for years as a platform for building Linux demo CDs, for instance. You let a potential customer play around with your product for a while on the CD, then they just shut it down, remove the CD, and get back to work without all those tiresome—and risky—uninstall procedures. It gets even more interesting—and a tad scary—when you start extrapolating. In an upcoming feature in CIO, Christopher Koch takes a look at a tool that lets companies create completely controlled development environments on CD-ROM and deliver them to offshore programming groups. When the project’s over, the CDs expire, and secure access is virtually guaranteed. (Just so you don’t think me too naive, I’m aware that if these things become popular, a legion of Linux hackers will begin probing the systems for weaknesses.) Now go a step further and imagine a world where your company, or even your Internet service provider, requires the same thing of you. If you want access, you’ll do it from the supplied CD. All data will be stored on central servers. No malware. No unsupported applications. Just uniformity and security across the board. I’m not saying I’d be happy in such a world, but I know some IT folks who would sleep a lot better at night. Related content brandpost From edge to cloud: The critical role of hardware in AI applications The rise of generative artificial intelligence By Broadcom Jun 06, 2023 5 mins Machine Learning Artificial Intelligence brandpost The new value calculator: Levers for business optimization Squeezing maximum value out of your data is not only about cost-savings—it’s time to create significant potential by transforming your competitive position. By Sandrine Ghosh Jun 06, 2023 5 mins Data Management brandpost The new wave of data observability Innovative ‘applied observability’ can detect issues and diagnose their root causes swiftly and effectively. By Sandrine Ghosh Jun 06, 2023 4 mins Data Management brandpost Let Business Needs Guide Your Winning Data Team With skill shortages continuing, IT leaders must optimize their data science team investment. Start with your organization’s key objectives. By Paul Gillin Jun 06, 2023 3 mins Business Intelligence Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe