SlideShare une entreprise Scribd logo
1  sur  34
Télécharger pour lire hors ligne
Why IT Security is fucked up ...
... and what we can do about it
Stefan Schumacher
www.sicherheitsforschung-magdeburg.de
Positive Hack Days 2015
Moscow, Russia
2015-05-26
$ Id: ItSec-Input.tex,v 1.4 2014/11/20 16:22:14 stefan Exp $
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 1 / 29
ToC
1 Intro
2 Social Science
3 Psychology
4 What to do?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 2 / 29
ToC
1 Intro
2 Social Science
3 Psychology
4 What to do?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 3 / 29
About me
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 4 / 29
About me
Head of the Magdeburg Institute for Security Research
Editor of the Magdeburg Journal of Security Research
Freelance Security Consultant
Hacker for 20 years, ex-NetBSD developer
Educational Science and Psychology
Research on Social Engineering, Security Awareness,
Organizational Security
psychological profiling for social engineering
my PoV is more a psychological PoV
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 5 / 29
Psychology of Security
Fundamental Research about the Perception of Security
Fundamental Research about Personality/Attitudes and Security
Organizational Development and Security
Cultural Differences
Didactics (Teaching Methodology) of Security
What to teach?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 6 / 29
ToC
1 Intro
2 Social Science
3 Psychology
4 What to do?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 7 / 29
Security in a Post NSA age?
Talk at AusCERT (Australia) 2014
Can there be »security« in a Post NSA age?
Are the 5 eyes an almighty adversary?
Panopticon Panspectron
If so, why and how?
If not, shouldn’t we just surrender?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 8 / 29
Security in a Post NSA age?
Of course there can and will be security post NSA.
Let’s discuss some problems and ideas.
And have a holistic view (read: not just technical)
use sociological system theory and 2nd order cybernetics
use psychology to discuss human behaviour and experience
reflect on the foundation of science
and how useful are the methods we use?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 9 / 29
Definition (Outrage as a Svc @OaaSvc)
Science is awesome. You aren’t doing science in infosec. Why not?
Seems to be the overriding message of @0xKaishakunin
#AusCERT2014
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 10 / 29
Stand Back!
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 11 / 29
Consequences for us?
What do the Snowden Leaks mean for us as security researchers?
Let’s assume there is an adversary with almost unlimited
resources.
How do we have to change how security works?
What research has to be done?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 12 / 29
2nd Order Cybernetics
break the circlejerk
Cybernetics: transdisciplinary approach for exploring regulatory
systems, their structures, constraints, and possibilities.
Anything said, is said by an observer (Maturana/Varela)
add the observer to the regulatory system: 2nd order cybernetics
An observer acting in his field: 1st order cybernetics
An observer discussing how he constructs his perception of the
field he works in: 2nd order cybernetics (What the hell are we
doing here?)
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 13 / 29
Trust
Trust is one of the buzzwords here
needs to be defined or explicated
and operationalized (make it measurable)
Niklas Luhmann explicated Trust in his 1968 Book Vertrauen
as a »mechanism to reduce social complexity«
social complexity is reduced with functional specialised
subsystems
Lawyers a experts for Laws, Hackers for IT-Sec, Physicians for
Medicine etc. pp.
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 14 / 29
Consequences
IT Security needs to professionalize beyond technical problems
discussing the 31337th Buffer Overflow of the week won’t fix
fundamental problems
human factors have to be analysed
extend IT Security to Information Security
create a new scientific field of Information Security
include Psychology, Sociology, Educational Science, Didactics and
others
operationalize Information Security to make it measurable
create a new vocational field of Information Security
backed by science
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 15 / 29
ToC
1 Intro
2 Social Science
3 Psychology
4 What to do?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 16 / 29
Why Psychology?
empirical and theoretical science
describes, explains and predicts human behaviour and
experiences
human development and the internal and external causes and
conditions
Differential and Personality P., Social P., Industrial P.,
Organisational P., Pedagogical P.
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 17 / 29
What is security?
Germany, Informatics
VIVA-Kriterien
confidentiality
integrity
availability
authenticity
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 18 / 29
Paradigm Shift
see Thomas S. Kuhn The Structure of Scientific Revolution
Paradigm: a distinct concept or thought patterns and basic
assumptions
Paradigm Shift: change of these assumption
let’s change it
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 19 / 29
Psychology and IT-Security?
My Operationalisation of InfoSec
Security is a latent social construct.
