INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. How to Think About Security (in 20 minutes) Bruce Schneier CTO, Counterpane Internet Security 5th.

Slides:



Advertisements
Similar presentations
Personal Safety Training
Advertisements

ETHICAL HACKING A LICENCE TO HACK
1 Your Life Story. 2 Everyone leaves a story By faith Abel offered to God a better sacrifice than Cain, through which he obtained the testimony that he.
1 Introduction to Software Engineering Rajkumar Buyya Grid Computing and Distributed Systems Lab Dept. of Computer Science and Software Engineering University.
1 of 19 Organization and Management New Approaches to motivating Staff IMARK Investing in Information for Development Organization and Management New Approaches.
No 1 IT Governance – how to get the right and secured IT services Bjorn Undall and Bengt E W Andersson The Swedish National Audit Office Oman
0 - 0.
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Computer Security CIS326 Dr Rachel Shipsey.
QA & QI And Accreditation.  A continuous process to review, critique, and implement measurable positive change in public health policies, programs or.
Computer Literacy BASICS
How to Schedule (and Put off Procrastinating)
Lectures 6&7: Variance Reduction Techniques
Mental Toughness Lesson Six: Mental Toughness Aim:
Earn Passive Residual Income On Autopilot!
Sales Promotion, Events, and Sponsorships
Thomas A. Stewart Literacy Test (OSSLT) Prep Guide 2013
Copyright 2007 Thomson South-Western Chapter 4 Financial Decisions and Planning.
Young Peoples' Leadership 1 Young People’s Fellowship Fellowship conference July 2006.
What people in my school and community think about the police and what they do: a small-scale study Christopher Orme age 10.
“Mom, Dad, I’m Pregnant…”
It was mid-year, I’d say around November when I would have to face the consequences of a life time. I was off on my own a lot more and having fun. More.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 5 Slide 1 Project management.
SERVICE RECOVERY At the end of this module the learning outcomes are:
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
A Collection of Precious Thoughts
Thinking Like an Economist
Smart Spending: Credit and Budgeting Glow Online Curriculum Session 2 Glow Foundation 2010.
Bringing your life together. Review Goal of this Series Developing active exhilarating faith experiencing God's intervention in our daily life. You can.
Addition 1’s to 20.
44212: Web-site Development What is a Web Presence? Ian Perry Room:C49 Extension:7287
Solving the eValue Rubik’s cube
Week 1.
Missouri Enterprise Helping Missouri Manufacturers Make More, Sell More, Earn More Missouri Manufacturer Survey: The Top Ten Things You Told Us.
Handling (and Preventing) Missing Data in RCTs ASENT March 7, 2009 Janet Wittes Statistics Collaborative.
INVESTING INTERNATIONALLY CHAPTER FIFTEEN Practical Investment Management Robert A. Strong.
Copyright © 2010 Pearson Education, Inc. Chapter 15 Probability Rules!
Testing Hypotheses About Proportions
SGTM 13: Media Relations Slide 1 SGTM 13: Media Relations.
Copyright © 2010, 2007, 2004 Pearson Education, Inc. Chapter 14 From Randomness to Probability.
Introduction to Recursion and Recursive Algorithms
Young people from Merseyside talk about gun and knife crime “The 11 MILLION children and young people in England have a voice” Children’s.
Top Ten Things Your Lawyer Knows – And You Should Too Association of California Community College Administrators Annual Conference (ACCCA) | February 26,
Are You prepared for the Consequences? How many teen girls get pregnant each year? Nearly 1,000,000 teen girls get pregnant each year. Nearly 4 out of.
Positive Attitude! Mr. Vivek Bindra Director - Global ACT
Chapter 15 Living a Balanced Life Chapter 15 Living a Balanced Life Lesson 15.1 Work Isn’t Everything! Lesson 15.1 Work Isn’t Everything!
Mental Health Week Introduction W e are here today to help you understand more about what gets you down and hopefully find a few ways to help. This.
Customers Request the Darndest Things* 10 Challenges for VUI Designers Eduardo Olvera User Interface Designer.
1 The Art of Recognition. 2 Recognition 3 Objectives of the Seminar Concept of Recognition Benefits How to recognize others.
MA 1165: Special Assignment Completing the Square.
Alpha-Beta Search. 2 Two-player games The object of a search is to find a path from the starting position to a goal position In a puzzle-type problem,
Save the Library Reasons collected from students Book Month 2014.
Chapter 2 Between – doing a great job making decisions
The Art of Economic Argument - Going Beyond Aristotelian Logic 1.
אימרות שירות לקוחות 1 If You Don’t Take Care of Your Customer, Somebody Else Will.
FAILURE IS A PREREQUISITE Demeterius “FLITE” Smith New Directions In Student Development Conference Friday, March 7, 2014 Piedmont Technical College.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Social Media Roundup Bad social media: 7 Ways to lose your audience.
Things Every New Financial Aid Professional Needs To Know Things Every New Financial Aid Director Needs To Know Presented by Sherry Foster Director, Student.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Errors in Reasoning. Fallacies A Fallacy is “any error in reasoning that makes an argument fail to establish its conclusion.” There are two kinds of fallacies.
Basic Security Concepts University of Sunderland CSEM02 Harry R Erwin, PhD.
Basic Security Concepts University of Sunderland CIT304 Harry R Erwin, PhD.
Bookkeeping Gold Coast 101 – How Outsourcing Help Your Business.
MIS650 Introduction.
Presentation transcript:

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. How to Think About Security (in 20 minutes) Bruce Schneier CTO, Counterpane Internet Security 5th Privacy & Security Conference: Seeking the Middle Path Toronto, ON 28 October 2004

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE Security is Always a Trade-Off There’s no such thing as absolute security Security always involves trade-offs –If no airplanes flew, 9/11 couldn’t have happened –Gated communities offer more security but less privacy –Buying a home alarm system costs money and convenience We make decisions every day about these trade-offs To do it thoughtfully, we must understand both the threats and the security

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 3 Is the Trade-Off Worth It? As a security consumer, you are constantly making that decision Sometimes the decision is made for you by others People rarely perform this analysis –People succumb to fear and uncertainty –People believe in false promises of security –People do things counter to their own security –People say one thing and do another

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 4 Security Decisions Have Almost Nothing to do with Security Security trade-offs can be financial, social, etc. Non-security considerations matter more than security considerations The reality of security is that it rarely has anything to do with security

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE Security Is a System People often think of security in terms of specific attacks and defenses It’s not that simple Adding security to anything turns it into a system, and systems are complex and elusive beasts Understanding systems is the first step toward understanding security

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 6 A Bank Vault Bank vaults secure money against robbers But.... –The combination –The usage procedures –Customer access –Installation –Alarms and response –Failures

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 7 Security Failures At a basic level, security systems are different from any other type of system Security engineering involves making something— attacks—not work It involves figuring out how things fail, and then preventing those failures Figuring out how a system fails is more important— to a security expert—than knowing how it works And figuring out how it can be made to fail is most important

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 8 Active Failures and Passive Failures Security systems can fail in two different ways: –In the face of an attack—passive failures –By doing what they’re supposed to do, but at the wrong time—active failures Most security systems can fail both ways In most systems, active failures are more important –There are far more legitimate users than attackers A high rate of active failures can mask real attacks How a system fails not only affects how successful it is, but how likely it is to be used in the first place

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 9 Failures and Rarity When a security event occurs regularly, people become experienced with it and know what to do If the event only happens once every few years, there could be an entire office staff that has never seen it Computerized systems make mistakes so rarely that operators don’t know how to deal with them This aspect of human nature can be used to attack systems Attackers commonly force failures specifically to cause a larger system to fail

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 10 Expecting Failures An important security precept is to expect systems to fail “Unbreakable,” “absolute,” “unforgeable,” and “impenetrable” are all words that makes no sense when discussing security Good security systems are designed for failure By figuring out how things fail and designing them to fail better, they’re made safer

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE Technology Causes Security Imbalances Sometimes technology can make an enormous difference Technology doesn’t only aid attackers by making attack tools more powerful; it also makes attack tools more plentiful and easier to use Technology creates security imbalances Sometimes these imbalances favor the defender, but more often the attacker Smart attackers look for leverage points, and technology gives them more leverage

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 12 Complexity and Security Throughout history we’ve seen more and more complex systems Computers are more complex than anything else we commonly use, and they’re being embedded into everything Systems can look simple because much of their complexity remains hidden Complexity is great for consumers, but terrifying for security professionals because it fails so badly Complexity is the worst enemy of security

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 13 Attackers Look for Leverage Technology continually gives attackers new opportunities for leverage: class breaks, automation, technique propagation, and action at a distance all give attackers leverage Leverage is why many people believe today’s world is more dangerous than ever Leverage is one of the scariest aspects of modern technology, because we can’t count on previous constraints to limit the effectiveness of an attacker

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE Knowing the Threats Means Knowing the Attackers Knowing the attacker allows you to evaluate the risks he poses and the countermeasures that might thwart him Attackers can be categorized along several basic lines: objectives, motivations, expertise, access, resources, and risk aversion If you mischaracterize your attackers, you’re likely to misallocate your defenses—you’re likely to worry about nonexistent threats, and ignore real ones

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 15 Who Are They? Criminals Insiders Emotional attackers Friends and relations Media Police Intelligence organizations Terrorists Wartime governments

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 16 Attacker Economics Rational attackers choose attacks that gives them a good return on investment Attackers consider their particular budget constraints: expertise, access, manpower, time, and risk Basically, it’s a series of business decisions

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 17 Attacks Don’t Change There hasn’t been a new crime invented in millennia What does change is the nature of attacks: the tools, the methods, and the results Understanding how attackers work is vital to understanding security; in a sense, the attacker is just another part of any security system

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 18 Smart Attackers Cheat Attackers regularly cheat; they think outside the box By reframing the problem, they can render existing countermeasures irrelevant Most attackers are copycats –They aren’t clever enough to invent new techniques for fraud –They read stories of attacks in the newspaper and think: “Hey, I could do that too” –On the other hand, they don’t need to think up new ways of attack if the old ways still prove to be effective

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 19 Conclusions: Security Design Security is a system –Think of it as a system –Think of how it interacts with other systems Think of how the system fails –As a system, security fails in surprising ways –Think of why can cause it fail, and why Develop strategies to minimize the risks This stuff is hard –There are gotchas everywhere

INTELLIGENT ALERT. INSTANT RESPONSE. IMMEDIATE DEFENSE. 20 Two Useful Resources from Bruce Schneier Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier Crypto-Gram: Free Monthly Security Newsletter by Bruce Schneier Copernicus,