2017-04-04 the Cybersecurity Mess 16X9
Total Page:16
File Type:pdf, Size:1020Kb
The Cyber Security Mess Simson L. Garfinkel April 4, 2018 Spamhause Photos from https://pixabay.com 1 The Cybersecurity Mess Abstract: Why is it so hard to secure computers? After more than 40 years of concerted effort in network security, why can’t we keep the hackers out? The problem, I argue, is not the practice of computer security, but its definition, it’s very conception. As we are accepted it, computer security is what social scientists call a "wicked problem” — a poorly defined, high-impact problem for which the solution depends upon satisfying many competing stakeholders and conflicting goals. Solving the cybersecurity mess means addressing both technical factors—factors that dominate the discussion— and nontechnical factors, which reflect deep, divisive political, social, and economic problems without our society as a whole. This problems, which include the decline of the US manufacturing base, the failure of our schools at science, technology, engineering and math (STEM), an inherent power struggle between the makers of information systems and their users, and our inability to frame a coherent immigration policy, are core reasons why we are unable to make technical progress. While it is certainly possible that the need to secure our computers may force us to find a general solution to these problems, such Pollyannish hopes seem unlikely. This talk follows the history of cybersecurity efforts, showing that while there’s nothing new under the sun, things really are getting worse. And while there are little-used technologies that really can make computers dramatically more secure (such as typesafe languages, formal methods, and provably correct computer systems), these approaches are so expensive that they may never see widespread adoption. So what’s the solution? I propose that it’s resilience, redundancy, heterogeneity, and regulation. Yes, this talk is designed to leave everyone in the audience both agreeing with the speaker, and angry at the speaker. Bio: Simson Garfinkel is an adjunct lecturer at Georgetown University’s Graduate School of Data Analytics and the Chief of the Center for Disclosure Avoidance at the US Census Bureau. He was previously a computer scientist at the National Institute of Standards and Technology (2015-2017) and, before that, an Associate Professor of Computer Science at the Naval Postgraduate School (2006-2015). Before earning his PhD in Computer Science from at MIT (2002-2005), he was an award-winning journalist and a serial entrepreneur. In 2012 he was elected a Fellow of the Association for Computing Machinery for his contributions to digital forensics and to computer security eduction. 2 “The Cyber Security Risk”, Communications of the ACM, June 2012, 55(6) viewpoints VDOI:10.1145/2184319.2184330 Simson L. Garfinkel Inside Risks The Cybersecurity Risk Increased attention to cybersecurity has not resulted in improved cybersecurity. HE RISK OF being “hacked”— whatever that expression ac- tually means—is at the heart of our civilization’s chronic cybersecurity problem. De- Tspite decades of computer security research, billions spent on secure op- erations, and growing training require- ments, we seem incapable of operating computers securely. There are weekly reports of pen- etrations and data thefts at some of the world’s most sensitive, impor- tant, and heavily guarded computer systems. There is good evidence that global interconnectedness combined with the proliferation of hacker tools means that today’s computer systems are actually less secure than equiva- lent systems a decade ago. Numerous breakthroughs in cryptography, se- cure coding, and formal methods not- withstanding, cybersecurity is getting worse as we watch. So why the downward spiral? One reason is that cybersecurity’s goal of re- ducing successful hacks creates a large target to defend. Attackers have the luxury of choice. They can focus their Lorem ipsum dolor sit amet consect adipiscing nunc enim mauris sed massa efforts on the way our computers rep- resent data, the applications that pro- cess the data, the operating systems on which those applications run, the networks by which those applications communicate, or any other area that It may be that cybersecurity appears Views of Cybersecurity is possibly subverted. And faced with to be getting worse simply because The breadth of the domain means a system that is beyond one’s techni- society as a whole is becoming much many different approaches are being AREK WASZUL cal hacking skills, an attacker can go more dependent upon computers. proposed for solving the cybersecurity Y around the security perimeter and use Even if the vulnerability were not in- problem: ON BY ON BY I a range of other techniques, including creasing, the successful hacks can have ! Cybersecurity can be viewed solely social engineering, supply-chain inser- significantly more reach today than a as an insider problem. What is needed, ILLUSTRAT tion, or even kidnapping and extortion. decade ago. say advocates, are systems that prevent JUNE 2012 | VOL. 55 | NO. 6 | COMMUNICATIONS OF THE ACM 29 http://simson.net/clips/academic/2012.CACM.Cybersecurity.pdf 3 I have spent 29 years trying to secure computers... 