cybersecurity, simplicity, and complexity...cybersecurity, simplicity, and complexity 3 let’s talk...

28
1010101010101010101010100000000010101010101010101010101010 0101010101010101010101000111101010101010101011110101010011 0101011010101010000001001111101010101010101010101010101010 0101010101010101010101010101010101010101000001010000010101 1010101010101010101010101010101010101010101010101010101010 0101010101010101010101010101010101010101010101010101010101 1010101010101010101010101010101010101010101010101010101010 0101010101010101010101010101010101010101010101010101010101 1010101010101010101010101010101010101010101010101010101010 0101010101010010011010101010101010101010101010100000010101 1010101010101010101010101010101010101010101010101010101010 0101010101010101010101010101010101010101000010101010101010 0101010101010101010101000101001010101010101010101010101010 0101010101010101010101010101010101010101010101010101010101 1010101010101010101010101010101010010100101010101010101010 0101010101010101010101010101010101010101010101010101010001 1010101010101010101010101010101010101010101010101010101010 0101010101010101010101010001110101010100101001010101010101 0011110101010110100110101010101010101010101010101010101010 0101010101010101010101010101010101010101010101010101010101 1010101010101010101010101010100101010000101010101010101010 0010101010101010101010100000101010101010101010101010101010 0101010101101010101010101010101010100010101010101010101010 0101010000100101001010101010100000101010101010001001010101 1010101010101010101010101010101010101010101010101010101010 0101010101010101010101010101010101010101010000010101010100 0101100010101010101010101010101010101010101010101010101010 0101010101010101000000001101010101010101010111001000100011 1010100111010101010101010101010010001010101010101010101000 0101010101010101010101010101010101010101010101010101010101 1010101010000101010101010101011110101010101010101010100000 1110101010101010101010101010101010101010101010101010101010 0101010101010101010101010101010101010101010101010101010101 1010101110101110101010101010101010101010101010101010101010 0010101010101010101000010101010101010101010101010101010100 0101010101010101010101010101010101010101010101010101010101 1001010101010101010000101010101010101010101010101000100010 0101010101010101010101000010001101010101010100100010101011 Dan Ward CYBERSECURITY, SIMPLICITY, AND COMPLEXITY The Graphic Guide to Making Systems More Secure Without Making Them Worse NEW AMERICA March 2016

Upload: others

Post on 20-May-2020

27 views

Category:

Documents


0 download

TRANSCRIPT

10101010101010101010101010101010101010101010101010101010101010101010101010101010101010101000000000101010101010101010101010101010101010101010101010101010001111010101010101010111101010100110010101010110101010100000010011111010101010101010101010101010101010101010101010101010101010101010101010101010000010100000101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010100100110101010101010101010101010101000000101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010000101010101010101010101010101010101010101010001010010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010100101001010101010101010101000101010101010101010101010101010101010101010101010101010100010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010100011101010101001010010101010101010101000111101010101101001101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101001010100001010101010101010101000100101010101010101010101000001010101010101010101010101010101010101010101011010101010101010101010101000101010101010101010101010101010100001001010010101010101000001010101010100010010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010100000101010101000010101011000101010101010101010101010101010101010101010101010101010101010101010101010000000011010101010101010101110010001000110101010101001110101010101010101010100100010101010101010101010001001101010101010101010101010101010101010101010101010101010101010101010101010100001010101010101010111101010101010101010101000000000111101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101010101011101011101010101010101010101010101010101010101010100000000101010101010101010000101010101010101010101010101010101000010101010101010101010101010101010101010101010101010101010101010101010010101010101010100001010101010101010101010101010001000101010101010101010101010101010000100011010101010101001000101010110010101010101010101010101

Dan Ward

CYBERSECURITY, SIMPLICITY, AND COMPLEXITYThe Graphic Guide to Making Systems More Secure Without Making Them Worse

NEWAMERICA

March 2016

2 CYBERSECURITY INITIATIVE

About the Author

Dan Ward is the author of The Simplicity Cycle: A Field Guide To Making Things Better Without Making Them Worse (HarperBusiness, 2015)

and F.I.R.E.: How Fast, Inexpensive, Restrained and Elegant Methods Ignite Innovation (HarperBusiness, 2014).

Prior to launching Dan Ward Consulting, he served as an acquisition officer in the US Air Force, where he specialized in leading high-speed, low-cost technology development programs and retired at the rank of Lieutenant Colonel.

