User Tools

Site Tools


security_economics

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
security_economics [2017/06/26 10:15]
fabio.massacci@unitn.it [The security cost of using free and open source components in proprietary products]
security_economics [2021/01/29 10:58] (current)
Line 5: Line 5:
  
  
 +  * On the fairness of seucirty taxes in presence on interdependence
 +  * Estimating quantitative likelihood
   * Cyber-Insurance:​ good for your company, bad for your country?   * Cyber-Insurance:​ good for your company, bad for your country?
-  * The Work Averse Attacker Model+  * The Work Averse Attacker Model (A different way to consider attackers)
   * Black markets actually work!   * Black markets actually work!
   * Risk vs Rule base regulation: what is the best way to regulate?   * Risk vs Rule base regulation: what is the best way to regulate?
Line 12: Line 14:
   * Is "more security training"​ always an effective solution? Turkey'​s case study   * Is "more security training"​ always an effective solution? Turkey'​s case study
    
-See also our section on [[vulnerability_discovery_models|Finding and Assessing Vulnerabilities]] and [[malware_analysis|Malware Analysis]].+See also our section on [[vulnerability_discovery_models|Finding and Assessing Vulnerabilities]] ​in particular if you are interesting in understanding what's the risk reduction for different types of vulnerabilities ​and [[malware_analysis|Malware Analysis]].
  
-==== Cyber-Insurancegood for your company, bad for your country? ====+====  ​Beyond 1-5 Risk Matricesestimating quantitative attack success likelihood from data  ​===
  
-Our {{:​research_activities:​economics:​aer-cyberinsurance.pdf|Cyber-insurance paper}} ​at the [[http://​weis2017.econinfosec.org/​|Workshop on Economics ​of Security 2017]] shows that in spite of what Bruce Schenider and the US Congress think, cyber-insurance might be a bad idea.+Several definitions of risk exist (probability and impact, uncertainty and expected consequence,​ etc.) but at the end of the day they all ultimately collapse to the intuitive relation ​
  
-'​Cyberinsurance'​ is a broad industry term indicating a corporate liability insurance covering damages due to security breaches of the IT corporate infrastructure. ​+  * //Risk = Impact · Likelihood//​
  
-It is booming market that raises significant expectations:​ several policy makers (e.gthe UK Paymaster General and the US Senate Committee on Security), and several cyber experts (e.g. Bruce Schneier) have heralded it as a mechanism for efficiently valuing ​the cost of cyber attacks and to act as an effective substitute government actionWhilst ​the effect of purchasing insurance on the behavior of individuals or firms has been studied for more than four decadesthe uniqueadaptOur work was motivated by the need to estimate the security effort ​of consuming +For company, impact is easy to calculate as data about one's own asset is routinely collectedLikelihood is stillthe holy grailSoboth ISO/​27001 ​and NIST 800-30 standards suggest ​the use of risk matrices ​as a tool to support such decisionsSo you get a 5x5 risk matrix, where the interaction between ​the rarefrequent..., certain likelihood levels and the minor, severe, ..., critical consequence levels results in a final 5-level risk evaluation from low to high. This is pretty rough and well known to be full of errors.
-FOSS components within a proprietary software supply chain of a large European +
-software vendor.+
  
-To this extent ​we have identified three different cost modelscentralized (the +In our {{allodi-risa-17.pdf|Risk Analysis paper}} ​we show that it is possible to compute a quantitative estimation of the success of attack likelihood. Our measure is generated by technical data that all medium-large organizations already ​have in their infrastructurevulnerability assessment tools are mandated to most firms processing credit cards, ​and periodic auditing for compliance requires VA reports to be handed ​to the assessor. SimilarlyIDS and Firewall technologies are widely adopted.  
-company checks each component ​and propagates changes ​to the different product + 
-groups)distributed (each product group is in charge ​of evaluating and fixing +This data is currently often used in an unstructured way to either generate automatic reports on vulnerability severity, or to try to traceback known incidents. Our methodology proposes to correlate this data to measure on one side the exposure ​of a system to potential attacks, and on the other the opportunities that a successful attack has to breach a vulnerable system and escalate ​to the infrastructure. By enabling users in performing objective estimations ​of risk, our methodology makes step forward toward the establishment ​of comparable measures for security 
-its consumed FOSS components), and hybrid (only the least used components are +==== Cyber-Insurance:​ good for your company, bad for your country? ==== 
-checked individually by each development team). Our work was motivated by the need to estimate ​the security effort ​of consuming + 
-FOSS components within ​proprietary software supply chain of a large European +Our {{:​research_activities:​economics:​aer-cyberinsurance.pdf|Cyber-insurance paper}} at the [[http://​weis2017.econinfosec.org/​|Workshop on Economics of Security 2017]] shows that in spite of what Bruce Schenider and the US Congress think, cyber-insurance might be a bad idea.
-software vendor.+
  
