SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
Kelly Shortridge August 17, 2016
“Marketscan stay irrational longer than you can
stay solvent”
2
“You can stay irrational longer than you can stay
uncompromised”
What is behavioral economics?
 Oldschoolmodel = homoeconomicus(perfectly
rationalhumans)
 Behavioralecon=measure howwe actually
behave,nothowwe should
 Evolutionarilyviablethinking≠ rationalthinking
 Neckbeards wouldn’tsurvivelonginthe wild
3
Cognitive biases
 Peopleare “bad”atevaluatingdecisioninputs
 They’realso“bad”at evaluatingpotential
outcomes
 In general,lotsof quirks & short-cuts(heuristics)
indecision-making
 You’reprobablyfamiliarwiththingslike
confirmationbias,short-termism,Dunning-
Kruger, illusionofcontrol
4
Common complaints about infosec
 “Snakeoilserved overwordsalads”
 Hype overAPTvs. actualattacks
 Notlearningfrom mistakes
 Notusingdata to informstrategy
 Playingcat-and-mouse
5
“If you can’t handle me at my
worst, you don’t deserveme at
my best”
– Sun Tzu
6
Mygoal
 Starta different type of discussiononhowto fix
the industry,based onempiricalbehaviorvs. how
people “should”behave
 Focusonthe framework; myconclusionsarejust a
startingpoint
 Stopshaming defenders for commonhuman
biases;you probablysuck at dieting,bro
 (alsoI’llshowoffsome bad amazingcyber art)
7
What will Icover?
 Prospect Theory&Loss Aversion
 TimeInconsistency/ HyperbolicDiscounting
 Less-is-betterEffect
 SunkCost Fallacy
 Dual-systemTheory
 …and whattodo aboutallthis
8
9
Prospect theory
 Peoplechooseby evaluatingpotentialgainsand
losses viaprobability,NOTthe objectiveoutcome
 Consistentlyinconsistentbasedonbeinginthe
domainof lossesor domain ofgains
 Care aboutrelativeoutcomesinsteadof objective
ones
 Prefer asmaller,more certaingainand less-
certainchanceof asmaller loss
10
Core tenetsof Prospect Theory
 Reference pointisset againstwhichto measure
outcomes
 Losseshurt 2.25xmorethangainsfeel good
 Overweightsmall probabilitiesandunderweight
big ones
 Diminishingsensitivityto lossesor gainsthe
fartherawayfrom thereference point
11
Offensevs.Defense
 Risk averse
 Quicklyupdates
reference point
 Focuson
probabilisticvs.
absoluteoutcome
12
 Risk-seeking
 Slowto update
reference point
 Focusonabsolutevs.
probabilistic
outcome
InfoSecreference points
 Defenders: wecanwithstandZset of attacksand
notexperience material breaches,spending $X
— Domainof losses
 Attackers:we cancompromise a targetfor$X
withoutbeingcaught,achievinggoalof value$Y
— Domainof gains
13
Implications of referencepoints
 Defenders: loss whenbreached withZset of
attacks;gainfromstopping harder-than-Zattacks
 Attackers:gainwhenspend lessthan$Xor have
outcome> $Y;losswhencaughtor when$X> $Y
14
Prospect theory in InfoSec
 Defenders overweightsmall probabilityattacks
(APT)and underweightcommonones (phishing)
 Defenders alsoprefer aslimchanceof asmaller
lossor gettinga“gain”(stoppingahard attack)
 Attackersavoidhardtargets andprefer
repeatable / repackagable attacks(e.g.malicious
macros vs. bypassingEMET)
15
What are the outcomes?
 Criminallyunder-adoptedtools:EMET,2FA,
canaries,white-listing
 Criminallyover-adoptedtools:anti-APT,threat
intelligence,IPS/IDS,dark-web anything
16
Incentive problems
 Defenders can’teasilyevaluatetheir current
securityposture, risklevel,probabilitiesand
impacts of attack
 Defenders onlyfeelpain in the massivebreach
instance,otherwise“meh”
 Attackersmostly can calculatetheirposition;their
weaknessisthey feellosses 3x as muchas
defenders
17
18
Timeinconsistency
 Peopleshouldchoosethebest outcomes,
regardless oftime period
 Inreality:rewards inthefutureare lessvaluable
(followsa hyperbolicdiscount)
 Classic example: kids withmarshmallows;have
onenowor waitand get twolater (theychoose
the marshmallownow)
 Sometimesit canbegood, likewithfinancialrisk
19
Timeinconsistency in InfoSec
 Technicaldebt: “We’llmake thisthing
secure…later”
 Preferring out-of-the-boxsolutionsvs. onesthat
takeupfront investment(e.g.whitelisting)
 Lookingonlyat currentattacks vs.buildingin
resiliencefor thefuture (evenworse withstale
reference points from Prospect Theory)
20
21
Less-is-better effect
 Evaluatingthingsseparately = lesser option
 Evaluatingthingstogether= greater option
 e.g.choose7 ozof icecream inanoverflowingcup
vs. 8oz ina largercupwhenconsidered apart
 Why?Peoplefocus onthingsthatareeasier to
evaluatewhenjudgingseparately (attribute
substitution)
22
Attribute substitution
 Substituteanattributerequiring thinky-thinkyfor
aheuristicattribute
 Peopledo thisallthetime,andgenerallydon’t
realizethey’redoingit(unconsciousbias)
 Icecream example:cup isoverflowing=better
 Socialexample: it’shard toevaluateintelligence,
so judge people based onstereotypes ofrelative
intelligenceof theirrace
23
Attribute substitution in InfoSec
 Evaluatingtheefficacyof asecurityproduct is
really,really hard(same withsecurityexpertise)
 Easierto lookfor:
— Socialproof (logosona page)
— Representativeness (does it looklikeproducts
we already use / attackswe’veseen)
— Availability(abilityto recallanexample, e.g.
recentlyhypedattacks)
24
Less-is-better in InfoSec
 Anti-APTlookslikea gooddeal becauseit
probablyappears lowcost relativeto the“high
cost,”unclear-riskinessattacks it’sstopping
 2FA,canaries,etallookless impressive since
they’restopping most lowercost attacks,and risk
youcanmore easilymeasure
 Thisgetseven worse whenyoutakeProspect
Theoryintoaccount –defenders are reallybad at
estimatingprobabilities& impact ofattacks
25
26
Mental accounting
 Peoplethinkaboutvalueasrelativevs. absolute
 Notjust aboutthe valueof an outcomeor good,
butalsoits “quality”
 Peoplealsothinkaboutmoneyindifferent ways,
depending onthe amount,its originandits
purpose
27
Sunk cost fallacy
 You’veboughta $20movieticket.It starts
storming andnowyou don’twantto go…
 …butyoudo,becauseyou“alreadypaid for it”and
“need toget your money’sworth”
 Thisisirrational!Costs nowoutweighbenefits,
butyou’retreatingthe costs of your time&
inconvenienceina different mentalaccount
28
Sunk cost fallacy in InfoSec
 Justbecauseyouspent $250konafancy blinky
box,shouldn’tkeep usingit ifit doesn’t work
 Throwinggood moneyafter bad strategiesrather
thanpivotingtosomethingelse
 Or, “wespent allthis money andstillgot
breached,itisn’tworthitto spend more now”
29
30
Dual-system theory
 MindSystem 1:automatic,fast, non-conscious
 MindSystem 2:controlled,slow,conscious
 System1 is often dominantindecision-making,
esp. withtime pressure, busyness,positivity
 System2 ismore dominantwhenit’spersonaland
/ or the person isheld accountable
31
Dual-system theoryin InfoSec
 System1 buysproducts basedonflashydemos at
conferencesand sexy wordsalads
 System1 prefers establishedvendors vs.taking
the timeto evaluatealloptionsbased onefficacy
 System1 prefers stickingwithknownstrategies
and productcategories
 System1 alsocares aboutego
32
33
34
Improving heuristics: industry-level
 Only hype “legit” bugs / attacks (availability): very unlikely
 Proportionally reflect frequency of different types of
attacks (familiarity): unlikely, but easier
 Publish accurate threat data and share security metrics
(anchoring): more likely, but difficult
 Talk more about 1) the “boring” part of defense / unsexy
tech that really works 2) cool internally-developed tools
(social proof): easy enough
35
Changing incentives: defender-level
 Raisethe stakes ofattack+ decrease valueof
outcome
 Findcommonalitiesbetweentypes ofattacks&
defend againstlowestcommondenominator1st
 Erode attacker’sinformationadvantage
 Data-drivenapproach to stay “honest”
36
Leveraging attacker weaknesses
 Attackers are riskaverse andwon’tattackif:
— Toomuchuncertainty
— Costs toomuch
— Payoffistoo low
 Blocklow-costattacksfirst,minimizeabilityfor
recon,stop lateralmovement and abilityto “one-
stop-shop”for data
37
How to promoteSystem 2
 Holddefenders extra accountablefor strategic
and productdecisionstheymake
 Make itpersonal:don’tjustcheckboxes,don’t
settleforthe status quo, don’tbe a sheeple
 Leveragethe “IKEAeffect” – people valuethings
more whenthey’veput laborintothem(e.g.build
internaltooling)
38
Inequity aversion
 Peoplereallydon’tlikebeingtreated unfairly
 e.g.A is given$10 andcanshare some portion$X
withB, whowillget$X* 2. B thenhasthesame
optionback
— NashEquilibriumsays Agives $0 (self-interest)
— Actualpeople send ~50% to playerB,andB
generallysends more back to A thanreceived
39
Inequity aversion in infosec
 Maymean defenders willbe willingto sharedata,
metrics, strategies
 Notnecessarilythe“aslongasI’mfaster than
you”mentalitythatis commonlyassumed
 Keyis toset expectationsofanongoing“game”;
repeated interactionspromotes fairness
 So,foster acloser-knitdefensive communitylike
there exists for vulnresearchers
40
41
Final thoughts
 Stopwiththegame theory101 analyses– thereare
ultimatelyflawed,irrationalpeople onbothsides
 Understand yourbiasesto be vigilantin
recognizing& counteringthem
 Let’snot calldefenders stupid, let’s walkthem
throughhowtheirdecision-makingcanbe
improved
42
Questions?
 Email:kelly@greywire.net
 Twitter:@swagitda_
 Prospect Theorypost:
https://medium.com/@kshortridge/behavioral-
models-of-infosec-prospect-theory-
c6bb49902768
43

