Information Security – Where Computer Science, Economics and Psychology Meet Ross Anderson Cambridge University.

Slides:



Advertisements
Similar presentations
Market Dominance “Dominant firms: Impact on consumers and producers plus issues of control and regulation”
Advertisements

Vista, TC and Competition Policy Ross Anderson Cambridge University and Foundation for Information Policy Research.
Competition and ‘Trusted Computing’ Ross Anderson Cambridge University and Foundation for Information Policy Research.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Omicron Consulting 1700 Market Street Philadelphia, PA Omicron Consulting 1700 Market Street Philadelphia, PA Should You Upgrade to Windows.
Web App Security – The Good, the Bad and the Ugly Ross Anderson Cambridge University.
© 2009 Pearson Education Canada 20/1 Chapter 20 Asymmetric Information and Market Behaviour.
Information Security Economics – and Beyond Ross Anderson Tyler Moore Cambridge University.
Software Diversity for Information Security Gaurav Kataria Carnegie Mellon University.
Social Media Intro to Business & Marketing. The most three most trusted forms of advertising are: Recommendations from people I know - 90% Consumer opinions.
The Economics of Information. Risk a situation in which there is a probability that an event will occur. People tend to prefer greater certainty and less.
The Economics of Information Security: A Survey and Open Questions Ross Anderson, Tyler Moore Cambridge University.
Security Economics Ross Anderson Cambridge University.
Security Economics Ross Anderson Cambridge University.
The Economics and Psychology of Security Ross Anderson Cambridge University.
Information Security Economics – and Beyond Ross Anderson Cambridge University.
Economics of Dependability and Security Economics of Dependability and Security Ross Anderson Cambridge University.
The Economics of Information Security Ross Anderson Cambridge University.
13. The Economics of Information and Uncertainty Risk aversion Asymmetric information (pages ) Risk aversion Asymmetric information (pages )
Information Society – Future Prospects Ross Anderson Cambridge University and Foundation for Information Policy Research.
An Economic Perspective on Security Ross Anderson Cambridge University.
System Security for Cyborgs Ross Anderson Cambridge.
Towards a Science of Security and Human Behaviour Ross Anderson Cambridge University.
Security Economics Ross Anderson Cambridge University.
2009 SCADA Security Scientific Symposium The Economics of Control System Security Ross Anderson Cambridge University.
The Topology of Covert Conflict Shishir Nagaraja, Ross Anderson Cambridge University.
Economics, Policy and Information Security Economics, Policy and Information Security Ross Anderson Cambridge University.
YOUR INTERNET EXPERIENCE
Security Engineering Security Computer Science Tripos part 2 Ross Anderson.
1 of 38 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall · Microeconomics · R. Glenn Hubbard, Anthony Patrick O’Brien, 3e. Chapter.
Security Economics and Public Policy Ross Anderson Cambridge University.
The Security State Ross Anderson Cambridge University.
The Economics of Security and Privacy Ross Anderson Cambridge University.
INTRODUCTION TO CLOUD COMPUTING Cs 595 Lecture 5 2/11/2015.
 Norton Antivirus, developed and distributed by Symantec Corporation, provides malware prevention and removal during a subscription period. It uses signatures.
Industrial Economics Fall INFORMATION Basic economic theories: Full (perfect) information In reality, information is limited. Consumers do not know.
By: Aaron Gustafson Owner Computers N’ Stuff.  Facebook is FREE!!!  Youtube is FREE!!!  Twitter is FREE!!!  Google Plus is FREE!!!  Website hosting.
GETTING WEB READY Introduction to Web Hosting. Table of Contents + Websites: The face of your business …………………………………………………………………………1 + Get your website.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
The Social Effect of Information System
Research Problems in Information Assurance Talk for the second year DPS students Li-Chiou Chen Seidenberg School of Computer Science and Information Systems.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
08 Network Effects 5 Aaron Schiff ECON Reading: Cabral, Ch 17.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Agenda Last class: Computer Hardware Today: –Typing for 10 minutes –Computer Software –Journal 2 homework.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Strictly Business North County Meetup Courtesy of Off the Rock Media and WeTubeU June 29, 2011.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Market research for a start-up. LEARNING OUTCOMES By the end of this lesson I will be able to: –Define and explain market research –Distinguish between.
Parental controls 101. What are they? Tools to help parents regulate their children’s internet use. You can set them: At network level. On your child’s.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
By Brad kattler. Which is better The Answer They are both the same.
Recession Reversal 5 Marketing Marvels That Will Have You Thriving... While Your Competition Wonders What Happened...
Society & Computers PowerPoint
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Over the past 40 years, IT has influenced and really changed the way we live out lives. It’s fair to say that we love our gadgets; with most of us owning.
Don’t Leave Your Money on the Table Your Guide to Paid Search Advertising Ron Adelman WSI Internet Marketing Consultant.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
The Case against Microsoft. © 2004 Pearson Addison-Wesley. All rights reserved12-2.
Economics of IT & Information Security
Securing Information Systems
Richard Purcell Corporate Privacy Officer Microsoft Corporation
Information Security Economics – and Beyond
24/7/365 Remote Computer Support
Towards a Science of Security and Human Behaviour
LO2 – Understand Computer Software
Economics and computer security
Presentation transcript:

Information Security – Where Computer Science, Economics and Psychology Meet Ross Anderson Cambridge University

Edinburgh September 10th 2008 Traditional View of Infosec People used to think that the Internet was insecure because of lack of features – crypto, authentication, filtering People used to think that the Internet was insecure because of lack of features – crypto, authentication, filtering So we all worked on providing better, cheaper security features – AES, PKI, firewalls … So we all worked on providing better, cheaper security features – AES, PKI, firewalls … About 1999, some of us started to realize that this is not enough About 1999, some of us started to realize that this is not enough

Edinburgh September 10th 2008 Economics and Security Since 2000, we have started to apply economic analysis to IT security and dependability Since 2000, we have started to apply economic analysis to IT security and dependability It often explains failure better! It often explains failure better! Electronic banking: UK banks were less liable for fraud, so ended up suffering more internal fraud and more errors Electronic banking: UK banks were less liable for fraud, so ended up suffering more internal fraud and more errors Distributed denial of service: viruses now don’t attack the infected machine so much as use it to attack others Distributed denial of service: viruses now don’t attack the infected machine so much as use it to attack others Why is Microsoft software so insecure, despite market dominance? Why is Microsoft software so insecure, despite market dominance?

Edinburgh September 10th 2008 New View of Infosec Systems are often insecure because the people who guard them, or who could fix them, have insufficient incentives Systems are often insecure because the people who guard them, or who could fix them, have insufficient incentives Bank customers suffer when poorly-designed bank systems make fraud and phishing easier Bank customers suffer when poorly-designed bank systems make fraud and phishing easier Casino websites suffer when infected PCs run DDoS attacks on them Casino websites suffer when infected PCs run DDoS attacks on them Insecurity is often what economists call an ‘externality’ – a side-effect, like environmental pollution Insecurity is often what economists call an ‘externality’ – a side-effect, like environmental pollution

Edinburgh September 10th 2008 New Uses of Infosec Xerox started using authentication in ink cartridges to tie them to the printer – and its competitors soon followed Xerox started using authentication in ink cartridges to tie them to the printer – and its competitors soon followed Carmakers make ‘chipping’ harder, and plan to authenticate major components Carmakers make ‘chipping’ harder, and plan to authenticate major components DRM: Apple grabs control of music download, MS accused of making a play to control distribution of HD video content DRM: Apple grabs control of music download, MS accused of making a play to control distribution of HD video content

Edinburgh September 10th 2008 IT Economics (1) The first distinguishing characteristic of many IT product and service markets is network effects The first distinguishing characteristic of many IT product and service markets is network effects Metcalfe’s law – the value of a network is the square of the number of users Metcalfe’s law – the value of a network is the square of the number of users Real networks – phones, fax, Real networks – phones, fax, Virtual networks – PC architecture versus MAC, or Symbian versus WinCE Virtual networks – PC architecture versus MAC, or Symbian versus WinCE Network effects tend to lead to dominant firm markets where the winner takes all Network effects tend to lead to dominant firm markets where the winner takes all

Edinburgh September 10th 2008 IT Economics (2) Second common feature of IT product and service markets is high fixed costs and low marginal costs Second common feature of IT product and service markets is high fixed costs and low marginal costs Competition can drive down prices to marginal cost of production Competition can drive down prices to marginal cost of production This can make it hard to recover capital investment, unless stopped by patent, brand, compatibility … This can make it hard to recover capital investment, unless stopped by patent, brand, compatibility … These effects can also lead to dominant-firm market structures These effects can also lead to dominant-firm market structures

Edinburgh September 10th 2008 IT Economics (3) Third common feature of IT markets is that switching from one product or service to another is expensive Third common feature of IT markets is that switching from one product or service to another is expensive E.g. switching from Windows to Linux means retraining staff, rewriting apps E.g. switching from Windows to Linux means retraining staff, rewriting apps Shapiro-Varian theorem: the net present value of a software company is the total switching costs Shapiro-Varian theorem: the net present value of a software company is the total switching costs So major effort goes into managing switching costs – once you have $3000 worth of songs on a $300 iPod, you’re locked into iPods So major effort goes into managing switching costs – once you have $3000 worth of songs on a $300 iPod, you’re locked into iPods