Dan’s expertise on defense acquisition reform has been featured in publications from the White House, the U.S. Senate and the British Parliament. His writings have also appeared in outlets including Fast Company, Forbes, The Boston Globe, Armed Forces Journal, and Small Wars Journal.

Dan holds three engineering degrees and received the Bronze Star Medal for his service at NATO Headquarters in Afghanistan leading an international team of officers from five different countries. He lives in Massachusetts with his wife and two children.

About the Artist

Hannah White is a D.C.-based designer and illustrator. She studied digital design at the George Washington University through the

Corcoran College of Art and Design.

About New America

New America is committed to renewing American politics, prosperity, and purpose in the Digital Age. We generate big ideas, bridge the gap between technology and policy, and curate broad public conversation. We combine the best of a policy research institute, technology laboratory, public forum, media platform, and a venture capital fund for ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who believe deeply in the possibility of American renewal.

Find out more at newamerica.org/our-story.

About the Cybersecurity Initiative

The Internet has connected us. Yet the policies and debates that surround the security of our networks are too often disconnected, disjointed, and stuck in an unsuccessful status quo. This is what New Amer-ica’s Cybersecurity Initiative is designed to address. Working across our International Security Program and the Open Technology Institute, we believe that it takes a wider network to face the multitude of diverse security issues. We engage across organizations, is-sue areas, professional fields, and business sectors. And through events, writing and research, our aim is to help improve cybersecurity in ways that work—for the countries, for companies, and for individuals.

Find out more at newamerica.org/cybersecuri-ty-initiative.

Acknowledgements

Bruce Schneier for generously agreeing to talk with me.

3Cybersecurity, Simplicity, and Complexity

Let’s talk about

cybersecurity.Specifically, let’s look at the way complexity affects the vulnerability of cyber-systems.

Note that I didn’t say perfect.

Why does complexity in cyberspace matter?

Complexity is

A. IncreasingB. InevitableC. UnavoidableD. A pretty big problemE. All of the above

As we’ll see, simplifying things can make our system more secure.

Take this short quiz to find out.

4 CYBERSECURITY INITIATIVE

People have all sorts of crazy ideas about

Simplify all the things!

simplicity.Some people love it too much...

Simplicity?

I fear simplicity.

...While others don’t trust it at all.

In contrast, GRT Corp says “We must embrace complexity to improve cybersecurity.” According to them, complexity fosters security.

Black Hat founder Jeff Moss argues for Radical Simplicity in cyber-systems, which involves stripping away excess functions from critical systems to protect core processes.

5Cybersecurity, Simplicity, and Complexity

And way back in 1999, Bruce Schneier wrote:

“The worst enemy of security is complexity.”

So who is right? Schneier, of course. That guy is brilliant.

But Team Complexity has a point too. See, cyberspace is a complex place... tool...network...er, thing. And it’s getting more complex everyday.

Bruce Schneier

6 CYBERSECURITY INITIATIVE

What started out as a small group of loosely connected machines that performed a few functions is now a vast network of deeply intertwingled nodes that does almost everything.

And don’t get me started on the whole Internet of Things! So let’s not pretend this stuff can ever be simple. But while today’s level of necessary complexity is higher than yesterday’s, just like Schneier predicted...

“The networks of the future will be necessarily more complex, and therefore less secure.” Schneier, 1999

7Cybersecurity, Simplicity, and Complexity

...there’s plenty of unnecessary complexity out there, and it’s only increased over time. That represents a pretty big opportunity for improvement. The idea is to minimize unnecessary complexity.

Complexity reduces security in several ways. First, complexity makes vulnerabilities harder for developers and testers to uncover. Each feature, function, and interaction is a potential threat vector.

The more pieces, the more time and effort is required to test them all.

unnecessary

necessary

com

plex

ity

yesterday today

8 CYBERSECURITY INITIATIVE

...or C++ stack, in our case.

It’s the proverbial needle in the haystack!

Second, complexity makes vulnerabilities harder to fix once we find them.Particularly if the system in question violates the “high cohesion/low coupling” principle. Excessively complicated systems usually do, so flaws in one area ripple through the rest of the system.

Low cohesion / high coupling: This structure is not secure and

difficult to debug.

High cohesion / low coupling: This structure is more secure and

easier to debug.

hay3

hay2

hay1

needle

High cohesion means modules are tightly focused on a single function.

Low coupling means that modules have few dependencies between them.

9Cybersecurity, Simplicity, and Complexity

But worst of all, complexity creates the illusion of security.

That can be an expensive and dangerous illusion to maintain. When we think our systems are more secure than they actually are...

Ok, wait a minute. Didn’t that quiz on page one say that complexity is inevitable? Sounds like we don’t have an option!

...we’re setting ourselves up for some nasty surprises.Read any issue of 2600 Magazine for proof of that.

10 CYBERSECURITY INITIATIVE

COMPUTER SCIENCE 101

Good news!

For all of my fellow coders:

Remember what your first comp sci professor said about modular design methods, well-defined interfaces, and stuff like that. Turns out the prof was right.

Not a coder? Not a problem!

Well-informed consumers can insist on this. So can CIO’s and policymakers and think tanks.

And me of course. We all have a role to play.

We have an option.

11Cybersecurity, Simplicity, and Complexity

This isn’t just about IT systems. Cyber vulnerabilities can also affect hardware.

Like a F-35 Fighter Joint Strike Fighter Jet, for example. A pretty scary article described a scenario where the F-35 could be taken down without a single shot fired.

How? By exploiting ALIS, the computer that feeds the helmet display.

A hacker could theoretically brick the jet—or the entire fleet—through ALIS.

And that’s only one potential threat vector. The F-35 relies on nearly 30 million lines of code. With that much complexity comes a lot of hidden vulnerabilities.

12 CYBERSECURITY INITIATIVE

GHOST FLEETP.W. SINGER & AUGUST COLE

In the recent novel Ghost Fleet, hacked computer chips render the JSF useless in combat. Sure, it’s fiction, but it’s really well-researched fiction.

I hope you see there are some steps we need to take to generate improvement. There are technical steps we can take to make technology more secure. Dan Kruger, founder of Absio, has one suggection:

“Cybersecurity is radically simplified if we move primary

information security into the information itself.”

That reduces the number of useful attack vectors and “ruins the economics of hacking.”

There are also procedures we could follow. Like, people should stop using “1234” as their password.

Quit doing that, people.

13Cybersecurity, Simplicity, and Complexity

Name:

Password:

Shodan, a search engine for the Internet of Things, shows that lots of important systems retain their default login and password.

admin

1234

In a world of Internet complexity, dumb passwords can create huge vulnerabilities.

We’re talking power plants, medical devices, traffic control systems, and security cameras.

Fixing the “1234 vulnerability” is as easy as hard-coding a first-use password reset requirement.

It’s not a sexy fix—simplicity seldom is—but it would be a great first step. Still, the core issue is that we need to make better decisions.

14 CYBERSECURITY INITIATIVE

Good news—there is a book where you can read all about how to make better decisions when it comes to complexity!It’s called The Simplicity Cycle. The book explores the relationship between complexity and goodness in a wide range of situations.

In this context,“goodness” means security.

The goal is to highlight ways to make things better...without making them worse.

CO

MP

LEX

ITY

GOODNESS

For example, the early ARPANET protocols were all about openness, not security.

That puts us in the lower left corner of the chart. Down there, complexity is low, and so is security.

15Cybersecurity, Simplicity, and Complexity

CO

MP

LEX

ITY

GOODNESS

CO

MP

LEX

ITY

GOODNESS

As the Internet grew, security started to matter.

So we added passwords, encryption, and VPNs. Things got more complex and more secure.

That was OK for a while. But if we’re not careful, increased complexity will make things worse!

In this area, people tend to make loopholes and backdoors...or they just don’t use the system.

The result is essentially a self-inflicted denial-of-service-attack. Not OK!

CO

MP

LEX

ITY

GOODNESS

16 CYBERSECURITY INITIATIVE

CO

MP

LEX

ITY

GOODNESS

re g

oing to see the wizard, t

he w

onde

rf

ul w

izar

d of OZ because because becaus

of

We

re g

oing to see the wizard, t

he w

onde

rf

ul w

izar

d of OZ because because becaus

of

Fortunately, there’s a better alternative. Instead of continuing to add complexity...

...at a certain point, the way to make things better is to make them simpler.

Easier said than done, I know.

But why is it so hard to make things simple?

simplify

One does not simply

17Cybersecurity, Simplicity, and Complexity

The difficulty isn’t always technical. Sometimes the reason we don’t do it is that we don’t even try. But as Yoda once said:

Do or do not. There is no try.