-To this extent we have identified three different cost modelscentralized ​(the +'​Cyberinsurance'​ is a broad industry term indicating a corporate liability insurance covering damages due to security breaches of the IT corporate infrastructure. It is a booming market that raises significant expectationsseveral policy makers ​(e.g. the UK Paymaster General ​and the US Senate Committee on Security), and several cyber experts ​(e.g. Bruce Schneier) have heralded it as a mechanism for efficiently valuing the cost of cyber attacks ​and to act as an effective substitute government action. Whilst the effect of purchasing insurance on the behavior of individuals or firms has been studied for more than four decades, the unique, adaptive feature of cyberinsurance have not been studied.
-company checks each component ​and propagates changes to the different product +
-groups), distributed (each product group is in charge of evaluating ​and fixing +
-its consumed FOSS components),​ and hybrid ​(only the least used components are +
-checked individually by each development team)ive characteristics ​of cyber attacks ​make past findings ​not necessarily applicable.+
  
 In our paper we show a very general model of heterogeneous firms, making risk averse decisions facing losses from cyber attacks conducted by strategic adversaries in a Cournot competition. There are essentially no assumtpions,​ except that attackers are wishing to make money, if opportunity arise and will not be very particular on the intended victims. ​ In our paper we show a very general model of heterogeneous firms, making risk averse decisions facing losses from cyber attacks conducted by strategic adversaries in a Cournot competition. There are essentially no assumtpions,​ except that attackers are wishing to make money, if opportunity arise and will not be very particular on the intended victims. ​
Line 75: Line 70:
 can be determined by the timing of first appearance of the attack in the WINE database. ​ can be determined by the timing of first appearance of the attack in the WINE database. ​
  
-If you like to have an idea of the model this other picture shows you the Change in the number of attacked systems for two attacks against different systems Δ = T days apart ({{:​research_activities:​economics:​model_extended2.pdf|PDF}})+If you like to have an idea of the model this other picture shows you the Change in the number of attacked systems for two attacks against different systems Δ = T days apart ({{:​research_activities:​economics:​model_extended2.pdf|PDF}})
 + 
 +If you are interested in knowing whether we could use this insight for actual predictions please look at our [[https://​securitylab.disi.unitn.it/​doku.php?​id=vulnerability_discovery_models|vulnerability section]] where we report our work on risk reduction that made its way to the CVSS (Common Vulnerability Scoring System) v3 world standard. 
 + 
 + 
 +==== The seconomics (security-economics) vulnerabilities of Decentralized Autonomous Organizations ==== 
 + 
 +Traditionally,​ security and economics functionalities in IT fnancial services and protocols (FinTech) have been perceived as separate objectives. In {{https://​drive.google.com/​file/​d/​0By02ZB0MmV0ZeUM5clBBUHdNdms/​view?​usp=sharing|our new paper}} in {{https://​www.cl.cam.ac.uk/​events/​spw2017/​|SPW 2017}} We argue that keeping them separate is a bad idea for FinTech Decentralized Autonomous Organizations (DAOs). In fact, security and economics are one for DAOs: we show that the failure of a security property, e.g. anonymity, can destroy a DAOs because economic attacks can be tailgated to security attacks. This is illustrated by the examples of TheDAO (built on the Ethereum platform) and the DAOed version of a Futures Exchange. We claim that **security and economics vulnerabilities**,​ which we named **seconomics vulnerabilities**,​ are indeed **new beasts to be reckoned with**. 
 + 
 +Our observation is that, in a //normal// case, monetary losses come //​indirectly//​ from security vulnerabilities. When your computer gets infected with a malware you don't immediately lose your money. Only when the hacker finds very complicated ways to monetize your assets then you suffer from the loss. In other words,  
 +  * security vulnerability ≠ money loss 
 +However, it is different for //​Decentralised Autonomous Organisation (DAO)// in which the organisation is basically a software running whose information populated on a distributed ledger platform and whose rules are all implemented with the smart contracts (e.g. TheDAO on the Ethereum network). 
 + 
 +^ ^ ^ ^ 
 +| Our first claim, which follows the DAO definition, is that | (A) | code = company| 
 +| And typically organisations are vectors for contracts and financial transactions (Tirole) | (B) | company = monetary transactions| 
 +| Then, from (A) and (B), it follows immediately that | (C) | code = monetary transactions | 
 +| As a result in this case money loss comes //​directly//​ from a security vulnerability,​ i.e. | | security vulnerability = monetary loss | 
 + 
 +Then we would certainly wonder //"​When we face a loss in a DAO, can we undo the damages?"//​ Unfortunately,​ the answer is that **there is no possible technical fix for the DAO**, as the thing that happened is the balkanization of the Ethereum network. 
 +  
 +In conclusion, for financial technology protocols, we always have to consider this kind of security economics vulnerabilities in which besides preserving the integrity or some other security properties we also need to consider the economics aspect of the application that we are trying to build because, for example, in TheDAO'​s case, **any kind of ex-post fix is impossible** (as we can see from the Ethereum network fork into the original Ethereum and the classic Etherum).
  
