Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Economics of Web Security

Sponsored · Your Podcast. Everywhere. Effortlessly. Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
Avatar for Connor Mendenhall Connor Mendenhall
August 01, 2014
40

Economics of Web Security

Avatar for Connor Mendenhall

Connor Mendenhall

August 01, 2014
Tweet

Transcript

  1. 1. We all want to write secure software. 2. We

    don’t all know where to start.
  2. 1. We all want to write secure software. 2. We

    don’t all know where to start. 3. We’re all bad at thinking about risk, uncertainty, and probability.
  3. 1. We all want to write secure software. 2. We

    don’t all know where to start. 3. We’re all bad at thinking about risk, uncertainty, and probability. 4. We should all think like economists!
  4. “Despite neglecting even basic security measures, close to two billion

    people use the Internet, and only a small fraction appear to be victimized each year…”
  5. “This paper suggests that an explanation lies in the economics

    of attacks. We distinguish between scalable attacks, where costs are almost independent of the number of users attacked, and non-scalable (or targeted) attacks, which involve per-user effort.”
  6. “In the model where Charles exploits any vulnerability, the worst-case

    is to be expected if any defence is neglected. This leads to the following puzzling fact: the idea that worst-case outcomes become actual is not supported by evidence.”
  7. “How can it be that huge numbers of internet users

    ignore most security advice, and yet do not suffer the worst-case outcomes predicted by this threat model?”
  8. “Scalable attacks reach orders of magnitude more users. To compensate

    for her disadvantage in terms of reach the targeted attacker must target users with higher than average value.”
  9. “…Protect against scalable attacks first. Compromise is almost certain if

    Alice fails to address the scalable attacks that reach everyone. After this, Alice’s strategy depends on which, if any, of her assets are valuable enough and visible enough to place her in the top few percent of available targets.”
  10. OWASP Top Ten Injection Broken Authentication Cross-Site Scripting Insecure Object

    References Misconfiguration Sensitive Data Exposure Function Level Controls Cross Site Request Forgery Known Vulnerabilities Unvalidated Redirects https://www.owasp.org/
  11. OWASP Top Ten Injection Broken Authentication Cross-Site Scripting Insecure Object

    References Misconfiguration Sensitive Data Exposure Function Level Controls Cross Site Request Forgery Known Vulnerabilities Unvalidated Redirects 0% 10% 20% 30%
  12. OWASP Top Ten - Cumulative Distribution 0 0.25 0.5 0.75

    1 Injection Broken Authentication Cross-Site Scripting Insecure Object References Misconfiguration Sensitive Data Exposure Function Level Controls Cross Site Request Forgery Known Vulnerabilities Unvalidated Redirects
  13. Think about costs and trade-offs. Consider the value of your

    users and the costs of attacks. Defend against Karl first.
  14. Resources The Web Application Hacker’s Handbook OWASP Top Ten OWASP

    Development guides Economics and Security Resource Page