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 20 / 29
Security and Psychology
Security is concluded by making Decisions
Individuals make decisions based on their Biography, the
Situation and how they perceive their Environment
see: von Foerster, Luhmann, Spencer Brown, Baecker et.al.
Psychology is the Science which researches these Topics.
Therefore, Psychology is required to research Security.
Psychology is the only Science able to research the basic
fundamentals of Security.
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 21 / 29
Washing your Hands
two maternity clinics in Vienna, the 1st with MDs the second with
midwifes only
more pregnant Women died in the 1st one
pregnant women would rather give birth in the streets than be
sent to the 1st clinic
Ignaz Semmelweis discovered that Physicians transmit
pathogenic agents (cadaverous poisoning)
He proposed that Physicians should wash their Hands
the death rate dropped 90%
His Idea was rejected and he was considered to be crazy
psychiatrised by force in Vienna
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
Washing your Hands
two maternity clinics in Vienna, the 1st with MDs the second with
midwifes only
more pregnant Women died in the 1st one
pregnant women would rather give birth in the streets than be
sent to the 1st clinic
Ignaz Semmelweis discovered that Physicians transmit
pathogenic agents (cadaverous poisoning)
He proposed that Physicians should wash their Hands
the death rate dropped 90%
His Idea was rejected and he was considered to be crazy
psychiatrised by force in Vienna
This can only be explained by Psychology
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
Washing your Hands
two maternity clinics in Vienna, the 1st with MDs the second with
midwifes only
more pregnant Women died in the 1st one
pregnant women would rather give birth in the streets than be
sent to the 1st clinic
Ignaz Semmelweis discovered that Physicians transmit
pathogenic agents (cadaverous poisoning)
He proposed that Physicians should wash their Hands
the death rate dropped 90%
His Idea was rejected and he was considered to be crazy
psychiatrised by force in Vienna
This can only be explained by Psychology
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
1996: Ariane 5 Flight 501
320 000 000 Euro
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 23 / 29
ToC
1 Intro
2 Social Science
3 Psychology
4 What to do?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 24 / 29
Societal Problems
digital divide
economy and IT
checks and balances?
How do politicians decide about things they don’t understand?
(Max Weber again ...)
and scientists?
Why and How did Rijndael become AES? NSA? NIST? Illuminati?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 25 / 29
Societal Problems
digital divide
economy and IT
checks and balances?
How do politicians decide about things they don’t understand?
(Max Weber again ...)
and scientists?
Why and How did Rijndael become AES? NSA? NIST? Illuminati?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 25 / 29
Political Problems
Cyber-War? Cyber-Terror?
discussed by political scientists – who often don’t understand
technology
discussed by IT sec – who often don’t understand social
implications
discussed by the military – who often don’t understand anything
discussed by legal experts – who often don’t understand
technology and social implications
How to discuss Anonymous? Hacktivism? Neutral?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 26 / 29
Political Problems
Cyber-War? Cyber-Terror?
discussed by political scientists – who often don’t understand
technology
discussed by IT sec – who often don’t understand social
implications
discussed by the military – who often don’t understand anything
discussed by legal experts – who often don’t understand
technology and social implications
How to discuss Anonymous? Hacktivism? Neutral?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 26 / 29
Reflection
The information technology of society?
The hackers of society?
The intelligence services of society?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 27 / 29
Conclusion
IT-Security needs it’s own research field: security research
with it’s own foundation, methods and tools
rooted in:
Maths as formal science
CS/EE as engineering science
Sociology, Political Science as social science
Jurisprudence as normative science
Philosophy as mother of all sciences
Psychology as hub science
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 28 / 29
Information Security
Pedagogy
Curriculum
Universities
Vociational Schools
Schools
Didactics
Whom to teach?
What to teach?
How to teach?
Training
JurisprudenceNorms
Philosophy Philosophy of Science
Political Science
Policies
Governance
Normative Processes
Sociology
Systems of Society
Organisational Sociology
Industrial Sociology
Psychology
Personality Traits and Security
Research Methods
Perceptions of Security
Human Factors
Maths Formal Science
Electrical Engineering
Computer Science
sicherheitsforschung-magdeburg.de
stefan.schumacher@sicherheitsforschung-magdeburg.de
sicherheitsforschung-magdeburg.de/publikationen/
journal.html
youtube.de/
Sicherheitsforschung
Twitter: 0xKaishakunin
Xing: Stefan Schumacher
GnuPG: 9475 1687 4218 026F 6ACF 89EE
8B63 6058 D015 B8EF
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 29 / 29