 ==== Malware Markets ==== ==== Malware Markets ====
Line 145: Line 161:
 and mitigation framework) would be subject and mitigation framework) would be subject
 to a risk-based regulatory framework. to a risk-based regulatory framework.
- 
  
  
Line 192: Line 207:
 ===== People ===== ===== People =====
  
-The following is a list a people ​that has been involved in the project ​at some point in time.+The following is a list a people ​who have been involved in the project
  
-  * Luca Allodi (TU Eindhoven)+  * [[http://​www.win.tue.nl/​~lallodi/​|Luca Allodi]] (TU Eindhoven) 
 +  * Martina De Gramatica
   * [[http://​www.massacci.org|Fabio Massacci]]   * [[http://​www.massacci.org|Fabio Massacci]]
-  * Martina De Gramatica\ +  * [[https://​sites.google.com/​g.unitn.it/​namnc/​home|Chan Nam Ngo]] 
-  * Woohyun Shim (now at KAP+  * [[https://​www.researchgate.net/​profile/​Woohyun_Shim3|Woohyun Shim]] (now at KIPA
-  * Julian Williams (Visiting from Durham University)+  * [[https://​www.dur.ac.uk/​research/​directory/​staff/?​id=12374|Julian Williams]] (Visiting from Durham University)
    
 ===== Projects ===== ===== Projects =====
Line 209: Line 225:
  
