Upload
tyrone-shon-cameron
View
214
Download
0
Embed Size (px)
Citation preview
Towards Incentive-based Cyber Trust
Russell Cameron Thomas
Principal, Meritology
Patrick Amon
Senior Researcher
Center for Interdisciplinary Research for Information Security, Ecole Polytechnique Federale de Lausanne
i-Society `07, Oct. 10, 2007, Merrillville, IN
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 2
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Summary
• “Cyber trust” = the confluence of information security, privacy, digital rights, and intellectual property protection
• People and institutions are not properly motivated to maximize social welfare
– Incentives are often perverse, misaligned, or missing.
• Conjecture: An incentive-based approach will work better than other approaches alone:
– Technology, mandates, penalties, and/or political actions
• Essential elements
– Usability, risk information systems, risk communications, social
knowledge, markets, and incentive instruments, plus enabling
technology and a supporting legal/ regulatory/institutional framework
• Example: accounting for cyber risk
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 3
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Q: Why “Cyber Trust”? A: Confluence!
• Sony BMG Music Case (2005) –
– Distributed a copy-protection scheme with music CDs that secretly
installed a root kit on computers that played the CDs
– “Root Kit” was installed without user’s knowledge or consent.
• A “root kit” can allow someone else to gain and maintain access to your computer system without your knowledge.
• Just one example of the confluence of…
– Information security
– Privacy
– Digital Rights
– Intellectual Property protection
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 4
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Alternative Approaches
• Technological Approach – “Automate”– Focus: Information infrastructure, platforms, applications, interfaces– Actions: technological capabilities and fixes– Human and organization actors either absent, secondary, or mere users of
technology.
• Mandates-based Approach – “Do this…”– Focus: “Security is about control”– Actions: regulations, policies, procedures, rules, laws, codes of conduct,
contracts, etc.
• Penalty-based Approach – “… or else!”– Focus: deviant behaviour and lack of will power to resist temptations to
cheat or exploit– Actions: fines, lawsuits, contractual penalties, decertification, etc.
• Political Approach – “Change the power structure”– Focus: sub-optimal power relationships and unrealized collective interests – Actions: alliances, coalitions, power-shifting actions (e.g. anti-trust law
suits), countervailing actions or threats, reciprocal commitments, standardization efforts, and communications to influence public opinion.
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 5
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Limitations of Alternative Approaches
• Technology alone will not be sufficient– Cyber Trust = f( People, Process, Technology)
• An emergent, systemic feature.
• Even if sufficient technology were available, would people buy it and use it?
• Mandates + Penalties are too cumbersome and slow– Environment is complex, context-dependent, and fast changing
– Does not promote creativity and innovation
– Hard to make it work across boarders
– Too many unintended consequences, especially in crisis situations
• Political solutions are too blunt– Will the new regime be better than the current regime?
– Hard to make it work across boarders
– It is very hard to fine-tune or refine
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 6
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
The Incentive-based Approach
• Essence: “Give key actors a share of the potential gains of cyber trust, and thereby draw on the power of self-interest to drive the right actions.”
• Prerequisite: Good understanding of… – What motivates individuals and institutions and what they value
– How they perceive cyber risks and rewards
– How to create incentives to shift those motivations in positive directions.
• Advantages = power of markets– Can start on a small, local scale
• All that is needed to get started is for two parties to have some measure of their relative cyber risk across decision alternatives and how relative cyber risk is driven by observable metrics.
• Current state– Outside of copyright, digital rights, and IP licensing, there has been little
success in monetizing the value of cyber trust.
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 7
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Essential Elements
Pervasive Information &
Communications Technology (ICT)
7. Enabling Technology8. Supporting Legal, Regulatory
& Institutional Framework
6. Risk Info. Systems
3. Incentive Instruments
5. Markets
2. Risk Communications
4. Social Knowledge
foundations
influencingstakeholdermotivations
socio-economictechnological
1. Usability
pooling andprocessing
risk information
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 8
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Incentive Instruments• Definition:
– any social or economic device, mechanism, process, or agreement that explicitly ties payoffs for actors to desirable future states of the world so that those actors are motivated to help bring about those states.
– A “payoff” could be monetary, near-monetary (e.g. a tradable good or service), or non-monetary-but-valuable (e.g. offer of mutual assistance).
• Puts the value proposition of cyber trust front-and-centre for each stakeholder.
• Opens the possibility of side payments, and other balancing transactions.
• Cyber Trust Examples:– cyber insurance, risk-sharing contracts, and “bug bounties”
• Other Examples:– risk sharing pools in developing countries, risk-based payments and
contracts in supply chain management, decision insurance (internal to an organization)
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 9
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Incentives at Work:Accounting for Cyber Risk
• Problem
– How to map cyber risk metrics to business performance.