In all seriousness though, the challenge of simplifying is often more cultural than anything else. We treat complexity as a sign of sophistication, a desirable attribute of our systems. We know how to simplify. But we choose not to.

CO

MP

LEX

ITY

GOODNESS

too much

too little

We even brag about our 30 million lines of code, as if complexity and goodness are the same thing.

But as we’ve seen, too much complexity can be just as bad as too little.

18 CYBERSECURITY INITIATIVE

But yes, sometimes simplicity can be difficult to achieve.

Simplification requires restraint.

Doing less...

...and making judgements about what to add, what to retain, and what to discard.

We fear making the wrong decision, deleting something important.

...or we get too attached to our pet feature, or the latest trend, so we end up adding too much and keeping everything!

19Cybersecurity, Simplicity, and Complexity

TheSimplicity Cycle

Dan Ward

That’s where The Simplicity Cycle comes in. It provides a framework to help us have difficult discussions about complexity, so we can understand the actual costs and benefits.

CO

MP

LEX

ITY

GOODNESS

paranoia

vigilance

When we’re talking about security, it helps us distinguish between vigilance and paranoia.

It introduces tools and techniques that orient our designs towards ideal solutions, which are simple and good.

20 CYBERSECURITY INITIATIVE

That’s really the key. We always have simpler alternatives to choose from.

Always.

Whether we are designers, coders, policy makers, or users, if we’re making decisions, we get to pick between a simpler approach or a more complex one.

I’m not saying simpler is always better... ...just that simpler is always an option...and it’s worth considering.

21Cybersecurity, Simplicity, and Complexity

Solutions that are simple and effective may be difficult to find at times, but they’re much easier to find if we actually look for them.

Which brings us back to the beginning: As the world gets more intertwingled, cybersecurity matters more than ever.

It affects fighter pilots and bankers and merchants. It even affects people who have no idea who Mr. Robot* is.

*Mr. Robot is a great show that you should watch.

22 CYBERSECURITY INITIATIVE

So whether you’re writing code or writing policy, or just writing emails, watch out for unecessary complexity.

Take a moment to consider whether a simpler approach might be more effective.

Our cybersecurity depends on it!

23Cybersecurity, Simplicity, and Complexity

REFERENCES

1 To Improve Cyber-Security We Must Embrace Complexity. GRT. http://www.grtcorp.com/content/improve-cyber-security-we-must-embrace-complexity.

2 Meyer, Claire. “The Hunt for Cybersecurity Solutions at Black Hat 2014.” Security Magazine. http://www.securitymagazine.com/articles/85863-the-hunt-for-cybersecurity-solutions-at-black-hat-2014.

3 Schneier, Bruce. “A Plea for Simplicity: You can’t secure what you don’t understand.” Schneier on Security. https://www.schneier.com/essays/archives/1999/11/a_plea_for_simplicit.html

4 Bender, Jeremy. “The New F-35 Fighter Jet Can Be taken Down Without A Bullet Ever Being Fired.” Business Insider. http://www.businessinsider.com/f-35-hackers-2014-2

5 Leaked F-35 REport Confirms Serious Air Combat Deficiencies. Pogo. http://www.pogo.org/our-work/straus-military-reform-project/weapons/2015/leaked-f-35-report-confirms-deficiencies.html

6 https://www.absio.com/sites/default/files/pdfs/Radically_Simplifying_Cybersecurity_V1.4.pdf

7 Goldman, David. “ Shodan: The Scariest Search Engine on the Internet.” CNN Money. http://money.cnn.com/2013/04/08/technology/security/shodan/

8 Ward, Dan. The Simplicity Cycle: A Field Guide to Making Things Better Without Making Them Worse. Amazon. http://www.amazon.com/Simplicity-Cycle-Making-Things-Without/dp/0062301977/

9 Internet History. -Softheap. http://www.softheap.com/internet/internet-history.html

This report carries a Creative Commons Attribution 4.0 International license, which permits re-use of New America content when proper attribution is provided. This means you are free to share and adapt New America’s work, or include our content in derivative works, under the following conditions:

• Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.

For the full legal code of this Creative Commons license, please visit creativecommons.org.

If you have any questions about citing or reusing New America content, please visit www.newamerica.org.

All photos in this report are supplied by, and licensed to, shutterstock.com unless otherwise stated. Photos from federal government sources are used under section 105 of the Copyright Act.

28 CYBERSECURITY INITIATIVE