Contenu connexe

Similaire à Behavioral Models of Information Security: Industry irrationality & what to do about it

Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security BreachAlienVault
 
"Cognitive Traps in Security Planning"
"Cognitive Traps in Security Planning""Cognitive Traps in Security Planning"
"Cognitive Traps in Security Planning"Ian MacVicar
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsPECB
 
The difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityThe difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityAnup Narayanan
 
Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Roger Johnston
 
Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment MythsRoger Johnston
 
Integrated Security, Safety and Surveillance Solution i3S
Integrated Security, Safety and Surveillance Solution  i3SIntegrated Security, Safety and Surveillance Solution  i3S
Integrated Security, Safety and Surveillance Solution i3SEdgevalue
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskOsama Salah
 
The Psychology Of Security Bruce Schneier
The Psychology Of Security   Bruce SchneierThe Psychology Of Security   Bruce Schneier
The Psychology Of Security Bruce SchneierLarry Taylor Ph.D.
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013Adrian Wright
 
huntpedia.pdf
huntpedia.pdfhuntpedia.pdf
huntpedia.pdfCecilSu
 
A2 - Aspectos Psicológicos - The Psychology of Security
A2 - Aspectos Psicológicos - The Psychology of SecurityA2 - Aspectos Psicológicos - The Psychology of Security
A2 - Aspectos Psicológicos - The Psychology of SecuritySpark Security
 
Disasters and Humans (DEMS3706 SU2020, Dr. Eric Kennedy)APDEMS370
Disasters and Humans (DEMS3706 SU2020, Dr. Eric Kennedy)APDEMS370Disasters and Humans (DEMS3706 SU2020, Dr. Eric Kennedy)APDEMS370
Disasters and Humans (DEMS3706 SU2020, Dr. Eric Kennedy)APDEMS370AlyciaGold776
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
CONCEPTUALIZING AI RISK
CONCEPTUALIZING AI RISKCONCEPTUALIZING AI RISK
CONCEPTUALIZING AI RISKcscpconf
 
Lessons from the Defensive Security Podcast
Lessons from the Defensive Security PodcastLessons from the Defensive Security Podcast
Lessons from the Defensive Security PodcastJerry Bell
 
