Security Think

نویسنده

  • Steven M. Bellovin
چکیده

There are lots of problems with security education. The most serious, of course, is that we’re teaching security to the wrong people; we spend our time educating security specialists, rather than the application and system builders who are quite inadvertently creating the security holes that plague us. But there are problems even with what we teach specialists: we spend too much time on things like cryptography and too little on how to think about security. Don’t get me wrong; cryptography is important. Students do need to learn about it, including the very practical fact that almost no one should ever invent his or her own crypto. Students also need to learn about firewalls, access control lists, passwords, and a plethora of other primitives. But that’s the easy part. The harder part is putting all of this together. A security specialist is rarely told to “figure out how to secure this TCP connection”; usually, the proper response is something like “use TLS” (or, in some cases, “enable the TLS option in the application”), at which point most of the solution can be left to any programmer who can read the documentation. Rather, the challenging questions are things like, “How do we secure this distributed application?”, when it runs on several dozen different computers, requires a number of canned applications (each of which has its own security model that doesn’t happen to match what you’re doing), and has to talk to a legacy program written in COBOL during the last Ice Age. Jobs like this, or the closely related task of evaluating a proposed architecture, are at the heart of what security people should do. It’s a tough subject to teach, though: real systems are very complex, and each one is different. It could, presumably, be taught via case studies, but fully documented (and public) design details are rare. I have yet to see a textbook that even tries. But even that pales before what most people find to be the really hard problem: thinking like a bad guy. It’s easy to say “make users pick strong passwords,” “watch out for buffer overflows,” or “avoid cross-site scripting attacks,” although these instructions seem to be difficult to carry out. How do you teach people to look for connections between two independent components that together can result in a vulnerability? How do you teach people to develop a sense that some component is more fragile and hence more likely to fail? How do you teach them how to balance usability and security, to ensure that users or your own people don’t inadvertently sabotage security? We see security failures in the physical world all the time. Recently, I wanted to buy a router bit from a large chain store. Naturally, because bits are small and expensive, a security person decreed that they be displayed in a locked rack. The floor staff I asked for assistance couldn’t find someone with the key, so one of them just pulled out a knife and sliced through the plastic. I paid at a self-service register, declining a plastic bag (it was one small item) and thereby bypassing the gadget that deactivated the antitheft transponder. The alarm sounded when I walked out the door, but no one paid attention, perhaps because they were too accustomed to false alarms. Were there several independent security failures here? Of course! Did the entire system fail? Arguably, it did not—is the overall loss rate from theft of router bits more or less than what a fix would cost? That’s the challenge: getting all of the trade-offs right in a complex configuration with many moving parts. Teaching the basics is fine; anyone in the business needs to know them. But teaching people how to protect complex systems—“security think” —is the real issue

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Impact of Israeli Think Tanks on Israel's Foreign Policy (2006-2017)

In the modern world, government policy makers engage in the decision making process to pursue the interests of their countries. Think tanks play a significant role in this complicated process by giving advice to decision makers. Since the beginning of the twentieth century, think tanks increasingly emerged in the world, especially in Western European countries and the United States of America (...

متن کامل

National Security and Immigration

This paper considers the relationship between economic factors and national security. While considering a broad number of issue areas, the principal theme of the course is the way in which economic factors (as immigration) fundamentally influence the national security of the region, and the way in which those factors shape and constrain the strategies chosen to pursue that security. South-South...

متن کامل

Component isolation in the Think architecture

We present in this paper the security features of Think, an object-oriented architecture dedicated to build customized operating system kernels. The Think architecture is composed of an objectoriented software framework including a trader, and a library of system abstractions programmed as components. We show how to use this architecture to build secure and efficient kernels. Policy-neutral sec...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Beautiful Security - Leading Security Experts Explain How They Think

By reading, you can know the knowledge and things more, not only about what you get from people to people. Book will be more trusted. As this beautiful security leading security experts explain how they think, it will really give you the good idea to be successful. It is not only for you to be success in certain life you can be successful in everything. The success can be started by knowing the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Security & Privacy

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2011