The Economics of Security and Privacy Ross Anderson Cambridge University.

Slides:



Advertisements
Similar presentations
A Model for When Disclosure Helps Security: What is Different About Computer & Network Security? Peter P. Swire Ohio State University George Mason CII.
Advertisements

Vista, TC and Competition Policy Ross Anderson Cambridge University and Foundation for Information Policy Research.
Competition and ‘Trusted Computing’ Ross Anderson Cambridge University and Foundation for Information Policy Research.
Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Chapter 5 The Free Enterprise System
1 Antitrust Rules against: 1. Monopolization. 2. Price Discrimination. 3. Predatory Pricing. 4. Tie-In Sales.
Web App Security – The Good, the Bad and the Ugly Ross Anderson Cambridge University.
Information Security Economics – and Beyond Ross Anderson Tyler Moore Cambridge University.
The Economics of Information Security: A Survey and Open Questions Ross Anderson, Tyler Moore Cambridge University.
Security Economics Ross Anderson Cambridge University.
Security Economics Ross Anderson Cambridge University.
The Economics and Psychology of Security Ross Anderson Cambridge University.
Information Security Economics – and Beyond Ross Anderson Cambridge University.
Economics of Dependability and Security Economics of Dependability and Security Ross Anderson Cambridge University.
The Economics of Information Security Ross Anderson Cambridge University.
Information Society – Future Prospects Ross Anderson Cambridge University and Foundation for Information Policy Research.
An Economic Perspective on Security Ross Anderson Cambridge University.
Towards a Science of Security and Human Behaviour Ross Anderson Cambridge University.
Security Economics Ross Anderson Cambridge University.
2009 SCADA Security Scientific Symposium The Economics of Control System Security Ross Anderson Cambridge University.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Economics, Policy and Information Security Economics, Policy and Information Security Ross Anderson Cambridge University.
YOUR INTERNET EXPERIENCE
Security Engineering Security Computer Science Tripos part 2 Ross Anderson.
Information Security – Where Computer Science, Economics and Psychology Meet Ross Anderson Cambridge University.
Security Economics and Public Policy Ross Anderson Cambridge University.
Opening a bank account.
Why Cryptosystems Fail Ross Anderson Presented by Su Zhang 1.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Industrial Economics Fall INFORMATION Basic economic theories: Full (perfect) information In reality, information is limited. Consumers do not know.
Grupo Santander Competition policy and financial market integration European Parliament Financial Services Forum Brussels – 15 June 2005.
ENTREPRENEURS IN A MARKET ECONOMY
Chapter 15 Conflicts of Interest in the Financial Industry.
Small Business Management
Electronic Payment Systems
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
Stakeholder Objectives
10 Two-sided Platforms 1 Aaron Schiff ECON
Internet Security for Small & Medium Business Week 6
Banking Security in a Digital Age Trevor LaFleche, IDC Financial Insights.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
Fundamental Characteristics of Financial Industry and Natural Evolution(I) Dr. J. D. Han.
Chapter 7 Section 1 Perfect Competition
Accounting for Executives Week 6 15/4/2010 (Fri) Lecture 6.
+ The Free Enterprise System Chapter #5. + Chapter Objectives Explain the characteristics of a free enterprise system Distinguish between price and non-price.
Consumer Choice With Uncertainty Part II: Examples Agenda: 1.The Used Car Game 2.Insurance & The Death Spiral 3.The Market for Information 4.The Price.
What is e-commerce?. What e-commerce is… Business to business (B2B) trading where companies trade and exchange information using the World Wide Web. Business.
Optimal Database Marketing Drozdenko & Drake,
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
Chapter 18 Buying a PC. 2Practical PC 5 th Edition Chapter 18 Getting Started In this Chapter, you will learn: − Where to begin − Where to find prices.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Unit 1: What is economics all ABOUT? Chapters 1-6.
Society & Computers PowerPoint
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Online Shopping: Research Paper Eimear Greene. My Objectives Why People shop online How Online retail has changed What category of product do people shop.
Chapter 17 (pgs.445FL1-471) The Economic System. Chapter 17 Section 1 (pgs ) The Economic System at Work ESSENTIAL QUESTION: WHAT ARE THE DIFFERENT.
Security in Opened versus Closed Systems – The Dance of Boltzmann, Coase and Moore Presented By Chad Frommeyer.
ELECTRONIC PAYMENT SYSTEM
Network and hardware revision
Educause/Internet 2 Computer and Network Security Task Force
3 Economic Questions Who decides… What to produce? How to produce it?
Accounting Fundamentals
Free Market systems, competition & supply and Demand concepts
Information Security Economics – and Beyond
Towards a Science of Security and Human Behaviour
Presentation transcript:

The Economics of Security and Privacy Ross Anderson Cambridge University

Background Economics and security diverged after WW2; started coming back together recently Economists started thinking about crime and policing in late 60s, about privacy in late 70s Information security economics started growing five years ago Many new ideas in last couple of years Workshop on Economics and Infosec every spring

Privacy - First Wave ‘Right to be left alone’, Brandeis 1890 Privacy violation as a tort - false light, misappropriation, intrusion (Prosser 1960) Westin, data shadow, privacy as informational self-determination Inspiration for European data protection movement

Privacy - Second Wave Becker economic analysis of crime Hirshleifer, 70s - conflict theory Stigler, free exchange of information brings Pareto improvement regardless of ownership (bad debtors pay more regardless) Posner - poor employees want to hide data, good ones to reveal it; privacy inefficient, redistributive Noam - PETs may change who pays but not what happens - they just redistribute (poor to rich) Price discrimination is efficient (albeit unpopular)

Economics of Information Security Over the last four years, we have started to apply economic analysis to information security Economic analysis often explains security failure better then technical analysis! Information security mechanisms are used increasingly to support business models rather than to manage risk Economic analysis is also vital for the public policy aspects of security

Traditional View of Infosec People used to think that the Internet was insecure because of lack of features – crypto, authentication, filtering So engineers worked on providing better, cheaper security features – AES, PKI, firewalls … About 1999, we started to realize that this is not enough

New View of Infosec Systems are often insecure because the people who could fix them have no incentive to Bank customers suffer when bank systems allow fraud; patients suffer when hospital systems break privacy; Amazon’s website suffers when infected PCs attack it Security is often what economists call an ‘externality’ – like environmental pollution Provides an excuse for government intervention

New Uses of Infosec Xerox started using authentication in ink cartridges to tie them to the printer Followed by HP, Lexmark … and Lexmark’s case against SCC, and EU Parliament Directives Motorola started authenticating mobile phone batteries to the phone BMW now has a car prototype that authenticates its major components

IT Economics (1) The first distinguishing characteristic of many IT product and service markets is network effects Metcalfe’s law – the value of a network is the square of the number of users Real networks – phones, fax, Virtual networks – PC architecture versus MAC, or Symbian versus WinCE Network effects tend to lead to dominant firm markets where the winner takes all

IT Economics (2) Second common feature of IT product and service markets is high fixed costs and low marginal costs Competition can drive down prices to marginal cost of production This can make it hard to recover capital investment, unless stopped by patent, brand, compatibility … These effects can also lead to dominant-firm market structures

IT Economics (3) Third common feature of IT markets is that switching from one product or service to another is expensive E.g. switching from Windows to Linux means retraining staff, rewriting apps Shapiro-Varian theorem: the net present value of a software company is the total switching costs This is why so much effort is starting to go into accessory control – manage the switching costs in your favour

IT Economics and Security High fixed/low marginal costs, network effects and switching costs all tend to lead to dominant- firm markets with big first-mover advantage So time-to-market is critical Microsoft philosophy of ‘we’ll ship it Tuesday and get it right by version 3’ is not perverse behaviour by Bill Gates but driven by economics Whichever company had won in the PC OS business would have done the same

IT Economics and Security 2 When building a network monopoly, it is also critical to appeal to the vendors of complementary products E.g., application software developers in the case of PC versus Apple, or now of Symbian versus CE Lack of security in earlier versions of Windows makes it easier to develop applications Similarly, motive for choice of security technologies that dump the support costs on the user (e.g. SSL, PKI, …)

Why are many security products ineffective? Akerlof’s Nobel-prizewinning paper, ‘The Market for Lemons’ provides key insight – asymmetric information Suppose a town has 100 used cars for sale: 50 good ones worth $2000 and 50 lemons worth $1000 What is the equilibrium price of used cars in this town? If $1500, no good cars will be offered for sale … Usual fix: brands (e.g. ‘Volvo certified used car’ )

Security and Liability Why did digital signatures not take off (e.g. SET protocol)? Industry thought: legal uncertainty. So EU passed electronic signature law Recent research: customers and merchants resist transfer of liability by bankers for disputed transactions Best to stick with credit cards, as any fraud is the bank’s problem Similar resistance to phone-based payment – people prefer prepayment plans because of uncertainty

Why Bill wasn’t interested in security While Microsoft was growing, the two critical factors were speed, and appeal to application developers Security markets were over-hyped and driven by artificial factors Issues like privacy and liability were more complex than they seemed The public couldn’t tell good security from bad anyway

Why is Bill changing his mind? ‘Trusted Computing’ initiative ranges from TCG and NGSCB to the IRM mechanisms in Office 2003 IRM – Information Rights Management – changes ownership of a file from the machine owner to the file creator Files are encrypted and associated with rights management information The file creator can specify that a file can only be read by Mr. X, and only till date Y What will be the effect on the typical business that uses PCs?