Contenu connexe

En vedette

Эксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAPЭксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAPPositive Hack Days
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюPositive Hack Days
 
Magic Box, или Как пришлось сломать банкоматы, чтобы их спасти
Magic Box, или Как пришлось сломать банкоматы, чтобы их спастиMagic Box, или Как пришлось сломать банкоматы, чтобы их спасти
Magic Box, или Как пришлось сломать банкоматы, чтобы их спастиPositive Hack Days
 
Боремся с читингом в онлайн-играх
Боремся с читингом в онлайн-играхБоремся с читингом в онлайн-играх
Боремся с читингом в онлайн-играхPositive Hack Days
 
Ковбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградойКовбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградойPositive Hack Days
 
DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorPositive Hack Days
 
200 open source проектов спустя: опыт статического анализа исходного кода
200 open source проектов спустя:опыт статического анализа исходного кода200 open source проектов спустя:опыт статического анализа исходного кода
200 open source проектов спустя: опыт статического анализа исходного кодаPositive Hack Days
 
Обратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai StructОбратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai StructPositive Hack Days
 
Вирусы есть? А если найду?
Вирусы есть? А если найду?Вирусы есть? А если найду?
Вирусы есть? А если найду?Positive Hack Days
 
Как «вправить» автомобилю «мозги»
Как «вправить» автомобилю «мозги»Как «вправить» автомобилю «мозги»
Как «вправить» автомобилю «мозги»Positive Hack Days
 
Современные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защитеСовременные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защитеPositive Hack Days
 
Использование KASan для автономного гипервизора
Использование KASan для автономного гипервизораИспользование KASan для автономного гипервизора
Использование KASan для автономного гипервизораPositive Hack Days
 
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Laterjohn-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types LaterPositive Hack Days
 
Псевдобезопасность NFC-сервисов
Псевдобезопасность NFC-сервисовПсевдобезопасность NFC-сервисов
Псевдобезопасность NFC-сервисовPositive Hack Days
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Positive Hack Days
 
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...Positive Hack Days
 
Application security? Firewall it!
Application security? Firewall it!Application security? Firewall it!
Application security? Firewall it!Positive Hack Days
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиPositive Hack Days
 
Безопасность бумажная и техническая: им не жить друг без друга
Безопасность бумажная и техническая: им не жить друг без другаБезопасность бумажная и техническая: им не жить друг без друга
Безопасность бумажная и техническая: им не жить друг без другаPositive Hack Days
 

En vedette (20)

Эксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAPЭксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAP
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
 
Magic Box, или Как пришлось сломать банкоматы, чтобы их спасти
Magic Box, или Как пришлось сломать банкоматы, чтобы их спастиMagic Box, или Как пришлось сломать банкоматы, чтобы их спасти
Magic Box, или Как пришлось сломать банкоматы, чтобы их спасти
 