 ===== Publications ===== ===== Publications =====
 +  * L. Allodi, F. Massacci. **Security Events and Vulnerability Data for Cyber Security Risk Estimation.** To appear in //Risk Analysis// (Special Issue on Risk Analysis and Big Data), 2017.{{http://​onlinelibrary.wiley.com/​resolve/​doi?​DOI=10.1111/​risa.12864|PDF at Publisher}},​ {{http://​www.win.tue.nl/​~lallodi/​allodi-risa-17.pdf|Authors'​ draft}} 
 +  * F. Massacci, C.N. Ngo, J. Nie, D. Venturi, J. Williams. **The seconomics (security-economics) vulnerabilities of Decentralized Autonomous Organizations**. To appear in //Security Protocols Workshop (SPW)// 2017. {{https://​drive.google.com/​file/​d/​0By02ZB0MmV0ZeUM5clBBUHdNdms/​view?​usp=sharing|Author'​s Draft PDF}}
   * L. Allodi, F. Massacci, J. Williams. **The Work Averse Attacker Model.** In //Workshop on Economics of Information Security (WEIS)//, 2017. {{http://​weis2017.econinfosec.org/​wp-content/​uploads/​sites/​3/​2017/​05/​WEIS_2017_paper_13.pdf|PDF}}   * L. Allodi, F. Massacci, J. Williams. **The Work Averse Attacker Model.** In //Workshop on Economics of Information Security (WEIS)//, 2017. {{http://​weis2017.econinfosec.org/​wp-content/​uploads/​sites/​3/​2017/​05/​WEIS_2017_paper_13.pdf|PDF}}
   * F. Massacci, J. Williams. **Cyberinsurance and Public Policy: Self-Protection and Insurance with Endogenous Adversaries.** In //Workshop on Economics of Information Security (WEIS)//, 2017. {{http://​weis2017.econinfosec.org/​wp-content/​uploads/​sites/​3/​2017/​05/​WEIS_2017_paper_14.pdf|PDF}}   * F. Massacci, J. Williams. **Cyberinsurance and Public Policy: Self-Protection and Insurance with Endogenous Adversaries.** In //Workshop on Economics of Information Security (WEIS)//, 2017. {{http://​weis2017.econinfosec.org/​wp-content/​uploads/​sites/​3/​2017/​05/​WEIS_2017_paper_14.pdf|PDF}}
   * M. de Gramatica, F. Massacci, W. Shim, U. Turhan, J. Williams. **Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training**. To appear in //Risk Analysis//. {{:​research_activities:​economics:​risa_final.pdf|Authors'​ PDF}} or [[http://​onlinelibrary.wiley.com/​doi/​10.1111/​risa.12607/​full|Publisher'​s Early View Copy]].   * M. de Gramatica, F. Massacci, W. Shim, U. Turhan, J. Williams. **Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training**. To appear in //Risk Analysis//. {{:​research_activities:​economics:​risa_final.pdf|Authors'​ PDF}} or [[http://​onlinelibrary.wiley.com/​doi/​10.1111/​risa.12607/​full|Publisher'​s Early View Copy]].
   * L. Allodi, M. Corradin, F. Massacci. **Then and Now: On The Maturity of the Cybercrime Markets. The lesson black-hat marketeers learned.** //IEEE Transactions on Emerging Topics in Computing.//​ 4(1):35-46, 2016. {{:​research_activities:​vulnerability-analysis:​tetcs-14.pdf|Author'​s Draft PDF}} [[http://​doi.org/​10.1109/​TETC.2015.2397395]].   * L. Allodi, M. Corradin, F. Massacci. **Then and Now: On The Maturity of the Cybercrime Markets. The lesson black-hat marketeers learned.** //IEEE Transactions on Emerging Topics in Computing.//​ 4(1):35-46, 2016. {{:​research_activities:​vulnerability-analysis:​tetcs-14.pdf|Author'​s Draft PDF}} [[http://​doi.org/​10.1109/​TETC.2015.2397395]].
 +  * S. Dashevskyi, A. D. Brucker, F. Massacci. **On the Security Cost of Using a Free and Open Source Component in a Proprietary Product.** //Proc. of ESSoS 2016// pp. 190-206. 2016. [[https://​www.brucker.ch/​bibliography/​download/​2016/​dashevskyi.ea-foss-costs-2016.pdf|Authors'​ PDF]]
    * F. Massacci, R. Ruprai, M. Collison, J. Williams. **Economic Impacts of Rules-based versus Risk-based Cybersecurity Regulations in Critical Infrastructure Providers (Bulk Electricity Providers).** //IEEE Security and Privacy Magazine// 14(03):​52-60,​ 2016. {{:​research_activities:​economics:​ieee-s_p_magazine-2015-massacci.pdf|Authors'​ draft}}. [[http://​doi.org/​10.1109/​MSP.2016.48]].    * F. Massacci, R. Ruprai, M. Collison, J. Williams. **Economic Impacts of Rules-based versus Risk-based Cybersecurity Regulations in Critical Infrastructure Providers (Bulk Electricity Providers).** //IEEE Security and Privacy Magazine// 14(03):​52-60,​ 2016. {{:​research_activities:​economics:​ieee-s_p_magazine-2015-massacci.pdf|Authors'​ draft}}. [[http://​doi.org/​10.1109/​MSP.2016.48]].
   * L. Allodi. **The Heavy Tails of Vulnerability Exploitation** //In the Proceedings of ESSoS 2015// {{:​research_activities:​vulnerability-analysis:​essos-2015.pdf|PDF}}.   * L. Allodi. **The Heavy Tails of Vulnerability Exploitation** //In the Proceedings of ESSoS 2015// {{:​research_activities:​vulnerability-analysis:​essos-2015.pdf|PDF}}.
   * M. De Gramatica, F. Massacci, W. Shim, A. Tedeschi, J. Williams **IT Interdependence and the Economic Fairness of Cyber-security Regulations for Civil Aviation.** //IEEE Security and Privacy Magazine// 13(5):​52-61,​ 2015. {{:​research_activities:​economics:​sp_spsi-2015-01-0025.r1_massacci.pdf|Authors'​ draft PDF}}. [[http://​doi.org/​10.1109/​MSP.2015.98]]   * M. De Gramatica, F. Massacci, W. Shim, A. Tedeschi, J. Williams **IT Interdependence and the Economic Fairness of Cyber-security Regulations for Civil Aviation.** //IEEE Security and Privacy Magazine// 13(5):​52-61,​ 2015. {{:​research_activities:​economics:​sp_spsi-2015-01-0025.r1_massacci.pdf|Authors'​ draft PDF}}. [[http://​doi.org/​10.1109/​MSP.2015.98]]
-  * Woohyun Shim, Luca Allodi, Fabio Massacci. Crime Pays If You Are Just an Average Hacker. Proceedings of IEEE/ASE 2012 Cyber Security Conference. Complementary publication in ASE Journal 2012, Vol. 2, Best paper award. {{http://​disi.unitn.it/​~allodi/​shim-12-cybersecurity.pdf|PDF}} +  * Woohyun Shim, Luca Allodi, Fabio Massacci. ​**Crime Pays If You Are Just an Average Hacker**. Proceedings of IEEE/ASE 2012 Cyber Security Conference. Complementary publication in ASE Journal 2012, Vol. 2, Best paper award. {{http://​disi.unitn.it/​~allodi/​shim-12-cybersecurity.pdf|PDF}} 
-  * Woohyun Shim. An Analysis of Information Security Management Strategies in the Presence of Interdependent Security Risk, Asian Pacific Journal of Information Systems, vol. 22, no. 1, pp. 79-101.{{http://​disi.unitn.it/​~woohyun/​pdfs/​journal/​Shim,​%202012,​%20interdependent%20security%20risk.pdf|PDF}} +  * Woohyun Shim. **An Analysis of Information Security Management Strategies in the Presence of Interdependent Security Risk**, Asian Pacific Journal of Information Systems, vol. 22, no. 1, pp. 79-101.{{http://​disi.unitn.it/​~woohyun/​pdfs/​journal/​Shim,​%202012,​%20interdependent%20security%20risk.pdf|PDF}} 
-  * Woohyun Shim. Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities, Journal of Society for e-Business Studies, Korea, vol. 16, no. 4, pp. 53-73 {{http://​disi.unitn.it/​~woohyun/​pdfs/​journal/​Shim,​%202011,​%20KJGRBH_2011_v16n4_53.pdf|PDF}} +  * Woohyun Shim. **Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities**, Journal of Society for e-Business Studies, Korea, vol. 16, no. 4, pp. 53-73 {{http://​disi.unitn.it/​~woohyun/​pdfs/​journal/​Shim,​%202011,​%20KJGRBH_2011_v16n4_53.pdf|PDF}} 
-  * Woohyun Shim. Vulnerability and Information Security Investment under Interdependent Security Risks: A Theoretical Approach, Asian Pacific Journal of Information Systems, vol. 21, no. 4, pp. 27-43 {{http://​disi.unitn.it/​~woohyun/​pdfs/​journal/​Shim,​%202011,​%20Vul%20&​%20Sec.%20Inv_APJIS.pdf|PDF}} ​  +  * Woohyun Shim. **Vulnerability and Information Security Investment under Interdependent Security Risks: A Theoretical Approach**, Asian Pacific Journal of Information Systems, vol. 21, no. 4, pp. 27-43 {{http://​disi.unitn.it/​~woohyun/​pdfs/​journal/​Shim,​%202011,​%20Vul%20&​%20Sec.%20Inv_APJIS.pdf|PDF}} ​  
  
