Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.

Slides:



Advertisements
Similar presentations
Available & Effective charging solution for electric cars Advanced mobile charging systems.
Advertisements

Offshore Transmission Giles Stevens Head of offshore electricity transmission.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
CHAPTER 8 PRICING Study Objectives
Contracts and Communication John G. Huisman Fleissner Davis and Johnson
A helpful and intuitive guide for presenters to effectively deliver a investor targeted pitch.
Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack.
Developing a Business Case for Records Management Projects Presented by: Lauren Nathanson, CRM May 20, 2010.
Security Economics Ross Anderson Cambridge University.
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
System Security for Cyborgs Ross Anderson Cambridge.
Computer Security and Liability Roxana Hernandez-Pastrana Ryan Herring Jinghua Luo Kevin Mack Shahram Rezaei Dec. 6, 2005.
1 IS371 WEEK 8 Last and Final Assignment Application Development Alternatives to Application Development Instructor Online Evaluations.
© 2005 McGraw-Hill Ryerson Limited © 2003 The McGraw-Hill Companies, Inc. All rights reserved.
Health Informatics Series
McGraw-Hill/Irwin Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved.
Chapter Thirteen Maintaining and Upgrading a Network.
SM3121 Software Technology Mark Green School of Creative Media.
Why Cryptosystems Fail Ross Anderson Presented by Su Zhang 1.
VENDORS, CONSULTANTS AND USERS
Approaches to ---Testing Software Some of us “hope” that our software works as opposed to “ensuring” that our software works? Why? Just foolish Lazy Believe.
Joint Business Plan Madhurjya K. Dutta 1mk_dutta Sept 2010.
Norman SecureSurf Protect your users when surfing the Internet.
IBM Start Now e-commerce Solutions. Agenda  Outlook for e-commerce  Impact on companies today  Getting Started  Start Now e-commerce Solutions  Benefits.
Copyright © 2011 Pearson Education CHAPTER 9. Copyright © 2011 Pearson Education  Successful companies embrace the Internet as a mechanism for transforming.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
Chapter 1 Getting Started— Principles of Finance
08 Network Effects 5 Aaron Schiff ECON Reading: Cabral, Ch 17.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Feasibility Study.
Presentation Software as a Service Applications Software-as-a-Service Partner Enablement Program Enabling ‘Software as a Service’
Making Managed Services Easier Presenter: Greg Henderson Director, International.
CS470, A.SelcukThe Big Picture1 The Big Picture Practical, Economic, Legal Considerations CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin.
Acquiring Information Systems and Applications
III Astana Economic Forum. Ensuring Sustainable Economic Growth of Countries in Post-Crisis Period July 1-2, 2010 JSC «Kazakhstan public-private partnership.
MIS An Economic Analysis of Software Market with Risk-Sharing Contract Byung Cho Kim Pei-Yu Chen Tridas Mukhopadhyay Tepper School of Business Carnegie.
CHAPTER 13 Acquiring Information Systems and Applications.
CSCE 522 Secure Software Development Best Practices.
MKTG 476 INTRODUCTION Lars Perner, Instructor 1 Welcome to MKTG 476: Marketing, Computers, and the Internet! Review of syllabus and course structure Introduction.
Presentation made by 3D High School G.B. Bodoni.  What is it? Business Plan is a planning document that describe in detail the business project and allows.
VENDORS, CONSULTANTS AND USERS. WHY CAN’T COMPANIES DEVELOP THEIR OWN ERP PACKAGES? To develop an ERP package is a complex & time consuming activity which.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Legitimate Vulnerability Markets By: Jeff Wheeler.
Capacity Planning and Facility Location Chapter 9.
CS 5150 Software Engineering Lecture 7 Requirements 1.
Video Sales System Module 01: Secret Elements of High Converting Sales Videos.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
1.1.1 The market - syllabus Candidates should be able to: Define mass & niche markets; calculate market size & market share; assess the value of brands.
5. Planning Phase System Analysis And Design Program: BSCS II (Advent Semester – 2014) Lecturer: Rebecca Asiimwe
CS5261 Information Security CS 526 Topic 9-A Secure Software: Market Failure Market failure of secure software.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Home Appraisal Information. What is zillow.com Zillow.com is a website that gives information on estimates on the values of people homes.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
The Case against Microsoft. © 2004 Pearson Addison-Wesley. All rights reserved12-2.
Write here the title of the business plan and your name/affiliation RECOMMENDATION: THE NUMBER OF TOTAL SLIDES SHOULD BE 18. Thessaloniki, 12 September.
Security in Opened versus Closed Systems – The Dance of Boltzmann, Coase and Moore Presented By Chad Frommeyer.
REAL-WORLD COMPETITION AND TECHNOLOGY
Web Application Development
MIGRATING TO NEW TECHNOLOGY
E-COMMERCE Learning Unit 8: Electronic Commerce Strategy
Transmission Pricing & Regional Electric Markets
Strategic Uses of Information Technology
Warm Up Who is the current chairperson of the Fed?
Information Security CS 526 Topic 15a
Impact on customers and library staff of going fully self-service: the experience at Nottingham Trent University Mike Berrington, Deputy University Librarian.
Presentation transcript:

Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka

Why Information Security is Hard An Economic Perspective Ross Anderson

Introduction Common view Information security comes down to technical measures (better technical solutions) In this presentation Information security is at least as much due to tricky incentives Many of the security problems can be explained more clearly using the language of microeconomics 3

Summary Use the language of economics to describe Why Information Security is often not implemented Why Information Security is often implemented for motives other than protection 4

Simple Economics Look at all decisions and designs in terms of a Costs and Benefits To maximize returns: Do what costs least or brings biggest returns Ultimately measured in $$ 5

A Matter of Questions Economic Who When Why Where Technical What How 6

Who Suffers? Who has primary responsibility when bank fraud occurs? In US – the bank In Europe – the customer Guess which has the more effective security system 7

Who Suffers? Disincentive: The party funding the security measure is not the party suffering the consequence of a breach Why should the funding party spend a lot if no liability? Would virus protection be more effective if mail client vendors had to pay user’s costs of a virus? 8

Who Pays? Who pays for protecting a shared resource? Users want to get as much of it as they can Aren’t motivated to spend to protect it Resource manager wants to maximize use (and revenue), so he should pay Example – Network vendor should prevent DoS attacks and not expect users to pay for the protection 9

When Should Security be Added? All software engineers know – when the product is developed But what are the real costs? Time to Market Complexity 10

Economics Term: Network Externalities The change in value of a resource when the number of consumers of the resource changes Example: Metcalfe’s Law – value of a network increases as the square of the number of nodes (N 2 ) A product has more underlying value if it has more users 11

When – Time to Market The preceding implies a high value for getting to market first Dominate Low marginal costs once established Set up barriers – high switching costs Adding security features increases time to market and risks missing the window of opportunity 12

When – Time to Market Users would probably pay more if product were more secure I.e. incremental development costs are OK But lost opportunity costs are too high to vendor A disincentive to building security in from the start 13

When - Complexity Security features in OS or Network make life more difficult for developers Think of capability like record locking – necessary, but makes application more complicated Developers are a primary target for OS and Network vendors Thus arises an implicit agreement to pass security costs on to the users Not absolutely required for applications 14

Why Have Security? Economic Reasons Add security features for the benefit of the vendor, not the user Lock-in users Maximize revenue Protect on-going revenue Get market data 15

Why? – Lock-in Users Use proprietary security measures Vendor can control Can create revenue Block or hinder competition Users get familiar – harder to switch Probably reduces reliability and stability 16

Why – Maximize Revenue Use as a high price upgrade feature Incremental cost is low to nothing But can charge a lot for it Non-IT example: Airline fares IT example: Basic product vs. “Gold” version 17

Why – Protect Revenue Use security to prevent reverse engineering Use security measures to prevent add-on generic products E.g. printer cartridges 18

Why – Protect and Gather Data RFID Helps prevent theft Creates revenue (e.g. toll tags) Track inventory and shipments (IBM “you’re on the road to Fresno” ad) But Big privacy threat Can track car movements Can track people (see movie “Minority Report”) 19

Why – Get Market Data MS Passport – a good example of a bad example Purported purpose – to provide a single point of security to many Web sites But Passport tracks your surfing And shares your data And provides bad guys with a single point of attack 20

Where is the Advantage? (Economics of “War”) In security matters today, attackers have the advantage Easier to find one flaw than find and patch them all Attacker only needs one Can model investment in attack and defense Estimate bug count and investment in finding Attacker’s advantage is large Like trying to defend in Iraq Attack can come anywhere – defense must be everywhere 21

Another Who Question Who Determines Security Quality? International Standards for Security exist But like ISO 9000, they appear to be more about process than content No absolute standard Customer says what is wanted in security Vendor verifies product meets requirements Current working standard is called “Common Criteria” 22

Who Pays for Evaluation? Should be customer, but this is big expense if each customer does it Current practice is that vendor pays an evaluator This leads to shopping for “easy” evaluators An Application Vendor may actually consider an evaluated product to have less value If A.V. embeds the security product in his product and it fails, A.V. is more likely liable if security product is certified 23

Conclusion Why do IT vendors not provide great security? Economics! Create Monopoly Maximize revenue Reduce risk Economics promotes insecurity Ultimately the problem is more political than technical 24