Боремся с читингом в онлайн-играх
Боремся с читингом в онлайн-играхБоремся с читингом в онлайн-играх
Боремся с читингом в онлайн-играх
 
Ковбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградойКовбой Энди, Рик Декард и другие охотники за наградой
Ковбой Энди, Рик Декард и другие охотники за наградой
 
DNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense VectorDNS как линия защиты/DNS as a Defense Vector
DNS как линия защиты/DNS as a Defense Vector
 
200 open source проектов спустя: опыт статического анализа исходного кода
200 open source проектов спустя:опыт статического анализа исходного кода200 open source проектов спустя:опыт статического анализа исходного кода
200 open source проектов спустя: опыт статического анализа исходного кода
 
Обратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai StructОбратная разработка бинарных форматов с помощью Kaitai Struct
Обратная разработка бинарных форматов с помощью Kaitai Struct
 
Вирусы есть? А если найду?
Вирусы есть? А если найду?Вирусы есть? А если найду?
Вирусы есть? А если найду?
 
Как «вправить» автомобилю «мозги»
Как «вправить» автомобилю «мозги»Как «вправить» автомобилю «мозги»
Как «вправить» автомобилю «мозги»
 
Защищенность GSM
Защищенность GSMЗащищенность GSM
Защищенность GSM
 
Современные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защитеСовременные DDoS-атаки: тенденции, опасность, подходы к защите
Современные DDoS-атаки: тенденции, опасность, подходы к защите
 
Использование KASan для автономного гипервизора
Использование KASan для автономного гипервизораИспользование KASan для автономного гипервизора
Использование KASan для автономного гипервизора
 
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Laterjohn-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
 
Псевдобезопасность NFC-сервисов
Псевдобезопасность NFC-сервисовПсевдобезопасность NFC-сервисов
Псевдобезопасность NFC-сервисов
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
 
Application security? Firewall it!
Application security? Firewall it!Application security? Firewall it!
Application security? Firewall it!
 
Строим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атакиСтроим ханипот и выявляем DDoS-атаки
Строим ханипот и выявляем DDoS-атаки
 
Безопасность бумажная и техническая: им не жить друг без друга
Безопасность бумажная и техническая: им не жить друг без другаБезопасность бумажная и техническая: им не жить друг без друга
Безопасность бумажная и техническая: им не жить друг без друга
 

Similaire à Why IT Security Is Fucked Up

Hieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurityHieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecuritySecurity Bootcamp
 
Walter Mitty Essay.pdf
Walter Mitty Essay.pdfWalter Mitty Essay.pdf
Walter Mitty Essay.pdfKaty Langley
 
If you can't beat em, join em
If you can't beat em, join emIf you can't beat em, join em
If you can't beat em, join emJohn Eberhardt
 
Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTVivekanandan M
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos Isaris
 
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and PrivacyCybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and PrivacyHarshitParkar6677
 
99 best cyber security podcasts for beginners
99 best cyber security podcasts for beginners 99 best cyber security podcasts for beginners
99 best cyber security podcasts for beginners Infosec Reporter
 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsJack Whitsitt
 
Carl Miller
Carl MillerCarl Miller
Carl MillerMRS
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
Digital Day Presentation Social Media Monitoring
Digital Day Presentation Social Media MonitoringDigital Day Presentation Social Media Monitoring
Digital Day Presentation Social Media Monitoringpropertynews.com
 
The Five Major Areas of AI Ethics Before Superintelligence
The Five Major Areas of AI Ethics Before SuperintelligenceThe Five Major Areas of AI Ethics Before Superintelligence
The Five Major Areas of AI Ethics Before SuperintelligenceJuho Vaiste
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityKeith Redman
 
