30
IN DEFENCE OF THE HUMAN FACTOR Dr Ciarán Mc Mahon Tivi Digital & Cyber Security, Scandic Park, Helsinki, 24.11.2016

In defence of the human factor

Embed Size (px)

Citation preview

Page 1: In defence of the human factor

IN DEFENCE OF THE HUMAN FACTOR

Dr Ciarán Mc Mahon

Tivi Digital & Cyber Security,

Scandic Park, Helsinki,

24.11.2016

Page 2: In defence of the human factor

Introduction

• Today’s talk

• The so-called ‘weakest’ so-called ‘link’

• The ETTO principle

• Everything is broken

• Victim-blaming

• Building a positive cyber security culture

Page 3: In defence of the human factor

About meDr Ciarán Mc Mahon is a director of the Institute of Cyber

Security and an award-winning academic psychologist from

Ireland. A former Government of Ireland Scholar, he has

published research on the history of psychological language,

the psychology of social media, digital wellness and the social

impact of cybercrime. Ciarán has worked at a number of third

level institutions, and is currently an occasional lecturer at

University College Dublin. Ciarán also has extensive media

experience and regularly contributes on topics relating to the

human aspects of information technology to national and

international outlets including Sky News, BBC Radio London,

USA Today, Fortune Magazine, and The Guardian.

Page 4: In defence of the human factor

The Institute of Cyber Security aims to help

companies and organisations develop the most

resilient cyber security culture possible.

Page 5: In defence of the human factor

It all started with Bruce Schneier (2000)

Page 6: In defence of the human factor

It all started with Bruce Schneier (2000)

Page 7: In defence of the human factor

and continued with Kevin Mitnick (2002)

Page 8: In defence of the human factor

and continued with Kevin Mitnick (2002)

Page 9: In defence of the human factor
Page 10: In defence of the human factor

AS A HUMAN BEING, I RESENT THIS!

Page 11: In defence of the human factor

What about the other links in the security chain?

Are they really stronger, and more secure?

Page 12: In defence of the human factor

‘Everything is broken’

Quinn Norton

It’s hard to explain to regular people

how much technology barely works,

how much the infrastructure of our lives

is held together by the IT equivalent of

baling wire.

Computers, and computing, are broken.

Page 13: In defence of the human factor

Update of the art

Recent patches

o 16 updates of iOS in the last year

o 3 Flash updates in a single month

o How quickly did Windows 8 become

Windows 8.1?

Page 14: In defence of the human factor

Update of the art

Recent patches

o Only 7.5% of all Android devices are

running its most secure operating system

o This is currently being investigated by

the US Federal Trade Commission

Page 15: In defence of the human factor

‘Another flaw in the human character is that everybody wants to build and nobody wants to do

maintenance’

Page 16: In defence of the human factor

So why are we blaming people for security

problems, when the technology is falling apart?

Page 17: In defence of the human factor

Acceptable accident causes (Hollnagel & Amalberti,

2001)

Accidents are always found to have

been

o associated with a system structure

o which can be reduced within accepted

limits of cost and time

o conforms to current “norms” for

explanations

Page 18: In defence of the human factor

Human error is a meaningless concept

Every day the average office worker clicks on hundreds of hyperlinks as

part of their job. But one day, they click on the wrong one, and suddenly

they’re the cause of malware infection.

Hollnagel’s (2006) ETTO principle – ‘efficiency-thoroughness trade-off’

Sometimes things go wrong, sometimes things go right.

Page 19: In defence of the human factor

The flipside

o We say that ‘the human factor is the weakest link in

cybersecurity’ because it’s a lot easier than tackling the real

problem

o the fact that IT is falling apart

o But that’s not the only reason we shouldn’t say ‘the human

factor is the weakest link in cybersecurity’

Page 20: In defence of the human factor

IBM 2015 Cyber Security Intelligence Index

Page 21: In defence of the human factor

But how can you expect your employees to listen to you when you are assume that they

are stupid or untrustworthy?

Page 22: In defence of the human factor

But how can you expect your employees to listen to you when you are assume that they

are stupid or untrustworthy?