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameKelly Shortridge
 

Similaire à Behavioral Models of Information Security: Industry irrationality & what to do about it (20)

Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
 
"Cognitive Traps in Security Planning"
"Cognitive Traps in Security Planning""Cognitive Traps in Security Planning"
"Cognitive Traps in Security Planning"
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
The difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityThe difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of Security
 
Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities
 
Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
 
Integrated Security, Safety and Surveillance Solution i3S
Integrated Security, Safety and Surveillance Solution  i3SIntegrated Security, Safety and Surveillance Solution  i3S
Integrated Security, Safety and Surveillance Solution i3S
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
 
The Psychology Of Security Bruce Schneier
The Psychology Of Security   Bruce SchneierThe Psychology Of Security   Bruce Schneier
The Psychology Of Security Bruce Schneier
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
huntpedia.pdf
huntpedia.pdfhuntpedia.pdf
huntpedia.pdf
 
securitymaxims
securitymaximssecuritymaxims
securitymaxims
 
Security Maxim
Security MaximSecurity Maxim
Security Maxim
 
A2 - Aspectos Psicológicos - The Psychology of Security
A2 - Aspectos Psicológicos - The Psychology of SecurityA2 - Aspectos Psicológicos - The Psychology of Security
A2 - Aspectos Psicológicos - The Psychology of Security
 
Disasters and Humans (DEMS3706 SU2020, Dr. Eric Kennedy)APDEMS370
Disasters and Humans (DEMS3706 SU2020, Dr. Eric Kennedy)APDEMS370Disasters and Humans (DEMS3706 SU2020, Dr. Eric Kennedy)APDEMS370
Disasters and Humans (DEMS3706 SU2020, Dr. Eric Kennedy)APDEMS370
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
CONCEPTUALIZING AI RISK
CONCEPTUALIZING AI RISKCONCEPTUALIZING AI RISK
CONCEPTUALIZING AI RISK
 
Lessons from the Defensive Security Podcast
Lessons from the Defensive Security PodcastLessons from the Defensive Security Podcast
Lessons from the Defensive Security Podcast
 
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
 

Dernier

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Behavioral Models of Information Security: Industry irrationality & what to do about it