Why is Bill changing his mind? (2) At present, a company with 100 PCs pays maybe $500 per seat for Office Remember – value of software company = total switching costs So – cost of retraining everyone to use Linux, converting files etc is maybe $50,000 But once many of the documents can’t be converted without the creators’ permission, the switching cost is much higher Lock-in is the key!

Open or Closed? Free/open source view - easier for defenders to find and fix bugs (‘to many eyes, all bugs are shallow’) NSA view - easier for attackers to find and exploit bugs Under standard reliability growth model assumptions, openness helps attackers and defenders equally Whether open or closed is better will depend on how your system departs from the ideal

How often should we patch? Big topic at WEIS 2004, two weeks ago Rescorla: bugs independent, most exploits follow patching - so we should never disclose vulnerabilities or ship patches Arora, Telang, Xu: under different assumptions, we should cut disclosure delay Arora, Telang et al: some empirical evidence - disclosure increases attacks, patching cuts Ozment - auction theory may give some ideas

How are Incentives Skewed? If you are DirNSA and have a nice new hack on NT, do you tell Bill? Tell – protect 300m Americans Don’t tell – be able to hack 400m Europeans, 1000m Chinese,… If the Chinese hack US systems, they keep quiet. If you hack their systems, you can brag about it to the President and get more budget

Skewed Incentives (2) Within corporate sector, large companies spend too much on security - small companies too little Adverse selection effect: the most risk-averse people end up as corporate security managers More risk-loving people may be sales or engineering staff, or small business entrepreneurs Also: due-diligence effects, government regulation, insurance market issues We tolerate attacks on stuff we already know to be useful (smartphone viruses worse than PC viruses)

How Much to Spend? How much should the average company spend on information security? Governments, vendors: much much more than at present They’ve been saying this for 20 years! Security ROI may be about 20% p.a. So current expenditure maybe about right (but too little in small firms and too much in governments, big companies)

Privacy - Third Wave Varian 96 - privacy as the right not to be annoyed by direct marketers - define rights better When sending marketing pitches was expensive and evaluating them was cheap, we got too few messages and bought magazines. Now it’s the other way round and we buy spam filters Huang 98 - regulation helps construct privacy preferences by steering people to one of many equilibria, which then stick

Privacy (cont’d) - Social Level Odlyzko pressure to price-discriminate is the main threat to privacy, and technology is making it steadily worse End of bubble: privacy technology ventures had mostly failed - yet privacy costs billions, to business and consumers (Gellman 2002) Taylor 2002: if data trading covert, firms gain more; otherwise high-value customers back off Chellapa 2002: perceived security, privacy separate but correlated; it’s better for a firm to be trusted with privacy rather than just trusted

Privacy Themes - WEIS 2003 Privacy paradox - most people say they value privacy, but act otherwise May be due to myopic consumers (Syverson) Lemons market for retailers (Vila, Greenstadt, Molnar) Need a concrete solution to a clear threat (Shostack) Shoppers care about privacy when buying clothes, but not cameras! Sensitivity focuses on items relating to personal image (Acquisti, Grossklags)

Privacy (cont’d) - social level Varian / Wallenberg / Woloch, WEIS privacy as ‘do not call’ strongly correlated with income - large study with DNC records Mialon & Mialon privacy as 4th amendment rights which cut intrusion directly but increase it indirectly (more crime). Technology lowers search costs -> society moves to exterior equilibrium of Swiss or Afghan type, depending on police accountability

Privacy - mechanism level What sort of incentives will make people participate in r er / P2P networks etc? Acquisti / Dingledine / Syverson - free-rider problems in mix-nets, and options for clubs, reputation systems, preferential service etc Danezis / Anderson - discretion is better There’s now a whole workshop for P2P economics - many issues go across to privacy

Conclusions Security and privacy spending seems to be determined in complex ways by assorted market failures Firms, and governments, generally spend too much on security - they are risk-averse Too little gets spent on privacy - consumers don’t care as much To say much more, you have to be more specific about the type of security or privacy! Ultimately it’s all about power

More … Economics and Security Resource Page – (or follow link from my home page Economics of Privacy Page – privacy.htm