150 likes | 285 Views
Security Economics and Public Policy. Ross Anderson Cambridge University. Economics and Security. The link between economics and security atrophied after WW2 Over the last six years, we have started to apply economic analysis to information security
E N D
Security Economics and Public Policy Ross Anderson Cambridge University
Economics and Security • The link between economics and security atrophied after WW2 • Over the last six years, we have started to apply economic analysis to information security • Economic analysis often explains security failure better then technical analysis! • Information security mechanisms are used increasingly to support business models (DRM, accessory control) rather than to manage risk • So economic analysis is vital in several ways for the public policy aspects of security
Traditional View of Infosec • People used to think that the Internet was insecure because of lack of features – crypto, authentication, filtering • So engineers worked on providing better, cheaper security features – AES, PKI, firewalls … • About 1999, we started to realize that this is not enough
Incentives and Infosec • Electronic banking: UK banks were less liable for fraud, so ended up suffering more internal fraud and more errors • Distributed denial of service: viruses now don’t attack the infected machine so much as using it to attack others • Health records: hospitals, not patients, buy IT systems, so they protect hospitals’ interests rather than patient privacy • Why is Microsoft software so insecure, despite market dominance?
New View of Infosec • Systems are often insecure because the people who could fix them have no incentive to • Bank customers suffer when bank systems allow fraud; patients suffer when hospital systems break privacy; everyone suffers when infected PCs spam you • In IT markets, firms ship too little security when building market share, then add lots (of the wrong kind) to lock customers in • What about the economics of crime?
Chip and PIN fraud • In 1992–4, banks said ‘ATM fraud can’t happen’ – so their staff got lazy and it did • Chip and PIN is now following the same pattern • Widespread card cloning via skimmers at petrol stations, linked to Tamil Tigers • Nice cosy deal between banks and police stops you reporting card fraud any more except to your bank (crime stats down, bank control up) • So terrorist activity in UK is discovered by Thai police, not by UK police!
If banks control crime reporting… • Will there be an end to stories like this?
Phishing • Bank customer lured to bogus website • Money transferred from / via her account • Losses last year: £36m UK, > $100m USA • One gang (‘Rockphish’) does over half! • Technical measures aren’t going to fix this • Banks trained customers to click on links • IE toolbar was broken before it shipped • 2-factor auth will be met by real-time MITM
Studying the Phishermen • Stolen money gets shipped through 2 or 3 hacked accounts, then turned into eGold • You might think it’s because eGold doesn’t respond to warrants – but they now do • It’s actually about transaction revocability! • The typical bank recovers 60–95% of phished funds (the one that does only 60% gets hit for most of the losses) • What’s the right regulatory response?
The old way of working • If someone did a wire fraud, or a cheque fraud, the money would be got back • When I bought a car, I paid Lloyds £40 for a bank draft – to insure the dealer against the cheque bouncing later • In business, you had acceptance of bills, factoring without recourse, LCs, … • The risk of giving a customer an irrevocable instrument was recognised and priced
The problem – and solution • There are more and more places to get ‘free’ bank drafts, and they’re attracting the villains • eGold, Western Union, Finnish banks … • Proposed regulatory change – any financial institution that sells an irrevocable instrument (including cash) for stolen funds should be liable • Time limit – maybe 90 days • This will be a better way to deal with nonbanks than trying to regulate them fully
The way forward • Phishing, keyloggers, etc are here to stay • As well as having a few big bent insiders, we’ll have many compromised accounts at any time • We must move from payment system integrity to payment system resilience • Make counterparty risks (payment, fraud, legal, data-security) transparent, so the market can price them • This will benefit banks, customers and the police
Regulatory failures • Right now, the UK is heading the wrong way: • Banks’ T&Cs dump transaction risk • HO agreement undermines reporting • Plan to make cheque payments irrevocable after 7 days from November • Pathetic enforcement, dismal forensics • Dispersed responsibility – Home Office, FSA, Treasury, ACPO, APACS – with everyone pursuing narrow selfish agendas • Risk: failure of trust in UK financial sector, opportunity cost of lack of trust in e-business
More … • Economics and Security Resource Page – www.cl.cam.ac.uk/~rja14/econsec.html (or follow link from my home page) • Foundation for Information Policy Research – www.fipr.org