  • 2. “Marketscan stay irrational longer than you can stay solvent” 2 “You can stay irrational longer than you can stay uncompromised”
  • 3. What is behavioral economics?  Oldschoolmodel = homoeconomicus(perfectly rationalhumans)  Behavioralecon=measure howwe actually behave,nothowwe should  Evolutionarilyviablethinking≠ rationalthinking  Neckbeards wouldn’tsurvivelonginthe wild 3
  • 4. Cognitive biases  Peopleare “bad”atevaluatingdecisioninputs  They’realso“bad”at evaluatingpotential outcomes  In general,lotsof quirks & short-cuts(heuristics) indecision-making  You’reprobablyfamiliarwiththingslike confirmationbias,short-termism,Dunning- Kruger, illusionofcontrol 4
  • 5. Common complaints about infosec  “Snakeoilserved overwordsalads”  Hype overAPTvs. actualattacks  Notlearningfrom mistakes  Notusingdata to informstrategy  Playingcat-and-mouse 5
  • 6. “If you can’t handle me at my worst, you don’t deserveme at my best” – Sun Tzu 6
  • 7. Mygoal  Starta different type of discussiononhowto fix the industry,based onempiricalbehaviorvs. how people “should”behave  Focusonthe framework; myconclusionsarejust a startingpoint  Stopshaming defenders for commonhuman biases;you probablysuck at dieting,bro  (alsoI’llshowoffsome bad amazingcyber art) 7
  • 8. What will Icover?  Prospect Theory&Loss Aversion  TimeInconsistency/ HyperbolicDiscounting  Less-is-betterEffect  SunkCost Fallacy  Dual-systemTheory  …and whattodo aboutallthis 8
  • 9. 9
  • 10. Prospect theory  Peoplechooseby evaluatingpotentialgainsand losses viaprobability,NOTthe objectiveoutcome  Consistentlyinconsistentbasedonbeinginthe domainof lossesor domain ofgains  Care aboutrelativeoutcomesinsteadof objective ones  Prefer asmaller,more certaingainand less- certainchanceof asmaller loss 10
  • 11. Core tenetsof Prospect Theory  Reference pointisset againstwhichto measure outcomes  Losseshurt 2.25xmorethangainsfeel good  Overweightsmall probabilitiesandunderweight big ones  Diminishingsensitivityto lossesor gainsthe fartherawayfrom thereference point 11
  • 12. Offensevs.Defense  Risk averse  Quicklyupdates reference point  Focuson probabilisticvs. absoluteoutcome 12  Risk-seeking  Slowto update reference point  Focusonabsolutevs. probabilistic outcome
  • 13. InfoSecreference points  Defenders: wecanwithstandZset of attacksand notexperience material breaches,spending $X — Domainof losses  Attackers:we cancompromise a targetfor$X withoutbeingcaught,achievinggoalof value$Y — Domainof gains 13
  • 14. Implications of referencepoints  Defenders: loss whenbreached withZset of attacks;gainfromstopping harder-than-Zattacks  Attackers:gainwhenspend lessthan$Xor have outcome> $Y;losswhencaughtor when$X> $Y 14
  • 15. Prospect theory in InfoSec  Defenders overweightsmall probabilityattacks (APT)and underweightcommonones (phishing)  Defenders alsoprefer aslimchanceof asmaller lossor gettinga“gain”(stoppingahard attack)  Attackersavoidhardtargets andprefer repeatable / repackagable attacks(e.g.malicious macros vs. bypassingEMET) 15
  • 16. What are the outcomes?  Criminallyunder-adoptedtools:EMET,2FA, canaries,white-listing  Criminallyover-adoptedtools:anti-APT,threat intelligence,IPS/IDS,dark-web anything 16
  • 17. Incentive problems  Defenders can’teasilyevaluatetheir current securityposture, risklevel,probabilitiesand impacts of attack  Defenders onlyfeelpain in the massivebreach instance,otherwise“meh”  Attackersmostly can calculatetheirposition;their weaknessisthey feellosses 3x as muchas defenders 17
  • 18. 18
  • 19. Timeinconsistency  Peopleshouldchoosethebest outcomes, regardless oftime period  Inreality:rewards inthefutureare lessvaluable (followsa hyperbolicdiscount)  Classic example: kids withmarshmallows;have onenowor waitand get twolater (theychoose the marshmallownow)  Sometimesit canbegood, likewithfinancialrisk 19
  • 20. Timeinconsistency in InfoSec  Technicaldebt: “We’llmake thisthing secure…later”  Preferring out-of-the-boxsolutionsvs. onesthat takeupfront investment(e.g.whitelisting)  Lookingonlyat currentattacks vs.buildingin resiliencefor thefuture (evenworse withstale reference points from Prospect Theory) 20
  • 21. 21
  • 22. Less-is-better effect  Evaluatingthingsseparately = lesser option  Evaluatingthingstogether= greater option  e.g.choose7 ozof icecream inanoverflowingcup vs. 8oz ina largercupwhenconsidered apart  Why?Peoplefocus onthingsthatareeasier to evaluatewhenjudgingseparately (attribute substitution) 22
  • 23. Attribute substitution  Substituteanattributerequiring thinky-thinkyfor aheuristicattribute  Peopledo thisallthetime,andgenerallydon’t realizethey’redoingit(unconsciousbias)  Icecream example:cup isoverflowing=better  Socialexample: it’shard toevaluateintelligence, so judge people based onstereotypes ofrelative intelligenceof theirrace 23
