Schneier on Economic Insights to IT Security 58
Scyld_Scefing writes "In his June 29, 2006 Wired News article, 'It's the Economy, Stupid,' Bruce Schneier covers the content of the 2006 Workshop on the Economics of Information Security. Schneier says that economic analysis of IT security issues is relatively new, and links to one of the significant earlier papers from 1991, 'Why Information Security Is Hard -- An Economic Perspective' (.pdf). This article states: 'According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and better tools for system evaluation and assurance, the problems can be solved. In this note, I put forward a contrary view: information insecurity is at least as much due to perverse incentives. Many of the problems can be explained more clearly and convincingly using the language of microeconomics: network externalities, asymmetric information, moral hazard, adverse selection, liability dumping and the tragedy of the commons.'"
can't prove a negative (Score:5, Insightful)
One of the hardest things about security is knowing you really have security. It's kind of like knowing your software doesn't have a bug. It's easy to know when you do have a bug, it's virtually impossible to know you don't.
I think security suffers the same or similar perception, rightly so. So, no matter how much you invest, how strict your policies, you really never know you have security. Couple that with how expensive it is to apply and enforce the more draconian policies... who wants to spend a fortune and find out they've been compromised anyway?
And, extreme security makes computing far less transparent, often to the exclusion of any reasonable work flow for day to day tasks. If security could be transparent (not sure it can), that would help.... no business likes fielding support issues for an entire corporation just because their network is PKI (ever administrate Sun's version?).
(I once worked at a place that had a thirteen-rule requirement for setting new passwords... it was so intrusive, I kept a printout of the rules on my monitor to try and avoid a twenty-minute guessing game session for setting new passwords. What was really funny was at one point the "rules" conflicted with one of our systems, so you couldn't define a qualified password that the system could use. Hilarious.)
On top of all of that, no matter how diligent you've been, one disgruntled (ex-)employee is all it takes with a modicum of social engineering savvy and you find the investment for naught. It's no wonder security is a tough nut to crack.
(As an aside opinion... I think the press gives too much attention to things like the recently stolen laptop with all of the info on it -- it was a stolen laptop, probably nothing more -- they get stolen all of the time, and people have no idea what they've gotten other than a "free" computer.)
Re:can't prove a negative (Score:5, Interesting)
Re:can't prove a negative (Score:4, Interesting)
Just because a security policy is retarded is no reason to justify ignoring it. I don't care if the password policy is that you must dance a particular sequence on a DDR pad for access, if that's the security policy, you follow it until a better policy can be put in place.
Re:can't prove a negative (Score:3, Insightful)
Re:can't prove a negative (Score:2)
For those of you that remember that particular line of Ma Bell ads.
Re:can't prove a negative (Score:1)
That sounds like a good reason to me! You should follow rules that serve practical and ethical purposes, but you are morally obligated to circumvent the useless cock snot coughed out by some process consultants.
Re:can't prove a negative (Score:2)
By that logic I should be able to plant a dozen pot plants in my back yard and drag my idiot Governor from his car and beat him with a lead pipe. You can't pick which rules to follow and which ones not to. If the rule is bad, change the rule. If everyone chooses to ignore security policy you may as well not have one. ANY security p
Re:can't prove a negative (Score:2)
Re:can't prove a negative (Score:2)
Re:can't prove a negative (Score:2)
If federal auditors discovered this the real penalty to management would be that they would rip their systems apart and do a *real* audit from top t
Re:can't prove a negative (Score:2)
Re:can't prove a negative (Score:1)
You can, and do. In your hypothetical example (violent assault of a public official), you made the wrong choice because you hurt another person and cheated the democratic process, not because you violated any law. (The law, in this case, exists so that we have a fair process for figuring out how to convict, jail, and execute you.)
Rules serve to protect the more intangible exchanges of human nature. To make things fairer. To gain efficencies by s
Re:can't prove a negative (Score:2)
We're not talking about ethics or morals here. We're talking about computer security. Security policy must be enforced at all times; if it isn't, and people are allowed to get away with breaking it, when the rule IS changed to not suck so much, people still won't follow it.
Re:can't prove a negative (Score:2)
Well, that depends... I've seen cases where the employes definately should have followed the policy even though it seemed retarded to them, but I've also seen instances where the business would come to a screeching halt if the policies were actually followed. I think it's part of the blame distribution process - when shit hits the fan senior management can point to the security regs and say this is against protocol, isolated inci
Re:can't prove a negative (Score:2)
Yes, indeed, because neither upper management nor the Arthur-Anderson hacks were required to use them, and both of those groups were well-enough paid that they should have had some inkling that this was a bad idea.