WE NEED TO CHANGE HOW WE TALK ABOUT HUMAN FACTORS IN CYBERSECURITY

Page 23: In defence of the human factor

Victim blaming (Cross, 2015)

Discourse on online fraud is based on

idea of greedy/gullible victims

o does not take into account level of

deception and sophisticated targeting

o humour isolates victims and impacts

their ability to warn others

Page 24: In defence of the human factor

Understanding abusive insiders

Posey, Bennett, & Roberts (2011) :

o employees who do not feel that their

organisations trust them will engage in

more computer abuse when security

measures are brought in

Page 25: In defence of the human factor

Organisational justice and fairness

Bulgurcu, Cavusoglu, & Benbasat

(2009):

o creating a fair environment and

ensuring procedural justice in regards

to implementing security rules and

regulations is the key to effective

information security management.

Page 26: In defence of the human factor

Are CISOs their own worst enemy?

(Ashenden & Sasse, 2013)

CISOs struggle to gain credibility due

to:

o confusion about their role identity

o inability to engage effectively with

employees

Page 27: In defence of the human factor

If we want our colleagues, co-workers and corporate level

executives to engage with cybersecurity policy, we have to

stop seeing them as the weakest link. We have to start

engaging with them, trusting them, and educating them.

It’s that simple.

Page 28: In defence of the human factor

Thank you.

Email [email protected]

Phone(IRE) +353 1 5137093

Phone(UK) +44 203 8085226

Address Unit 1, 77 Sir John Rogerson’s Quay,

Dublin 2, Ireland

For full report, contact [email protected]

Page 29: In defence of the human factor

Studies citedAshenden, D., & Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy? Computers and Security, 39, 396–405.

http://doi.org/10.1016/j.cose.2013.09.004

Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2009). Roles of information security awareness and perceived fairness in information security

policy compliance. 15th Americas Conference on Information Systems 2009, AMCIS 2009, 5, 3269–3277.

Cross, C. (2015). No laughing matter: Blaming the victim of online fraud. International Review of Victimology, 21(2), 187–204.

http://doi.org/10.1177/0269758015571471

Hollnagel, E. (2009). The ETTO Principle: Why things that go right sometimes go wrong. Farnham, UK: Ashgate.

Hollnagel, E., & Amalberti, R. (2001). The emperor’s new clothes: Or whatever happened to “human error”? 4th International Workshop on

Human Error, Safety and Systems Development, (April), 1–18.

Mitnick, K. D., & Simon, W. L. (2002). The art of deception: Controlling the human element of security. Indianapolis, IN: John Wiley & Sons

Posey, C., Bennett, R. J., & Roberts, T. L. (2011). Understanding the mindset of the abusive insider: An examination of insiders’ causal

reasoning following internal security changes. Computers and Security, 30(6-7), 486–497. http://doi.org/10.1016/j.cose.2011.05.002

Page 30: In defence of the human factor

Other sources

Goodin, D. (2016, May 10). Feds probe mobile phone industry over the sad state of security updates. Ars Technica

http://arstechnica.com/security/2016/05/feds-probe-mobile-industrys-security-update-practices/

IBM (2015). IBM 2015 Cyber Security Intelligence Index. http://www-01.ibm.com/common/ssi/cgi-

bin/ssialias?subtype=WH&infotype=SA&htmlfid=SEW03073USEN&attachment=SEW03073USEN.PDF

Lonergan, K. (2015, June 30). The human factor: top tips to strengthen the weakest link in the information security chain. http://www.information-

age.com/technology/security/123459735/human-factor-top-tips-strengthen-weakest-link-information-security-chain

Meetup.com (2016, April 7). Human Factors in (Cyber) Security: Exploiting the Weakest Link? http://www.meetup.com/French-IT-Group-

Australia-Asia/events/230137510/

Norton, Q. (2014, May 20). 'Everything is broken'. The Message (Medium). https://medium.com/message/everything-is-broken-

81e5f33a24e1#.sc7pf19g3

SANS Institute (2001). The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem.

https://www.sans.org/reading-room/whitepapers/vpns/weakest-link-human-factor-lessons-learned-german-wwii-enigma-cryptosystem-

738

Schneier, B. (2000). Secrets and lies: Digital security in a networked world. New York: John Wiley & Sons.

Singer, P.W. & Friedman, A. (2014). Cybersecurity: What Everyone Needs to Know. Oxford: OUP.

https://books.google.ie/books?id=9VDSAQAAQBAJ&dq

Vishwanath, A. (2016, May 5). Cybersecurity’s weakest link: humans. The Conversation. https://theconversation.com/cybersecuritys-weakest-

link-humans-57455

Wright, A. (2016, April 13). Humans in cyber security – the weakest link. https://www.itgovernance.co.uk/blog/humans-in-cyber-security-the-

weakest-link/