  • 24. Attribute substitution in InfoSec  Evaluatingtheefficacyof asecurityproduct is really,really hard(same withsecurityexpertise)  Easierto lookfor: — Socialproof (logosona page) — Representativeness (does it looklikeproducts we already use / attackswe’veseen) — Availability(abilityto recallanexample, e.g. recentlyhypedattacks) 24
  • 25. Less-is-better in InfoSec  Anti-APTlookslikea gooddeal becauseit probablyappears lowcost relativeto the“high cost,”unclear-riskinessattacks it’sstopping  2FA,canaries,etallookless impressive since they’restopping most lowercost attacks,and risk youcanmore easilymeasure  Thisgetseven worse whenyoutakeProspect Theoryintoaccount –defenders are reallybad at estimatingprobabilities& impact ofattacks 25
  • 26. 26
  • 27. Mental accounting  Peoplethinkaboutvalueasrelativevs. absolute  Notjust aboutthe valueof an outcomeor good, butalsoits “quality”  Peoplealsothinkaboutmoneyindifferent ways, depending onthe amount,its originandits purpose 27
  • 28. Sunk cost fallacy  You’veboughta $20movieticket.It starts storming andnowyou don’twantto go…  …butyoudo,becauseyou“alreadypaid for it”and “need toget your money’sworth”  Thisisirrational!Costs nowoutweighbenefits, butyou’retreatingthe costs of your time& inconvenienceina different mentalaccount 28
  • 29. Sunk cost fallacy in InfoSec  Justbecauseyouspent $250konafancy blinky box,shouldn’tkeep usingit ifit doesn’t work  Throwinggood moneyafter bad strategiesrather thanpivotingtosomethingelse  Or, “wespent allthis money andstillgot breached,itisn’tworthitto spend more now” 29
  • 30. 30
  • 31. Dual-system theory  MindSystem 1:automatic,fast, non-conscious  MindSystem 2:controlled,slow,conscious  System1 is often dominantindecision-making, esp. withtime pressure, busyness,positivity  System2 ismore dominantwhenit’spersonaland / or the person isheld accountable 31
  • 32. Dual-system theoryin InfoSec  System1 buysproducts basedonflashydemos at conferencesand sexy wordsalads  System1 prefers establishedvendors vs.taking the timeto evaluatealloptionsbased onefficacy  System1 prefers stickingwithknownstrategies and productcategories  System1 alsocares aboutego 32
  • 33. 33
  • 34. 34
  • 35. Improving heuristics: industry-level  Only hype “legit” bugs / attacks (availability): very unlikely  Proportionally reflect frequency of different types of attacks (familiarity): unlikely, but easier  Publish accurate threat data and share security metrics (anchoring): more likely, but difficult  Talk more about 1) the “boring” part of defense / unsexy tech that really works 2) cool internally-developed tools (social proof): easy enough 35
  • 36. Changing incentives: defender-level  Raisethe stakes ofattack+ decrease valueof outcome  Findcommonalitiesbetweentypes ofattacks& defend againstlowestcommondenominator1st  Erode attacker’sinformationadvantage  Data-drivenapproach to stay “honest” 36
  • 37. Leveraging attacker weaknesses  Attackers are riskaverse andwon’tattackif: — Toomuchuncertainty — Costs toomuch — Payoffistoo low  Blocklow-costattacksfirst,minimizeabilityfor recon,stop lateralmovement and abilityto “one- stop-shop”for data 37
  • 38. How to promoteSystem 2  Holddefenders extra accountablefor strategic and productdecisionstheymake  Make itpersonal:don’tjustcheckboxes,don’t settleforthe status quo, don’tbe a sheeple  Leveragethe “IKEAeffect” – people valuethings more whenthey’veput laborintothem(e.g.build internaltooling) 38
  • 39. Inequity aversion  Peoplereallydon’tlikebeingtreated unfairly  e.g.A is given$10 andcanshare some portion$X withB, whowillget$X* 2. B thenhasthesame optionback — NashEquilibriumsays Agives $0 (self-interest) — Actualpeople send ~50% to playerB,andB generallysends more back to A thanreceived 39
  • 40. Inequity aversion in infosec  Maymean defenders willbe willingto sharedata, metrics, strategies  Notnecessarilythe“aslongasI’mfaster than you”mentalitythatis commonlyassumed  Keyis toset expectationsofanongoing“game”; repeated interactionspromotes fairness  So,foster acloser-knitdefensive communitylike there exists for vulnresearchers 40
  • 41. 41
  • 42. Final thoughts  Stopwiththegame theory101 analyses– thereare ultimatelyflawed,irrationalpeople onbothsides  Understand yourbiasesto be vigilantin recognizing& counteringthem  Let’snot calldefenders stupid, let’s walkthem throughhowtheirdecision-makingcanbe improved 42
  • 43. Questions?  Email:kelly@greywire.net  Twitter:@swagitda_  Prospect Theorypost: https://medium.com/@kshortridge/behavioral- models-of-infosec-prospect-theory- c6bb49902768 43