Edinburgh September 10th 2008 IT Economics and Security High fixed/low marginal costs, network effects and switching costs all tend to lead to dominant- firm markets with big first-mover advantage High fixed/low marginal costs, network effects and switching costs all tend to lead to dominant- firm markets with big first-mover advantage So time-to-market is critical So time-to-market is critical Microsoft philosophy of ‘we’ll ship it Tuesday and get it right by version 3’ is not perverse behaviour by Bill Gates but quite rational Microsoft philosophy of ‘we’ll ship it Tuesday and get it right by version 3’ is not perverse behaviour by Bill Gates but quite rational Whichever company had won in the PC OS business would have done the same Whichever company had won in the PC OS business would have done the same

Edinburgh September 10th 2008 IT Economics and Security (2) When building a network monopoly, you must appeal to vendors of complementary products When building a network monopoly, you must appeal to vendors of complementary products That’s application software developers in the case of PC versus Apple, or now of Symbian versus Linux/Windows/J2EE/Palm That’s application software developers in the case of PC versus Apple, or now of Symbian versus Linux/Windows/J2EE/Palm Lack of security in earlier versions of Windows made it easier to develop applications Lack of security in earlier versions of Windows made it easier to develop applications So did the choice of security technologies that dump costs on the user (SSL, not SET) So did the choice of security technologies that dump costs on the user (SSL, not SET) Once you’ve a monopoly, lock it all down! Once you’ve a monopoly, lock it all down!

Edinburgh September 10th 2008 Why are so many security products ineffective? Akerlof’s Nobel-prizewinning paper, ‘The Market for Lemons’ introduced asymmetric information Akerlof’s Nobel-prizewinning paper, ‘The Market for Lemons’ introduced asymmetric information Suppose a town has 100 used cars for sale: 50 good ones worth $2000 and 50 lemons worth $1000 Suppose a town has 100 used cars for sale: 50 good ones worth $2000 and 50 lemons worth $1000 What is the equilibrium price of used cars? What is the equilibrium price of used cars? If $1500, no good cars will be offered for sale … If $1500, no good cars will be offered for sale … Started the study of asymmetric information Started the study of asymmetric information Security products are often a ‘lemons market’ Security products are often a ‘lemons market’

Edinburgh September 10th 2008 Products worse then useless Adverse selection and moral hazard matter (why do Volvo drivers have more accidents?) Adverse selection and moral hazard matter (why do Volvo drivers have more accidents?) Application to trust: Ben Edelman, ‘Adverse selection on online trust certifications’ (WEIS 06) Application to trust: Ben Edelman, ‘Adverse selection on online trust certifications’ (WEIS 06) Websites with a TRUSTe certification are more than twice as likely to be malicious Websites with a TRUSTe certification are more than twice as likely to be malicious The top Google ad is about twice as likely as the top free search result to be malicious (other search engines worse …) The top Google ad is about twice as likely as the top free search result to be malicious (other search engines worse …) Conclusion: ‘Don’t click on ads’ Conclusion: ‘Don’t click on ads’

Edinburgh September 10th 2008 Privacy Most people say they value privacy, but act otherwise. Most privacy ventures failed Most people say they value privacy, but act otherwise. Most privacy ventures failed Why is there this privacy gap? Why is there this privacy gap? Odlyzko – technology makes price discrimination both easier and more attractive Odlyzko – technology makes price discrimination both easier and more attractive Acquisti – people care about privacy when buying clothes, but not cameras (phone viruses worse for image than PC viruses?) Acquisti – people care about privacy when buying clothes, but not cameras (phone viruses worse for image than PC viruses?) Loewenstein – is there actually such a beast as stable privacy preferences? Loewenstein – is there actually such a beast as stable privacy preferences?

