Security:  It’s all about motivation! Einar Snekkenes Professor

advertisement
Security: It’s all about motivation!
Einar Snekkenes
Professor
Gjøvik University College
1
Overview
• Security objectives
• Context establishment/ World view • Transition to people focus/motivation
• The role of risk analysis • Motivation – the model + Schwartz values
• Trade‐offs in decision making
• CIRA: Connecting risk and motivation
• Conclusion – have I convinced you?
2
Security Objectives
• Internal/local
• Integrity
• Confidentiality
• Availability
• External
• Compliance
3
ECO system dependencies
4
Information system service delivery chain elements
• Physical location
•
•
•
•
Building
Geographic area
Environment
...
• The service
•
•
•
Staff
Operations procedures
...
• Knowledge and theories on which sw/hw is based
• Software:
•
•
•
•
•
Application/ system services
Core operating systems
Development systems/compilers, Version control systems
...
• Hardware ‐ built from large range of complex chips •
•
•
•
•
•
•
•
PC’s,
Servers,
Disks
Routers,
Switches
Modems CELL phones
...
• Trustworthy platform/OS
Relies on
• Requirements capture
• Design
• Library management
• Programming
• Compilation
• Version control
• ...
• CHIPS
•
•
•
•
processors
communication controllers
peripheral controllers (e.g. USB)
...
5
Computing value chain – suppliers
6
https://blog.hubspot.com/blog/tabid/6307/bid/1180/If‐Clayton‐Christiansen‐were‐running‐Apple‐Computer‐then.aspx
Farm to table
Source: duoliphotography.com
7
Supply chain attack –
locations Source: MITRE
8
Discontinuity and complexity of information systems
• Small changes (1 bit) may have serious consequences both for
• Input data
• Software
• SW systems – typical size: 100K ‐ 100M SLOC 9
Trusted computing base – dependencies
• What is the minimum requirements that will have to be put on each of our suppliers/ used products/ services in order for objectives to be fulfilled?
• Given the size and complexity of the value chain and TCB, is direct code analysis/validation realistic?
10
Our concern – incidents – root causes
• Equipment
• Acquired from others, but built and constructed by people.
• Process
• Established by people – previously
• People
• So its all about people...
11
What to do – can we build on a ‘trend’?
• Code validation – the thing
• Process – how the thing is made
• Motivation ‐ what drives us to make the thing in a certain way ???
• Idea: handle increased complexity by increasing the abstraction level/ indirectness of our focus
12
Framing of risk
Kuypers (Rhetorical Criticism: Perspectives in Action)
Frames operate in four key ways: they 1.
2.
3.
4.
Define problems – classical PRA/ expected value Diagnose causes ‐ CIRA & Motivational analysis of subjects
Make moral judgments – Feelings & Doing the ‘right’ thing
Suggest remedies – Security baseline
13
Risk Analysis in context
Risk management
14
Risk management & Risk analysis in a GT perspective
• Risk analysis objective
• Are we ‘happy’ with the current situation?
•  GT: Are we in equilibrium?
• Risk management objective
• Decide what has to be done to stay ‘happy’.
• Make sure it is done
• Check that we are ‘happy’.
•  GT: Mechanism design and/or ‘Solving’ a game
15
Motivation – the model
• Given a decision situation (i.e. options)
• perceived impact on personal needs and values • will strongly influence your choice.
16
A note on scope
• Only include conscious and strategic behaviour
• Some may say: «Then a lot is left out .»
• But in ‘legalese’ one sometimes say
«... knew or should have known...»
• If you ... that you could be a victim, in most cases you can decide how/if non‐strategic actions/events are to be handled‐ and THAT is a strategic choice – i.e. within scope.
• CLAIM: Restricting our attention to strategic behaviour leaves very little out. 17
Values as motivators From: Schwartz, Shalom H. "An overview of the Schwartz theory of basic values. "Online Readings in Psychology and Culture 2.1 (2012): 11.
18
Motivation ‐ Choices
• ‘White‐hat hacker’ vs self assessment
• Release of software known to have bugs (document readers)
• Prioritize resources for recovery rather than prevention
• Short vs long term profit
• Usability/efficiency VS security robustness
• Business opportunity vs privacy/regulatory compliance (privacy)
• Operational convenience VS legal compliance (security services).
• Perceived VS actual performance (pollution, automotive industry)
• Functionality vs dependability
19
Conflicting Incentives Risk Analysis
CIRA Concepts
Risk is always subjective
Risk owner
Strategy owner
Perceived utility
Risk: The extent to which the perceived utility of strategy owner and risk owner are misaligned.
• Threat risk
•
•
•
•
•
• Moral hazard ‐ Strategy owner can inflict negative externalities on the risk owner
• Opportunity risk
• Strategy owner is incentivized not to act as to yield risk owner a positive perceived utility.
20
Q2
CIRA Risk visualization
21
Reflections
• Risk is subjective. My risk is different from your risk. One man’s breath, another’s death.
• References to ‘threat actor’ is stigmatizing and undermines the objective of a risk analysis. The so called ‘good’ is attributed excessive trust and the ‘bad’ get to much blame – e.g. Snowden.
• Occasionally, legitimate organizations and government organizations are known to break rules and regulations – e.g. insider issues and miscarriage of justice.
•  abandon the term ‘treat actor’ ‐ frame the situation objectively, as conflicting interests, and use neutral terms. E.g. IRS attempts to break privacy legislations relating to toll road vehicle timing data.
• The risk analysis process will be improved if focus on understanding motivation and incentives rather than referring to probabilities.
22
Conclusion
Security is primarily about • Identification of • Dependencies, • Stakeholders, • Their motivation – and • Modification of stakeholder value perceptions
• Such as to ensure that strategy owner motivation is aligned with risk owner value perceptions.
23
Questions?
PhD grant @HIG
• Conflicting Incentives Risk Analysis for Internet of Things in a Critical Infrastructure Context
• For further information, please contact
• einar.snekkenes@hig.no
24
Download