text
stringlengths 0
118
|
---|
risk equation, and they are the most challenging variable to control. It takes |
a lot of time and energy to even nudge human behavior, let alone change it |
dramatically. Security experts are not usually trained to be human behavior |
experts; their knowledge and experience is usually in technology, not |
human cognition and psychology. |
Scholars have observed predictable patterns of careless human behavior |
in nearly every imaginable context. Yet, far too many technologies are |
designed in ways that not only fail to counter predictable risky human |
behavior but also actively encourage it. Far too many security measures are |
designed in ways that fail to account for human limitations. And far too |
many data security laws are oblivious to this problem. These laws actively |
encourage organizations to implement security measures that fail. |
In this chapter, we focus on three broad ways that humans struggle with |
security. Accepting these problems and building around them will make an |
enormous difference for data security. The problems include: |
The Bandwidth Problem |
Humans lack the cognitive capabilities to perform many of the security practices they are asked |
to follow. |
The Carelessness Problem |
Humans often act carelessly. They will fail to follow security measures that are too inconvenient |
or difficult. |
The Gullibility Problem |
Humans are prone to trust, even when they ought not to. |
Many security standards are checklists of various security controls, with |
only a few focusing on human behavior. Of those controls that involve |
human behavior, they often provide no guidance on how to predict, plan for, |
nudge, and respond to human behavior effectively. Legal rules don’t do |
much better, often rewarding a threadbare “checklist” approach to data |
security, and sometimes even requiring it. |
Instead, we argue that the law should encourage design that works |
realistically with human behavior rather than denies the realities of human |
nature. The law should discourage design that leads to human behaviors |
that create unwarranted security risks. |
The law can accomplish these aims by outright restrictions or by using a |
mix of incentives and disincentives. The appropriate choice depends upon |
the context. We propose four key things that the law can require or |
encourage that will make a palpable difference: |
Changing the Default Settings |
The law can encourage or require default settings that are good for security. |
Promoting Mutual Trust |
The law can combat gullibility by fostering a more stable set of trust expectations; that is, when |
people should expect to trust an email, phone call, or website. |
Encouraging Balanced Security Measures |
The law can encourage a realistic balance between data security and convenience. The law |
should stop rewarding organizations for implementing security measures that merely look good |
on paper but that will fail miserably in practice. |
Sending Sensible Signals |
The law can encourage more secure human behavior by sending clearer signals to people about |
security risks. |
PROBLEMS WITH PEOPLE |
Organizations usually rely upon data security frameworks and standards |
when determining what security practices and safeguards they should be |
implementing. Examples include the National Institute for Standards and |
Technology (NIST) 800-53 and the International Standards Organization |
(ISO) 27001. The problem is that companies often have strong incentives to |
implement these standards as checklists with little regard to the human side |
of the equation. Consider, for example, the 20 Center for Internet Security |
(CIS) controls, one of the more popular sets of security controls: |
1. |
2. |
3. |
4. |
5. |
6. |
7. |
8. |
9. |
10. |
11. |
12. |
13. |
14. |
15. |
16. |
17. |
18. |
19. |
20. |
Basic CIS Controls |
Inventory and Control of Hardware Assets |
Inventory and Control of Software Assets |
Continuous Vulnerability Management |
Controlled Use of Administrative Privileges |
Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations |
and Servers |
Maintenance, Monitoring and Analysis of Audit Logs |
Foundational CIS Controls |
Email and Web Browser Protections |
Malware Defenses |
Limitation and Control of Network Ports, Protocols and Services |
Data Recovery Capabilities |
Secure Configuration for Network Devices, such as Firewalls, Routers and Switches |
Boundary Defense |
Data Protection |
Controlled Access Based on the Need to Know |
Wireless Access Control |
Account Monitoring and Control |
Organizational CIS Controls |
Implement a Security Awareness and Training Program |
Application Software Security |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.