 ===== Talks and Tutorials ===== ===== Talks and Tutorials =====
Line 232: Line 250:
   * Woohyun Shim. Types of Information Vulnerability and IT Security Investment: An Empirical Analysis of Businesses in Korea. Paper presented at the 7th Annual Forum on Financial Information Systems and Cyber Security: A Public Policy Perspective,​ College Park, MD, January 19, 2011 {{http://​disi.unitn.it/​~woohyun/​pdfs/​conference/​Shim,​%202011,​%20Information%20Vulnerability.pdf| PDF}}    * Woohyun Shim. Types of Information Vulnerability and IT Security Investment: An Empirical Analysis of Businesses in Korea. Paper presented at the 7th Annual Forum on Financial Information Systems and Cyber Security: A Public Policy Perspective,​ College Park, MD, January 19, 2011 {{http://​disi.unitn.it/​~woohyun/​pdfs/​conference/​Shim,​%202011,​%20Information%20Vulnerability.pdf| PDF}} 
   * Woohyun Shim & Johannes Bauer. How Can Organizations Improve Cyber Security? Implementing Security Controls in the Presence of Moral Hazard. Paper presented at the 18th Biennial Conference of the International Telecommunications,​ Tokyo, Japan, June 27–30, 2010 {{http://​disi.unitn.it/​~woohyun/​pdfs/​conference/​ITS%20Draft-shim&​jmb%20(20100913).pdf|PDF}}   * Woohyun Shim & Johannes Bauer. How Can Organizations Improve Cyber Security? Implementing Security Controls in the Presence of Moral Hazard. Paper presented at the 18th Biennial Conference of the International Telecommunications,​ Tokyo, Japan, June 27–30, 2010 {{http://​disi.unitn.it/​~woohyun/​pdfs/​conference/​ITS%20Draft-shim&​jmb%20(20100913).pdf|PDF}}
- 
- 
security_economics.1498464932.txt.gz · Last modified: 2021/01/29 10:58 (external edit)