Edinburgh September 10th 2008 Conflict theory Does the defence of a country or a system depend on the least effort, on the best effort, or on the sum of efforts? Does the defence of a country or a system depend on the least effort, on the best effort, or on the sum of efforts? The last is optimal; the first is really awful The last is optimal; the first is really awful Software is a mix: it depends on the worst effort of the least careful programmer, the best effort of the security architect, and the sum of efforts of the testers Software is a mix: it depends on the worst effort of the least careful programmer, the best effort of the security architect, and the sum of efforts of the testers Moral: hire fewer better programmers, more testers, top architects Moral: hire fewer better programmers, more testers, top architects

Edinburgh September 10th 2008 Open versus Closed? Are open-source systems more dependable? It’s easier for the attackers to find vulnerabilities, but also easier for the defenders to find and fix them Are open-source systems more dependable? It’s easier for the attackers to find vulnerabilities, but also easier for the defenders to find and fix them Theorem: openness helps both equally if bugs are random and standard dependability model assumptions apply Theorem: openness helps both equally if bugs are random and standard dependability model assumptions apply Statistics: bugs are correlated in a number of real systems (‘Milk or Wine?’) Statistics: bugs are correlated in a number of real systems (‘Milk or Wine?’) Trade-off: the gains from this, versus the risks to systems whose owners don’t patch Trade-off: the gains from this, versus the risks to systems whose owners don’t patch

Edinburgh September 10th 2008 Security metrics Insurance markets – can be dysfunctional because of correlated risk Insurance markets – can be dysfunctional because of correlated risk Vulnerability markets – in theory can elicit information about cost of attack Vulnerability markets – in theory can elicit information about cost of attack iDefense, Tipping Point, … iDefense, Tipping Point, … Further: derivatives, bug auctions, … Further: derivatives, bug auctions, … Stock markets – in theory can elicit information about costs of compromise Stock markets – in theory can elicit information about costs of compromise Stock prices drop a few percent after a breach disclosure Stock prices drop a few percent after a breach disclosure

Edinburgh September 10th 2008 How Much to Spend? How much should the average company spend on information security? How much should the average company spend on information security? Governments, vendors say: much much more than at present Governments, vendors say: much much more than at present But they’ve been saying this for 20 years! But they’ve been saying this for 20 years! Measurements of security return-on- investment suggest about 20% p.a. overall Measurements of security return-on- investment suggest about 20% p.a. overall So the total expenditure may be about right. Are there any better metrics? So the total expenditure may be about right. Are there any better metrics?

Edinburgh September 10th 2008 Skewed Incentives Why do large companies spend too much on security and small companies too little? Why do large companies spend too much on security and small companies too little? Research shows an adverse selection effect Research shows an adverse selection effect Corporate security managers tend to be risk- averse people, often from accounting / finance Corporate security managers tend to be risk- averse people, often from accounting / finance More risk-loving people may become sales or engineering staff, or small-firm entrepreneurs More risk-loving people may become sales or engineering staff, or small-firm entrepreneurs There’s also due-diligence, government regulation, insurance and agency to think of There’s also due-diligence, government regulation, insurance and agency to think of

Edinburgh September 10th 2008 Skewed Incentives (2) If you are DirNSA and have a nice new hack on XP and Vista, do you tell Bill? If you are DirNSA and have a nice new hack on XP and Vista, do you tell Bill? Tell – protect 300m Americans Tell – protect 300m Americans Don’t tell – be able to hack 400m Europeans, 1000m Chinese,… Don’t tell – be able to hack 400m Europeans, 1000m Chinese,… If the Chinese hack US systems, they keep quiet. If you hack their systems, you can brag about it to the President If the Chinese hack US systems, they keep quiet. If you hack their systems, you can brag about it to the President So offence can be favoured over defence So offence can be favoured over defence

Edinburgh September 10th 2008 Security and Policy Our ENISA report, published in March, has 15 recommendations: Our ENISA report, published in March, has 15 recommendations: Security breach disclosure law Security breach disclosure law EU-wide data on financial fraud EU-wide data on financial fraud Data on which ISPs host malware Data on which ISPs host malware Slow-takedown penalties and putback rights Slow-takedown penalties and putback rights Networked devices to be secure by default Networked devices to be secure by default … See links from my web page See links from my web page

Edinburgh September 10th 2008 Security and Sociology There’s a lot of interest in using social network models to analyse systems There’s a lot of interest in using social network models to analyse systems Barabási and Albert showed that a scale-free network could be attacked efficiently by targeting its high-order nodes Barabási and Albert showed that a scale-free network could be attacked efficiently by targeting its high-order nodes Think: rulers target Saxon landlords / Ukrainian kulaks / Tutsi schoolteachers /… Think: rulers target Saxon landlords / Ukrainian kulaks / Tutsi schoolteachers /… Can we use evolutionary game theory ideas to figure out how networks evolve? Can we use evolutionary game theory ideas to figure out how networks evolve? Idea: run many simulations between different attack / defence strategies Idea: run many simulations between different attack / defence strategies

Edinburgh September 10th 2008 Security and Sociology (2) Vertex-order attacks with: Black – normal (scale- free) replenishment Green – defenders replace high-order nodes with rings Cyan – they use cliques (c.f. system biology …) Application: traffic analysis (see my Google tech talk)

Edinburgh September 10th 2008 Psychology and Security Phishing only started in 2004, but in 2006 it cost the UK £35m and the USA perhaps $200m Phishing only started in 2004, but in 2006 it cost the UK £35m and the USA perhaps $200m Banks react to phishing by ‘blame and train’ efforts towards customers Banks react to phishing by ‘blame and train’ efforts towards customers But we know from the safety-critical world that this doesn’t work But we know from the safety-critical world that this doesn’t work We really need to know a lot more about the interaction between security and psychology We really need to know a lot more about the interaction between security and psychology

Edinburgh September 10th 2008 Psychology and Security (2) Security usability research is just taking off (3 SOUPS workshops so far) Security usability research is just taking off (3 SOUPS workshops so far) Most products don’t work well or at all! Most products don’t work well or at all! We train people to keep on clicking ‘OK’ until they can get their work done – and ‘learned helplessness’ goes much wider We train people to keep on clicking ‘OK’ until they can get their work done – and ‘learned helplessness’ goes much wider Do ystems designed by geeks for geeks also discriminate against women, the elderly and the less educated? Do ystems designed by geeks for geeks also discriminate against women, the elderly and the less educated?

Edinburgh September 10th 2008 Psychology and Security (3) Social psychology has long been relevant to us! Social psychology has long been relevant to us! Solomon Asch showed most people would deny the evidence of their eyes to conform to a group Solomon Asch showed most people would deny the evidence of their eyes to conform to a group Stanley Milgram showed that 60% of people will do downright immoral things if ordered to Stanley Milgram showed that 60% of people will do downright immoral things if ordered to Philip Zimbardo’s Stanford Prisoner Experiment showed roles and group dynamics were enough Philip Zimbardo’s Stanford Prisoner Experiment showed roles and group dynamics were enough The disturbing case of ‘Officer Scott’ The disturbing case of ‘Officer Scott’ How can systems resist abuse of authority? How can systems resist abuse of authority?

Edinburgh September 10th 2008 Psychology and Security (4) Why does terrorism work? Why does terrorism work? Mortality salience Mortality salience Heuristics and biases (Kahneman and Tversky) – availability heuristic; anchoring; loss aversion in uncertainty Heuristics and biases (Kahneman and Tversky) – availability heuristic; anchoring; loss aversion in uncertainty Also: wariness of hostile intent; violation of moral sentiments; credence given to images; reaction against out-group; sensitivity to change Also: wariness of hostile intent; violation of moral sentiments; credence given to images; reaction against out-group; sensitivity to change The good news: biases affect novel events more, and so can be largely overcome by experience The good news: biases affect novel events more, and so can be largely overcome by experience

Edinburgh September 10th 2008 Psychology and Security (5) Machiavellian brain hypothesis – apes who learned to lie, and detect deception in others, left more descendants Machiavellian brain hypothesis – apes who learned to lie, and detect deception in others, left more descendants Evolutionary psychology – based on the massive modularity hypothesis– may elucidate Evolutionary psychology – based on the massive modularity hypothesis– may elucidate Simon Baron-Cohen suggests a ‘theory of mind’ module central to empathy for others Simon Baron-Cohen suggests a ‘theory of mind’ module central to empathy for others We showed: people with high SQ–EQ are better at detecting phishing (reflects gender-HCI concern and raises discrimination issue) We showed: people with high SQ–EQ are better at detecting phishing (reflects gender-HCI concern and raises discrimination issue)

Edinburgh September 10th 2008 The Research Agenda The online world and the physical world are merging, and this will cause major dislocation for many years The online world and the physical world are merging, and this will cause major dislocation for many years Security economics gives us some of the tools we need to understand what’s going on Security economics gives us some of the tools we need to understand what’s going on Sociology gives some cool and useful stuff too Sociology gives some cool and useful stuff too And security psychology is not just usability and phishing – it might bring us fundamental insights, just as security economics has And security psychology is not just usability and phishing – it might bring us fundamental insights, just as security economics has

Edinburgh September 10th 2008 More … See for a survey article, our ENISA report, my security economics resource page, and links to: See for a survey article, our ENISA report, my security economics resource page, and links to: WEIS – Annual Workshop on Economics and Information Security WEIS – Annual Workshop on Economics and Information Security SHB – Workshop on Security and Human Behaviour SHB – Workshop on Security and Human Behaviour ‘Security Engineering – A Guide to Building Dependable Distributed Systems’ 2e– just out! ‘Security Engineering – A Guide to Building Dependable Distributed Systems’ 2e– just out!

Edinburgh September 10th 2008