I guess hiring an accounting firm to perform a security audit wasn't all that bright either, now that I think of it.
That's why you take the scientific approach. (Score:5, Insightful)
As Bruce says, when there isn't an economic incentive, that process is not maintained.
But, suppose you are maintaining it. How do you know how good your security is?
Bruce also wrote about "attack trees".
http://www.schneier.com/paper-attacktrees-ddj-ft.
Identifying and evaluating the different avenues of attack is part of evaluating the threats. Once you've identified one, don't think about how you can "prove" it is "secure". Think about how you would go about showing that it is NOT secure. Make your statements about your security "falsifiable". Just like in the scientific method.
Then experiment, on an on-going-basis, to see if you can demonstrate that your security can be broken. This takes time and effort on your part as you have to continually read about the latest advances and theories.
Which gets back to the economic issue. If the organization does not see an economic incentive for you to perform that research/work, then you will be assigned to other tasks and the process will not be followed. If you are not following the process, there is no "security".
Re:can't prove a negative (Score:3, Informative)
Since this is about security, a bit of nitpicking is in order.
There are at least two meanings.
It's easy to know when you do have a bug. You do. Just no idea what, where, how, etc. You can even use statistics to draw confidence intervals on the number and severity of the bugs.
It's easy to know when you do have a bug. Assuming that if you have a bug you'd know it. This one is false, very false. It is quite possible for a bug to exist and to not be demonstrable under an
Re:can't prove a negative (Score:2)
Example: RC4. The keystream was supposedly indistinguishable from random data. People believed this for the good part of a decade, but they were wrong.
There's also that ssh1 key parsing bug that was found a few years ago.
Re:can't prove a negative (Score:2)
Methinks the reality is that losing transparency means losing security.
(I once worked at a place that had a thirteen-rule requirement for setting new passwords... it was
Legal Insights to IT Security (Score:2, Insightful)
Re: (Score:2)
Still too limited (Score:4, Interesting)
Making security usable is another implementation issue. Everyone wanted airplanes to land safely, especially the pilots who were inside them, but there was one crash after another due to "pilot error" until the aerospace world began laying out controls and instruments to meet the needs of the pilots who used them.
True, incentives do come first. But even then they need to be carefully chosen. Bad publicity and the threat of job loss didn't make the VA careful: instead those incentives fueled a search for scapegoats, a search which ended with the analyst who had written permission issued on three occasions to take the data home with him.
Re:Still too limited (Score:2)
Re:Still too limited (Score:2)
It's kind of like telling a police officer, "OK guard this prisoner, but you can't watch h
Re:Still too limited (Score:2)
THERE'S your problem.
The end users have the final say on security. Really.
It's like the bit about physical security.
Security is not about the hardest way in (IT and management controlled) but the easiest way in (user controlled).
Now it is completely feasible for management and IT to delude each other about the state of security. I assume that is the normal state of affairs.
If stuff in an office needs to
Re:Still too limited (Score:2)
Re:Still too limited (Score:2)
Hmmm.
senior partner who is bringin in the big bucks
computer
Basic security. You don't risk valuable resources (senior partner) to preserve cheap resources (computer).
'The Economics of Information Technology' (Score:2, Insightful)
Cheapest place a quick froogle revealed. I read this book a few months ago and found it pretty interesting, though perhaps best in its role as summarising further papers for reading.
Economics is Everywhere (Score:4, Insightful)
Re:Economics is Everywhere (Score:3, Interesting)
My macro class was pretty dry and boring, which was what I and everyone else there (including the professor) seemed to expect.
My micro class on the other hand was taught by an incredible man who had an absolutely infectious passion for the material. I was converted from day on
Economics is fascinating (Score:3, Interesting)
Take for example the debt based money system we have now. The government has the ability print money (well, borrow) as it likes. Well when you have that power, it's pretty damned difficult not to use it. After all, raising taxes is about as popular as a fart in a lift and all politicians want to be re-elected. So borrow some money from the central bank to pay for your pet oil liberation project. This has a number of implications:
1: We've increased the amount of money
Re:Economics is fascinating (Score:2)
The effect on debtors and creditors should far outweigh the effect on holders of currency. If you loaned money to someone to buy a house, inflation is very bad for you and very good for the person to whom you lent money.