Beyond Digital Detox and Singularity - How to stay Human in the Digital?
Beyond Digital Detox and Singularity - How to stay Human in the Digital?Beyond Digital Detox and Singularity - How to stay Human in the Digital?
Beyond Digital Detox and Singularity - How to stay Human in the Digital?Alexander Steinhart
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity laurieannwilliams
 
Algorithmic Accountability & Learning Analytics (UCL)
Algorithmic Accountability & Learning Analytics (UCL)Algorithmic Accountability & Learning Analytics (UCL)
Algorithmic Accountability & Learning Analytics (UCL)Simon Buckingham Shum
 

Similaire à Why IT Security Is Fucked Up (20)

Hieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurityHieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurity
 
Walter Mitty Essay.pdf
Walter Mitty Essay.pdfWalter Mitty Essay.pdf
Walter Mitty Essay.pdf
 
If you can't beat em, join em
If you can't beat em, join emIf you can't beat em, join em
If you can't beat em, join em
 
Computer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPTComputer hacking – Is it Ethical PPT
Computer hacking – Is it Ethical PPT
 
Pavlos_Isaris_final_report
Pavlos_Isaris_final_reportPavlos_Isaris_final_report
Pavlos_Isaris_final_report
 
Cybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and PrivacyCybersecurity, Cryptography, and Privacy
Cybersecurity, Cryptography, and Privacy
 
99 best cyber security podcasts for beginners
99 best cyber security podcasts for beginners 99 best cyber security podcasts for beginners
99 best cyber security podcasts for beginners
 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication Skills
 
Sanjiv-Crypto-BMP
Sanjiv-Crypto-BMPSanjiv-Crypto-BMP
Sanjiv-Crypto-BMP
 
Carl Miller
Carl MillerCarl Miller
Carl Miller
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Expertise reseaux
Expertise reseauxExpertise reseaux
Expertise reseaux
 
Digital Day Presentation Social Media Monitoring
Digital Day Presentation Social Media MonitoringDigital Day Presentation Social Media Monitoring
Digital Day Presentation Social Media Monitoring
 
The Five Major Areas of AI Ethics Before Superintelligence
The Five Major Areas of AI Ethics Before SuperintelligenceThe Five Major Areas of AI Ethics Before Superintelligence
The Five Major Areas of AI Ethics Before Superintelligence
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
Beyond Digital Detox and Singularity - How to stay Human in the Digital?
Beyond Digital Detox and Singularity - How to stay Human in the Digital?Beyond Digital Detox and Singularity - How to stay Human in the Digital?
Beyond Digital Detox and Singularity - How to stay Human in the Digital?
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
 
Algorithmic Accountability & Learning Analytics (UCL)
Algorithmic Accountability & Learning Analytics (UCL)Algorithmic Accountability & Learning Analytics (UCL)
Algorithmic Accountability & Learning Analytics (UCL)
 

Plus de Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikPositive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQubePositive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityPositive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 

Plus de Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Dernier

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Dernier (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Why IT Security Is Fucked Up