38 THE PRACTICAL LAWYER (Vol. 33-No. 6) AUTHOR'S BIBLIOGRAPHY Bank Loans Term Loan Handbook, John]. McCann, ed. (Law & Business, Inc., New York City) Structuring Commercial Loan Agreements, by Roger Tighe (Warren, Gorham & Lamont, Boston) System Security Privacy Policy Usable Security Commercial Finance and Factoring Internet of Things Commercial Finance, Factoring and Other Asset-Based Lending, by Practising Law Institute (PLI, New York City, 1983) Dun & Bradstreet's Handbook of Modern Factoring and Finance, by Louis A. Moskowitz. (Thomas Y. Crowell Co., New York City) Legal Opinions Legal Opinions to Third Parties, 34 The Business Lawyer 1891 (1979) General The Professional Skills of the Small Business Lawyer, by Harry J. Haynsworth (ALI-ABA, Philadelphia, 1984) [T]here are four key points in a loan when the scrutiny of counsel is An Introduction to most productive: first, at the drafting of the commitment letter and the structuring of the loan, ... second, in connection with the closing, Computer Security counsel's involvement should begin well in advance and continue [Part 1] through a postclosing follow-up and review; third, when any amend- ment or extension of the loan is proposed; and, finally, the instant a Simson L. Garfinkel default or workout appears likely. At that point counsel should be prepared to review the loan documentation and correspondence and, in "Spies," "vandals," and "crackers" are out there, general, to provide an analysis of the relative positions of competing waiting to get into-or destroy-your databases. creditors .... R. NASSBERG, THE LENDER'S HANDBOOK (ALI-ABA, Philadelphia, 1986) AWYERS MUST UNDERSTAND is- Lawyers today must automatically L sues of computer security, both recognize insecure computer systems for the protection of their own inter- and lax operating procedures in the ests and the interests of their clients. same way as lawyers now recognize 2006 39 1991 2000 2006 > The Practical Lawyer 2014 Sept. 1987 4 Today’s systems are less secure than those of the 1970s. The lack of security is inherent in modern information systems. • Attack is easier and cheaper than defense. • Cyber “defense in depth” does not work — a single vulnerability compromises. Policies, Procedures, Awareness Physical Perimeter Internal Network Application Data Cyber can directly target inner defenses Defense in depth of nuclear reactors http://www.nrc.gov/about-nrc/regulatory/research/soar/soarca-accident-progression.html It’s easier to break things than to fix them. 5 6 Today we expect computers to crash We also expect them to be hacked. The solution is not better security 7 Cybersecurity impacts the real world. IRL (Cyber is In Real Life.) 8 Main Menu ▼ My Stories: 25 ▼ Forums Subscribe Video Search Log In RISK ASSESSMENT / SECURITY & HACKTIVISM How hackers allegedly stole “unlimited” TOP FEATURE STORY amounts of cash from banks in just hours Feds accuse eight men of participating in heists that netted $45 million. by Dan Goodin - May 9 2013, 3:45pm EDT BLACK HAT HACKING 55 FEATURE STORY (3 PAGES) Exploring Ubuntu Touch, the other Linux OS for your phone It's far from done, but Canonical's mobile work- in-progress has some good ideas. 12 STAY IN THE KNOW WITH May 2013 — LATEST NEWS $45 million stolen from US banks with phony ATM cards Android 4.3, Google Babel, and the Nexus 7: What’s in store Main Menu ▼ My Stories: 25 ▼ Forums Subscribe Video Search Log In for Google I/O? RISK ASSESSMENT / SECURITY & HACKTIVISM CHITTY CHITTY BANG BANG TOP FEATURE STORY Flying car crashes near elementary How hackers allegedly stole “unlimited” school in Canada amounts of cash from banks in just hours Wikipedia Feds accuse eight men of participating in heists that netted $45 million. GROUND CONTROL TO MAJOR TOM by Dan Goodin - May 9 2013, 3:45pm EDT BLACK HAT HACKING 55 Federal authorities have accused eight men of participating in 21st-Century Bank heists that netted a Commander Chris Hadfield bids adieu FEATURE STORY (3 PAGES) to ISS with “Space Oddity” cover whoEpxppilnogr i$n4g5 U mbiullinotnu b Tyo huacchk,ing into payment systems and eliminating withdrawal limits placed on pretphaeid o dtheberit Lcianrudsx. OS for your phone SPACEWALK WITH ME TheIt' se faigr fhrotm m doenen, bfuot rCmanoendic atl'hs meo Nbile wwo rkY- ork-based cell of an international crime ring that organized and NASA arranges a quick spacewalk to in-progress has some good ideas. executed the hacks and then us12ed fraudulent payment cards in dozens of countries to withdraw the repair leaking space station lootS TfArYo INm TH aE KuNtOoWm WIaTHted teller machines, federal prosecutors alleged in court papers unsealed Thursday. In a matter of hours on two separate occasions, the eight defendants and their confederates The British ‘Atlantis’ is withdrew about $2.8 million from New York City ATMs alone.