[59952] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: User negligence?

daemon@ATHENA.MIT.EDU (Jamie Reid)
Sun Jul 27 16:18:43 2003

Date: Sun, 27 Jul 2003 16:16:30 -0400
From: "Jamie Reid" <Jamie.Reid@mbs.gov.on.ca>
To: chris@UU.NET, nanog@vo.cnchost.com
Cc: nanog@merit.edu, wb8foz@nrk.com
Errors-To: owner-nanog-outgoing@merit.edu


This is a MIME message. If you are reading this text, you may want to 
consider changing to a mail reader or gateway that understands how to 
properly handle MIME multipart messages.

--=_722C6432.9BFA74A3
Content-Type: text/plain;
 charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline


I wonder if this could just be solved by selling fraud insurance?=20
It could be another ridiculous bank surcharge or service, but would
negate the need for byzantine technology infrastructures to support it.=20

All that user end security devices do is put more non-repudiable=20
onus on the user, so that when it fails, the service provider is protected,=
=20
and the user is cryptographically guaranteed to be SOL. Biometrics
are an excellent example of this. They are a single factor authentication=
=20
technology, maybe two factor if there is a PIN, and when the database
gets compromised, nobody will believe that the user isn't responsible,=20
because "The System is Perfect".=20

Many security technologies are based upon the risk avoidance paradigm
of government/military organizations, instead of the more practical=20
risk management perspective of more nimble organizations.  This is
partially why alot of technologies aren't getting adopted. They are =
Perfect, but=20
a burden.=20

The solution that balances security and accessability will be the one =
that=20
incorporates an acceptable loss expectancy and enables the company to =
leverage the
convenience of that risk. Building massive  security structures does =
little to=20
decrease the actual risk, they just push it out to the edges, that is, =
to=20
customers. =20

The ubiquity of personal computers as general information appliances has =
made=20
them more of an interface to the economy than the tools that we are used =
to=20
using them as. Since these interfaces are as diversely designed as wallets =
(M$
turned our machines into wallets), we can either demand better wallet =
security=20
devices, or we can mitigate risks to their contents through insurance. =20


--
Jamie.Reid, CISSP, jamie.reid@mbs.gov.on.ca
Senior Security Specialist, Information Protection Centre=20
Corporate Security, MBS =20
416 327 2324=20
>>> "Christopher L. Morrow" <chris@UU.NET> 07/27/03 03:39pm >>>

On Sun, 27 Jul 2003, JC Dill wrote:

>
> At 07:21 AM 7/27/2003, David Lesher wrote:
>
> >Strip <http://www.zetetic.net/index.html> is your helper here.
>
> I have strip.  Unfortunately, I don't always have my Palm at hand when I
> want to login to my bank, and I didn't have it at hand the *last* time,
> when I had to change the password, so the new password didn't get =
entered
> into strip.  But that's beside the point, using strip on a pda (to help
> remember passwords) is a solution that only works for some people, in =
some
> circumstances.  It would be much better to have a policy that just =
WORKED.
>

or a 10 dollar key fob that always had a code you could combine with your
'pin' for a password... why is a solution like RSA/ACE so difficult for
people to accept on a wide scale?

Afterall, banks charge you for checks, why not for the FOB, and make you
purchase the replacement when you lose it?


-Chris

--=_722C6432.9BFA74A3
Content-Type: text/plain
Content-Disposition: attachment;
 filename=TEXT.htm
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.2800.1106" name=GENERATOR></HEAD>
<BODY style="MARGIN-TOP: 2px; FONT: 8pt Tahoma; MARGIN-LEFT: 2px">
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1>I wonder if this could just be solved by selling fraud 
insurance? </FONT></DIV>
<DIV><FONT size=1>It could be another ridiculous bank surcharge or service, but 
would</FONT></DIV>
<DIV><FONT size=1>negate the need for byzantine technology infrastructures to 
support it. </FONT></DIV>
<DIV><FONT size=1></FONT>&nbsp;</DIV>
<DIV><FONT size=1>All that user end security devices do is put more 
non-repudiable </FONT></DIV>
<DIV><FONT size=1>onus on the user, so that when it fails, the service provider 
is protected, </FONT></DIV>
<DIV><FONT size=1>and the user is cryptographically guaranteed to be SOL. 
Biometrics</FONT></DIV>
<DIV><FONT size=1>are an excellent example of this. They are a single factor 
authentication </FONT></DIV>
<DIV><FONT size=1>technology, maybe two factor if there is a PIN, and when the 
database</FONT></DIV>
<DIV><FONT size=1>gets compromised, nobody will believe that the user isn't 
responsible, </FONT></DIV>
<DIV><FONT size=1>because&nbsp;"The System is Perfect". </FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=1>Many security technologies are based upon the risk avoidance 
paradigm</FONT></DIV>
<DIV><FONT size=1>of&nbsp;government/military organizations, instead of 
the&nbsp;more practical </FONT></DIV>
<DIV><FONT size=1>risk management perspective of more nimble organizations. 
</FONT>&nbsp;This is</DIV>
<DIV>partially why alot of technologies aren't getting adopted. They are 
Perfect, but </DIV>
<DIV>a burden. </DIV>
<DIV>&nbsp;</DIV>
<DIV>The solution that balances security and accessability will be the one that 
</DIV>
<DIV>incorporates&nbsp;an acceptable loss expectancy and enables the company to 
leverage the</DIV>
<DIV>convenience of that risk. Building massive&nbsp; security 
structures&nbsp;does little to </DIV>
<DIV>decrease the&nbsp;actual risk, they&nbsp;just push it out to the edges, 
that is, to </DIV>
<DIV>customers. &nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV>The ubiquity of personal computers as general information&nbsp;appliances 
has made </DIV>
<DIV>them more of an interface to the economy than the tools that we are used to 
</DIV>
<DIV>using them as. Since these interfaces are as diversely designed&nbsp;as 
wallets (M$</DIV>
<DIV>turned our machines into wallets), we can either&nbsp;demand 
better&nbsp;wallet security </DIV>
<DIV>devices, or we can mitigate risks to their contents&nbsp;through insurance. 
&nbsp;<BR></DIV>
<DIV>&nbsp;</DIV>
<DIV>--<BR>Jamie.Reid, CISSP, <A 
href="mailto:jamie.reid@mbs.gov.on.ca">jamie.reid@mbs.gov.on.ca</A><BR>Senior 
Security Specialist, Information Protection Centre <BR>Corporate Security, 
MBS&nbsp; <BR>416 327 2324 <BR>&gt;&gt;&gt; "Christopher L. Morrow" 
&lt;chris@UU.NET&gt; 07/27/03 03:39pm &gt;&gt;&gt;<BR><BR>On Sun, 27 Jul 2003, 
JC Dill wrote:<BR><BR>&gt;<BR>&gt; At 07:21 AM 7/27/2003, David Lesher 
wrote:<BR>&gt;<BR>&gt; &gt;Strip &lt;<A 
href="http://www.zetetic.net/index.html">http://www.zetetic.net/index.html</A>&gt; 
is your helper here.<BR>&gt;<BR>&gt; I have strip.&nbsp; Unfortunately, I don't 
always have my Palm at hand when I<BR>&gt; want to login to my bank, and I 
didn't have it at hand the *last* time,<BR>&gt; when I had to change the 
password, so the new password didn't get entered<BR>&gt; into strip.&nbsp; But 
that's beside the point, using strip on a pda (to help<BR>&gt; remember 
passwords) is a solution that only works for some people, in some<BR>&gt; 
circumstances.&nbsp; It would be much better to have a policy that just 
WORKED.<BR>&gt;<BR><BR>or a 10 dollar key fob that always had a code you could 
combine with your<BR>'pin' for a password... why is a solution like RSA/ACE so 
difficult for<BR>people to accept on a wide scale?<BR><BR>Afterall, banks charge 
you for checks, why not for the FOB, and make you<BR>purchase the replacement 
when you lose it?<BR><BR><BR>-Chris<BR><BR><BR></DIV></BODY></HTML>

--=_722C6432.9BFA74A3--


home help back first fref pref prev next nref lref last post