Security Basics mailing list archives

RE: Concepts: Security and Obscurity


From: "Craig Wright" <Craig.Wright () bdo com au>
Date: Wed, 11 Apr 2007 08:50:45 +1000

Hello, 
I have at no point claimed absolute security measures or cost
structures. Excuse me, but your idea that economics and finance has
nothing to do with security is pure head in the sand ignorance. Security
is a cost function - pure and simple. 

Would suggest that you think about the real costs and gains in
obscurity. This is both short and long term. You may be thinking of just
your role now and no more. This is a view that ignores the total
economic costs. It also ignores the requirements of a control function. 

Obscurity is not a control that may be meaningfully measured and
maintained. The effectiveness is reliant on an unknown quantity.

Please demonstrate your hypothetical controls. Stating your hypothesis
in an intestable way does nothing to further the argument.

Now the issue with security through obscurity is that people take the
initial value of the control to be the entire value of the control over
time using a discrete risk model. However, this type of risk function is
clearly a poisson model. There is research on this (other than my own) -
[1], [2], [3], [4]. I could quote several hundred references on the
scientific evaluation of risk models. The Cost function for obscurity is
exponential and the protection/ risk model is poisson.

Now what does an exponential cost with a poisson gain give us? It means
that there may be some preliminary gains - but at an uncertainty that
gives a wide prediction interval at any reasonable level of confidence.

Next, the exponential model grows faster than the poisson models
decreases. This means in time the cost of the control will exceed the
benefit. The requirement is that the obscurity based control needs to be
updated to remain effective and thus requires added input and thus cost.

Risk is quantitatively calculable using hazard and survival functions.
Even taking for the maximum likely benefit, obscurity is not cost
effective.

Craig

References

[1] J. Herrin (1), B. J. Dempsey III " WEB-Enabled Medical Databases: a
Threat to Security?" 
Methods of Information in Medicine 2000 39 4: 298-302.
Zeitschriften  -  Methods of Information in Medicine  -  Archive  -
Issue 4/5 2000

[2]Manish Karir John S. Baras "LES: Layered Encryption Security"
Center for Satellite and Hybrid Communication Networks
Department of Electrical and Computer Engineering & Institute for
Systems Engineering 
University of Maryland, College Park, MD 20742, USA

[3] Michael K. Bond "Understanding Security APIs" University of
Cambridge
Computer Laboratory Jan 2004

[4]Giovanni. Vigna, "Recent Advances in Intrusion Detection: third
international workshop", RAID 2000, Toulouse 

[5] Lennart Erixon " Even the bad times are good: a behavioural theory
of transformation pressure " Cambridge Journal of Economics,
doi:10.1093/cje/bel035

And a little further related reading for the techniques:

Bertoin, J. Levy Processes 

Bunday, B. D. An Introduction to Queueing Theory 

Freund, R. J. and Wilson, W. J. Statistical Methods 

Hall, P. The Bootstrap Estimate and Edgeworth Expansion 

Hills, J. (ed.) New Inequalities: the Changing Distribution of Income
and Wealth in the United Kingdom 

Hughes, B. D. Random Walks and Random Environments: vol. 2, Random
Environments 

Kelly, F. P., Zachary, S. and Ziedins, I. (eds) Stochastic Networks:
Theory and Applications 

Kleinbaum, D. G. Survival Analysis-a Self-learning Text , p. 375

Robertson, B. and Vignaux, G. A. Interpreting Evidence: Evaluating
Forensic Science in the Courtroom 

Schervish, M. J. Theory of Statistics 

Sen, P. K. and Singer, J. M. Large Sample Methods in Statistics, an
Introduction with Applications 

Zaman, A. Statistical Foundations for Econometric Techniques 




Craig Wright
Manager of Information Systems

Direct +61 2 9286 5497
Craig.Wright () bdo com au

BDO Kendalls (NSW)
Level 19, 2 Market Street Sydney NSW 2000
PO Box 2551 Sydney NSW 2001
Fax +61 2 9993 9497
www.bdo.com.au

Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within 
those States and Territories of Australia where such legislation exists.

The information in this email and any attachments is confidential.  If you are not the named addressee you must not 
read, print, copy, distribute, or use in any way this transmission or any information it contains.  If you have 
received this message in error, please notify the sender by return email, destroy all copies and delete it from your 
system. 

Any views expressed in this message are those of the individual sender and not necessarily endorsed by BDO Kendalls.  
You may not rely on this message as advice unless subsequently confirmed by fax or letter signed by a Partner or 
Director of BDO Kendalls.  It is your responsibility to scan this communication and any files attached for computer 
viruses and other defects.  BDO Kendalls does not accept liability for any loss or damage however caused which may 
result from this communication or any files attached.  A full version of the BDO Kendalls disclaimer, and our Privacy 
statement, can be found on the BDO Kendalls website at http://www.bdo.com.au or by emailing administrator () bdo com au.

BDO Kendalls is a national association of separate partnerships and entities.

-----Original Message-----

From: listbounce () securityfocus com [mailto:listbounce () securityfocus com]
On Behalf Of krymson () gmail com
Sent: Wednesday, 11 April 2007 12:53 AM
To: security-basics () securityfocus com
Subject: RE: Concepts: Security and Obscurity

I really think you just like hearing yourself talk. And while you spout
some common axims and economics 101 terms, they don't mean much to this
topic. Your whole fourth paragraph, while we can agree with what you
said, has nothing to do with the topic.

You assume that there are absolute security solutions instead of the
incremental security that can be experienced by pairing up some forms of
obscurity. I'll throw in my own axims that "security is not a
state/product but rather a process/layering" and "there is no silver
bullet to security."

You also assume that gains are minimal with all obscurity, and that they
have added difficulty and lost productivity. That is not necessarily
true.

If I have two forms of obscurity that both cost the same but together
the total cost is less than the asset and thus worthwhile, I can't use
them? I have to look for something that costs less than both those
obscurities that secure the asset perfectly?



<- snip ->
What is forgotten is that there is an economic/financial cost to all
controls.

A control is only effective if the cost of the control provides more
utility than not having the control. Thus a control that provides some
security at a cost that is greater than another control is ineffective
overall.

Security by Obscurity is an ineffective control. The gains are minimal
in economic terms. The cost however is more than the pure cash/money
costs. The additional losses to productivity and added difficultly in
maintaining secrecy does not provide the required level of gains to
offset the costs and thus creates a dead-weight loss in economic terms.

Thus security by obscurity is no security as the costs in real economic
terms do not bring benefit.

It is of no use to spend $1,000,000 protecting a $1,000 asset. This is a
loss and thus it is not a decision that provides security as the loss
exists even before the system goes live.


Current thread: