Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

alarm system coupled with bars on all openings. Thus, we see that security is not an absolute. This observation applies to computer systems as well, and it is the basis of Common Criteria. What Common Criteria seeks to accomplish, much like ISO 9000, is the provision of means for asserting which levels of security are needed, and then to make sure that the proper processes are followed to achieve them. This allows the establishment of trust in the assertion that security is present where we need and thus want it. Certification will provide this trust by making sure that what is promised is actually done.

We’ve alluded to the derivation of trust from an understanding of causality. If however, one is not intimately conversant with the intricacies of a specific causal relationship, either in construction or process, then how can we derive trust from it? Well, a variation on the theme of standards provides us a useful approach, that of the establishment of certification organizations. Such bodies are common in the area of computer system quality and security. Certification organizations typically allow the establishment of a level of trust, using much the same definition for trust that we have discussed previously. Remember that our working definition for trust is an expectation (of an outcome) with some degree of assurance. A certification standard is aimed at quantifying the degree of assurance.

Certification organizations are independent companies or government agencies whose function is to gather information regarding the processes addressed by the quality and security practices under certification. Typically, after studying the information provided, certification companies or agencies perform an audit based on a comprehensive questionnaire accompanied by set and random interviews. Almost invariably, they find deviations in the execution of the processes defined, and their job is to classify those deviations, essentially as minor or major exceptions. Typically, minor exceptions may be pardoned until the next audit but major exceptions need to be fixed for the certificate to be issued.

The whole concept of certification is thus grounded in trust conveyance through a third party in which a known level of trust is imbued by various parties. The manner in which trust is established within this third party is actually a topic of the next chapter; it involves trust derived from a well known process. So, for the moment we’ll simply assume the existence of a defined level of trust and then we’ll consider in the next chapter how this is established. As we’ve seen, the compliance standards and their associated certifications are generally about processes. They are often not actually about the content being investigated. A set level of trust is imbued in the processes, which provides an understood guarantee that whatever the intent of the authors of an artifact was, they implemented the artifact in a way that is traceable in quality, putting in place security measures that are precisely defined. What this doesn’t do is measure the adequacy of the artifact to the task that they are expected to perform, this being a matter of content, which we will now turn to.

Let’s come back to our house example, where we will decide that our doors and windows shall always be closed while we are away. If we document that fact by following quality and security standards and that we subsequently obtain certification that we are indeed following the practices we have defined, then we should be quite sure that the proper security is in place, shouldn’t we? Actually, the only thing we can trust so far is that the security mechanisms we have put in place are indeed functioning. For example, if our process is that before leaving the house we walk through it to make sure that all openings are closed and that we do this without exception each time we prepare to leave the house, then at best our certification company can measure our conformance to this process. When our process is checked, then we can have some level of confidence in our making sure that the security we’re seeking is in place. Of course, what happens

226

7 In His Own Image

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)