Security Basics mailing list archives
RE: Concepts: Security and Obscurity
From: "Craig Wright" <Craig.Wright () bdo com au>
Date: Wed, 11 Apr 2007 08:50:45 +1000
Hello, I have at no point claimed absolute security measures or cost structures. Excuse me, but your idea that economics and finance has nothing to do with security is pure head in the sand ignorance. Security is a cost function - pure and simple. Would suggest that you think about the real costs and gains in obscurity. This is both short and long term. You may be thinking of just your role now and no more. This is a view that ignores the total economic costs. It also ignores the requirements of a control function. Obscurity is not a control that may be meaningfully measured and maintained. The effectiveness is reliant on an unknown quantity. Please demonstrate your hypothetical controls. Stating your hypothesis in an intestable way does nothing to further the argument. Now the issue with security through obscurity is that people take the initial value of the control to be the entire value of the control over time using a discrete risk model. However, this type of risk function is clearly a poisson model. There is research on this (other than my own) - [1], [2], [3], [4]. I could quote several hundred references on the scientific evaluation of risk models. The Cost function for obscurity is exponential and the protection/ risk model is poisson. Now what does an exponential cost with a poisson gain give us? It means that there may be some preliminary gains - but at an uncertainty that gives a wide prediction interval at any reasonable level of confidence. Next, the exponential model grows faster than the poisson models decreases. This means in time the cost of the control will exceed the benefit. The requirement is that the obscurity based control needs to be updated to remain effective and thus requires added input and thus cost. Risk is quantitatively calculable using hazard and survival functions. Even taking for the maximum likely benefit, obscurity is not cost effective. Craig References [1] J. Herrin (1), B. J. Dempsey III " WEB-Enabled Medical Databases: a Threat to Security?" Methods of Information in Medicine 2000 39 4: 298-302. Zeitschriften - Methods of Information in Medicine - Archive - Issue 4/5 2000 [2]Manish Karir John S. Baras "LES: Layered Encryption Security" Center for Satellite and Hybrid Communication Networks Department of Electrical and Computer Engineering & Institute for Systems Engineering University of Maryland, College Park, MD 20742, USA [3] Michael K. Bond "Understanding Security APIs" University of Cambridge Computer Laboratory Jan 2004 [4]Giovanni. Vigna, "Recent Advances in Intrusion Detection: third international workshop", RAID 2000, Toulouse [5] Lennart Erixon " Even the bad times are good: a behavioural theory of transformation pressure " Cambridge Journal of Economics, doi:10.1093/cje/bel035 And a little further related reading for the techniques: Bertoin, J. Levy Processes Bunday, B. D. An Introduction to Queueing Theory Freund, R. J. and Wilson, W. J. Statistical Methods Hall, P. The Bootstrap Estimate and Edgeworth Expansion Hills, J. (ed.) New Inequalities: the Changing Distribution of Income and Wealth in the United Kingdom Hughes, B. D. Random Walks and Random Environments: vol. 2, Random Environments Kelly, F. P., Zachary, S. and Ziedins, I. (eds) Stochastic Networks: Theory and Applications Kleinbaum, D. G. Survival Analysis-a Self-learning Text , p. 375 Robertson, B. and Vignaux, G. A. Interpreting Evidence: Evaluating Forensic Science in the Courtroom Schervish, M. J. Theory of Statistics Sen, P. K. and Singer, J. M. Large Sample Methods in Statistics, an Introduction with Applications Zaman, A. Statistical Foundations for Econometric Techniques Craig Wright Manager of Information Systems Direct +61 2 9286 5497 Craig.Wright () bdo com au BDO Kendalls (NSW) Level 19, 2 Market Street Sydney NSW 2000 PO Box 2551 Sydney NSW 2001 Fax +61 2 9993 9497 www.bdo.com.au Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists. The information in this email and any attachments is confidential. If you are not the named addressee you must not read, print, copy, distribute, or use in any way this transmission or any information it contains. If you have received this message in error, please notify the sender by return email, destroy all copies and delete it from your system. Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls. You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or Director of BDO Kendalls. It is your responsibility to scan this communication and any files attached for computer viruses and other defects. BDO Kendalls does not accept liability for any loss or damage however caused which may result from this communication or any files attached. A full version of the BDO Kendalls disclaimer, and our Privacy statement, can be found on the BDO Kendalls website at http://www.bdo.com.au or by emailing administrator () bdo com au. BDO Kendalls is a national association of separate partnerships and entities. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of krymson () gmail com Sent: Wednesday, 11 April 2007 12:53 AM To: security-basics () securityfocus com Subject: RE: Concepts: Security and Obscurity I really think you just like hearing yourself talk. And while you spout some common axims and economics 101 terms, they don't mean much to this topic. Your whole fourth paragraph, while we can agree with what you said, has nothing to do with the topic. You assume that there are absolute security solutions instead of the incremental security that can be experienced by pairing up some forms of obscurity. I'll throw in my own axims that "security is not a state/product but rather a process/layering" and "there is no silver bullet to security." You also assume that gains are minimal with all obscurity, and that they have added difficulty and lost productivity. That is not necessarily true. If I have two forms of obscurity that both cost the same but together the total cost is less than the asset and thus worthwhile, I can't use them? I have to look for something that costs less than both those obscurities that secure the asset perfectly? <- snip -> What is forgotten is that there is an economic/financial cost to all controls. A control is only effective if the cost of the control provides more utility than not having the control. Thus a control that provides some security at a cost that is greater than another control is ineffective overall. Security by Obscurity is an ineffective control. The gains are minimal in economic terms. The cost however is more than the pure cash/money costs. The additional losses to productivity and added difficultly in maintaining secrecy does not provide the required level of gains to offset the costs and thus creates a dead-weight loss in economic terms. Thus security by obscurity is no security as the costs in real economic terms do not bring benefit. It is of no use to spend $1,000,000 protecting a $1,000 asset. This is a loss and thus it is not a decision that provides security as the loss exists even before the system goes live.
Current thread:
- RE: Concepts: Security and Obscurity, (continued)
- RE: Concepts: Security and Obscurity Ken Kousky (Apr 09)
- RE: Concepts: Security and Obscurity John Rodriguez (Apr 09)
- RE: Concepts: Security and Obscurity Ken Kousky (Apr 10)
- RE: Concepts: Security and Obscurity Ken Kousky (Apr 09)
- Re: Concepts: Security and Obscurity Pranay Kanwar (Apr 05)
- Re: Re: Concepts: Security and Obscurity levinson_k (Apr 09)
- Re: RE: Concepts: Security and Obscurity levinson_k (Apr 09)
- RE: Concepts: Security and Obscurity krymson (Apr 10)
- Re: Concepts: Security and Obscurity Joe Yong (Apr 11)
- RE: Concepts: Security and Obscurity Young, Randy (Apr 11)
- RE: Concepts: Security and Obscurity Ken Kousky (Apr 11)
- Re: Concepts: Security and Obscurity Joe Yong (Apr 11)
- Re: Concepts: Security and Obscurity Daniel Miessler (Apr 11)
- Re: Concepts: Security and Obscurity Daniel Miessler (Apr 11)