  • 1. Why IT Security is fucked up ... ... and what we can do about it Stefan Schumacher www.sicherheitsforschung-magdeburg.de Positive Hack Days 2015 Moscow, Russia 2015-05-26 $ Id: ItSec-Input.tex,v 1.4 2014/11/20 16:22:14 stefan Exp $ Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 1 / 29
  • 2. ToC 1 Intro 2 Social Science 3 Psychology 4 What to do? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 2 / 29
  • 3. ToC 1 Intro 2 Social Science 3 Psychology 4 What to do? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 3 / 29
  • 4. About me Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 4 / 29
  • 5. About me Head of the Magdeburg Institute for Security Research Editor of the Magdeburg Journal of Security Research Freelance Security Consultant Hacker for 20 years, ex-NetBSD developer Educational Science and Psychology Research on Social Engineering, Security Awareness, Organizational Security psychological profiling for social engineering my PoV is more a psychological PoV Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 5 / 29
  • 6. Psychology of Security Fundamental Research about the Perception of Security Fundamental Research about Personality/Attitudes and Security Organizational Development and Security Cultural Differences Didactics (Teaching Methodology) of Security What to teach? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 6 / 29
  • 7. ToC 1 Intro 2 Social Science 3 Psychology 4 What to do? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 7 / 29
  • 8. Security in a Post NSA age? Talk at AusCERT (Australia) 2014 Can there be »security« in a Post NSA age? Are the 5 eyes an almighty adversary? Panopticon Panspectron If so, why and how? If not, shouldn’t we just surrender? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 8 / 29
  • 9. Security in a Post NSA age? Of course there can and will be security post NSA. Let’s discuss some problems and ideas. And have a holistic view (read: not just technical) use sociological system theory and 2nd order cybernetics use psychology to discuss human behaviour and experience reflect on the foundation of science and how useful are the methods we use? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 9 / 29
  • 10. Definition (Outrage as a Svc @OaaSvc) Science is awesome. You aren’t doing science in infosec. Why not? Seems to be the overriding message of @0xKaishakunin #AusCERT2014 Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 10 / 29
  • 11. Stand Back! Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 11 / 29
  • 12. Consequences for us? What do the Snowden Leaks mean for us as security researchers? Let’s assume there is an adversary with almost unlimited resources. How do we have to change how security works? What research has to be done? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 12 / 29
  • 13. 2nd Order Cybernetics break the circlejerk Cybernetics: transdisciplinary approach for exploring regulatory systems, their structures, constraints, and possibilities. Anything said, is said by an observer (Maturana/Varela) add the observer to the regulatory system: 2nd order cybernetics An observer acting in his field: 1st order cybernetics An observer discussing how he constructs his perception of the field he works in: 2nd order cybernetics (What the hell are we doing here?) Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 13 / 29
  • 14. Trust Trust is one of the buzzwords here needs to be defined or explicated and operationalized (make it measurable) Niklas Luhmann explicated Trust in his 1968 Book Vertrauen as a »mechanism to reduce social complexity« social complexity is reduced with functional specialised subsystems Lawyers a experts for Laws, Hackers for IT-Sec, Physicians for Medicine etc. pp. Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 14 / 29
  • 15. Consequences IT Security needs to professionalize beyond technical problems discussing the 31337th Buffer Overflow of the week won’t fix fundamental problems human factors have to be analysed extend IT Security to Information Security create a new scientific field of Information Security include Psychology, Sociology, Educational Science, Didactics and others operationalize Information Security to make it measurable create a new vocational field of Information Security backed by science Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 15 / 29
  • 16. ToC 1 Intro 2 Social Science 3 Psychology 4 What to do? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 16 / 29
  • 17. Why Psychology? empirical and theoretical science describes, explains and predicts human behaviour and experiences human development and the internal and external causes and conditions Differential and Personality P., Social P., Industrial P., Organisational P., Pedagogical P. Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 17 / 29
  • 18. What is security? Germany, Informatics VIVA-Kriterien confidentiality integrity availability authenticity Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 18 / 29
  • 19. Paradigm Shift see Thomas S. Kuhn The Structure of Scientific Revolution Paradigm: a distinct concept or thought patterns and basic assumptions Paradigm Shift: change of these assumption let’s change it Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 19 / 29
  • 20. Psychology and IT-Security? My Operationalisation of InfoSec Security is a latent social construct. Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 20 / 29