Re:Economics is fascinating (Score:2)
"Economic expansion does not require the exploitation of resources. If exploitation of resources wa
Re:Economics is fascinating (Score:2)
No, inflation is very good for any debtor. If you owe $1000 at 5%, and inflation is 10%, then the debtor actually makes money in the transaction. Even ARM (adjustable rate mortgages) are typically fixed for years, and even when they do adjust they are not likely to change more than inflation. And that's only talking about mortgages, there are many other types of loa
Re:Economics is fascinating (Score:2)
Um, not here in the UK, most mortgages are variable rate. i.e. Set at the central bank base interest rate plus a couple of percent. The central bank increases/decrea
Re:Economics is fascinating (Score:2)
I think I see what you're getting at, but could you please provide a source? I am not trying to disagree, but I am not entirely convinced and I would be interested to read a more thorough explanation.
Re:Economics is fascinating (Score:2)
Not true. It depends on how rich you are. Let me illustrate:
Let's say I make $1000 per month, constantly, and need to spend $600 for rent, food, etc. I have a monthly obligation to the bank of $300. Inflation hits. I still have to pay the $300, while my daily life gets more expensive because of the inflation. For most of the working population, that will probably
Re:Economics is fascinating (Score:2)
In your example, your salary is declining, because the value in dollars is constant while the value of a dollar is declining (inflation). Generally, as your skills and experience increase, your salary will follow. A person's salary will decrease if the market value of their job decreases, or if it was higher than market value to begin with (for instance, in the case of minimum wage).
But yes, "the rich" or middle class sometimes benefit (in the shor
Re:Economics is fascinating (Score:2)
Not at all. Actually virtually everyone I talk to these days is complaining about the decline in salaries. Taxes go up significantly for years now (at least here in Germany, YMMV), salary rises are mostly unheard of, and those that get into the media are in the 1-3% area, by far not enough to outwe
Re:Economics is fascinating (Score:2)
I don't know much about the German economy (I have a friend that moved there a few years ago, but he doesn't talk much about the economy), but the US economy is actually doing quite well. We had a recession (technically, it wasn't even a recession according to the definition, but it's generally recognized as a recession). Now the recession is over and we are recovering (not that it was very bad anyway).
To me, the problems in
This paper is a direct analogy to Sex Ed class... (Score:2, Funny)
Insurance risk (Score:5, Interesting)
Comment removed (Score:5, Interesting)
Put the liability in the right place (Score:5, Insightful)
Let's face it: if your corporate network can't stand up to some high-school kid in his basement, it certainly isn't going to stand up to a well-funded foriegn power trying to attack us.
Anderson's paper is from 2001, not 1991 (Score:2)
Re:Anderson's paper is from 2001, not 1991 (Score:2)
Other than specific references to Windows 2000, seems relevant regardless of epoch.
[4] RJ Anderson, "Why Cryptosystems Fail"
in Communications of the ACM vol 37 no 11
(November 1994) pp 32-40
[1] GA Akerlof, "The Market for 'Lemons': Qual-
ity Uncertainty and Market Mechanism,"
Quarterly Journal of Economics v 84
(August 1970) pp 488-500
From the paper,
Re:Anderson's paper is from 2001, not 1991 (Score:2)
How do you put a cost on what doesn't happen? (Score:2)
With security, the only measure is imagining the cost of outages and security breaks, maybe for other companies if you're good enough or lucky enough to prevent them. Otherwise, the bean counters will only look at what you want to sp
Re:I respect Bruce but he misses a KEY point (Score:2)
In a nutshell, companies are incented to provide weak security, because including stronger security means loss of revenues and decreased profits.
I beg to disagree with this on 2 points.
First, more secure systems tend to run more efficiently and more reliably, thus increasing the users productivity. As you will not have to deal with your order entry being down for an hour on a crash or patch. More secure systems tend to be run by more knowledgeable staff, better planning, better management and a better
Re:I respect Bruce but he misses a KEY point (Score:1)
If product vendors include effective data security in their products:
1. they have to get export approval from their own country (see below for USA to see added costs)
2. they have to get import approval from the destination country (many will reject, thus the reduced revenues)
If the company is based in USA:
1. they cannot sell the software to anyone who appears on the Denied Persons Lists provided by the U.S
Next econ & security workshop is in October (Score:1)
The next workshop on economics & info security will be held in October. So if you have strongly held views in this area (and who on slashdot lacks strongly held views), then think about submitting. You don't have to be an academic to submit a paper, although arguments should be carefully constructed and well organized.
The Workshop on the Economics of Securing the Information Infrastructure (WESII) [econinfosec.org]
Suggested topics (not in
A presentation by Ross Anderson (Score:1)
http://www.ja.net/services/events/networkshop/Net