  • 21. Security and Psychology Security is concluded by making Decisions Individuals make decisions based on their Biography, the Situation and how they perceive their Environment see: von Foerster, Luhmann, Spencer Brown, Baecker et.al. Psychology is the Science which researches these Topics. Therefore, Psychology is required to research Security. Psychology is the only Science able to research the basic fundamentals of Security. Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 21 / 29
  • 22. Washing your Hands two maternity clinics in Vienna, the 1st with MDs the second with midwifes only more pregnant Women died in the 1st one pregnant women would rather give birth in the streets than be sent to the 1st clinic Ignaz Semmelweis discovered that Physicians transmit pathogenic agents (cadaverous poisoning) He proposed that Physicians should wash their Hands the death rate dropped 90% His Idea was rejected and he was considered to be crazy psychiatrised by force in Vienna Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
  • 23. Washing your Hands two maternity clinics in Vienna, the 1st with MDs the second with midwifes only more pregnant Women died in the 1st one pregnant women would rather give birth in the streets than be sent to the 1st clinic Ignaz Semmelweis discovered that Physicians transmit pathogenic agents (cadaverous poisoning) He proposed that Physicians should wash their Hands the death rate dropped 90% His Idea was rejected and he was considered to be crazy psychiatrised by force in Vienna This can only be explained by Psychology Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
  • 24. Washing your Hands two maternity clinics in Vienna, the 1st with MDs the second with midwifes only more pregnant Women died in the 1st one pregnant women would rather give birth in the streets than be sent to the 1st clinic Ignaz Semmelweis discovered that Physicians transmit pathogenic agents (cadaverous poisoning) He proposed that Physicians should wash their Hands the death rate dropped 90% His Idea was rejected and he was considered to be crazy psychiatrised by force in Vienna This can only be explained by Psychology Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
  • 25. 1996: Ariane 5 Flight 501 320 000 000 Euro Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 23 / 29
  • 26. ToC 1 Intro 2 Social Science 3 Psychology 4 What to do? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 24 / 29
  • 27. Societal Problems digital divide economy and IT checks and balances? How do politicians decide about things they don’t understand? (Max Weber again ...) and scientists? Why and How did Rijndael become AES? NSA? NIST? Illuminati? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 25 / 29
  • 28. Societal Problems digital divide economy and IT checks and balances? How do politicians decide about things they don’t understand? (Max Weber again ...) and scientists? Why and How did Rijndael become AES? NSA? NIST? Illuminati? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 25 / 29
  • 29. Political Problems Cyber-War? Cyber-Terror? discussed by political scientists – who often don’t understand technology discussed by IT sec – who often don’t understand social implications discussed by the military – who often don’t understand anything discussed by legal experts – who often don’t understand technology and social implications How to discuss Anonymous? Hacktivism? Neutral? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 26 / 29
  • 30. Political Problems Cyber-War? Cyber-Terror? discussed by political scientists – who often don’t understand technology discussed by IT sec – who often don’t understand social implications discussed by the military – who often don’t understand anything discussed by legal experts – who often don’t understand technology and social implications How to discuss Anonymous? Hacktivism? Neutral? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 26 / 29
  • 31. Reflection The information technology of society? The hackers of society? The intelligence services of society? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 27 / 29
  • 32. Conclusion IT-Security needs it’s own research field: security research with it’s own foundation, methods and tools rooted in: Maths as formal science CS/EE as engineering science Sociology, Political Science as social science Jurisprudence as normative science Philosophy as mother of all sciences Psychology as hub science Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 28 / 29
  • 33. Information Security Pedagogy Curriculum Universities Vociational Schools Schools Didactics Whom to teach? What to teach? How to teach? Training JurisprudenceNorms Philosophy Philosophy of Science Political Science Policies Governance Normative Processes Sociology Systems of Society Organisational Sociology Industrial Sociology Psychology Personality Traits and Security Research Methods Perceptions of Security Human Factors Maths Formal Science Electrical Engineering Computer Science
  • 34. sicherheitsforschung-magdeburg.de stefan.schumacher@sicherheitsforschung-magdeburg.de sicherheitsforschung-magdeburg.de/publikationen/ journal.html youtube.de/ Sicherheitsforschung Twitter: 0xKaishakunin Xing: Stefan Schumacher GnuPG: 9475 1687 4218 026F 6ACF 89EE 8B63 6058 D015 B8EF Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 29 / 29