• Within a firm
• Between information supply chain partners, esp. outsource vendors
• Solution
– Total Cost of Cyber (In)security
• Analogous to “Total Cost of Quality” in Total Quality Management
– Involves
• Risk Information System
• Risk Communication
– Enables
• Incentive instruments
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 10
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Total Cost of Cyber (In)securityA
nnua
l Pro
babi
lity
Total Annual Cost of Information Security (log scale)
mean
1x 10x 100x 1,000x
1 2 3 4 5 6 7
“Budgeted” “Self-insurance” “Catastrophic”
bankruptcy
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 11
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Self-insurance CostsA
nn
ua
l Pro
ba
bili
ty
Total Annual Cost of Information Security (log scale)
1x 10x 100x 1,000x
1 2 3 4 5 6 7
“Self-insurance”
Definition:• Self-insurance* premium to cover difference between the Budgeted costs
and an exposure limit.
What’s included:• Low probability/high magnitude loss events big enough to “bust the budget”
• material to quarterly earnings• threaten the firm’s credit rating
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 12
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Estimating Self-Insurance Cost
99th Percentile threshold
1 2
Budget threshold
Self-insurance pool (“Value at Risk”)
3 Time period*
54 Fund solvency*Shape of the curve
Annual premium ≈ Pool ÷ (Time Period)Annual premium ≈ Pool ÷ (Time Period)
Estimation Parameters
* Policy decisions by top management
Modeling:
• Distribution curves from parameters
• Monte Carlo simulation of self-insurance pool with funding parameters, interest rates, etc. to calculate annual premium
• Dominated by largest losses 2
6 Interest rates
Cost distribution
curve
Magnitude of costs
(if time period is long enough)
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 13
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Calculating Self-Insurance Cost (2)
How: A Competitive Marketplace for Models
time
ConsensusEstimates
Prediction Markets
Delphi Technique
Qualitative Reasoning (e.g. Inference to the Best Explanation,
Reasoning about Uncertainty, etc.)
Bayesian Networks
Statistical analysis of
historical loss data
External data bases, benchmarks
parameter
Parameter values change with new information
Assessments,Scorecards
Simulations
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 14
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Guiding Risk Management Decisions
BudgetedCosts Self-insurance
Costs
CatastrophicCosts
Prudence Gambling
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 15
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Research Questions
• Is it theoretically possible to model cyber trust risks and incentives in a unified, forward-looking valuation framework?
– What are the fundamental limits?
• If analytic models are not feasible, is it possible to devise coarse-grained or qualitative models that are robust and usable in practice (e.g. rating or ranking schemes) as the basis for incentive instruments?
Questions?
Russell Cameron Thomas
Principal, Meritology
Patrick Amon
Senior Researcher
Center for Interdisciplinary Research for Information Security, Ecole Polytechnique Federale de Lausanne
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 17
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Definitions
• “Cyber trust risk” or “Cyber risk” – the socio-economic risks associated with cyber trust, from the viewpoint of
all relevant stakeholders.
• “Incentive” – “Any factor (financial or non-financial) that provides a motive for a particular
course of action, or counts as a reason for preferring one choice to the alternatives.” plus…
– Gain sharing or shared equity associated with desirable outcomes, including remunerative, moral, and personal incentives.
– Excludes negative incentives (penalties)
• “Risk management” – Managing uncertain and uncontrollable outcomes by estimate the likelihood
and severity of uncertain events and then use these estimates in a rational decision-making framework
– General spirit: balance the expected value of losses with the costs for mitigating those losses.
– The sociological aspect of risk management incorporates ideas such as risk tolerance/aversion, bias, risk perception, and motivational dynamics
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 18
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Literature Review
• Overviews
– National Academies (2007), “Toward a Safer and More Secure Cyber Space”
– Computer Research Association (2003), “Four Grand Challenges of
Trustworthy Computing
– Rueschlikon Conference (2005), “Ensuring (and insuring?) critical information
infrastructure protection”
• Seminal Papers
– Anderson (2001),“Why information security is hard - an economic perspective”
– Acquisti
– Camp
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 19
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Q: Include Penalties as Negative Incentives?A: No
• Negative incentives tend to promote avoidance behaviours
– shirking, blame shifting, and information hiding (both obscuring and
misrepresentation)
• Doesn’t ensure or encourage the most desirable outcomes (i.e. optimization)
– At best, you can hope to avoid the worst categories of outcomes.
• Doesn’t mobilize the power of market systems
– Much of the power of market systems comes from its capability to
spawn new and complementary markets that share gains and risks.
– But market systems almost never "trade" negative incentives.
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 20
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
1. Usability
• Personal incentives are embedded in the design of information and communication systems, and specifically in the usability of their cyber trust features.
– Making it easy to do the right things,
– Making it hard to do the wrong things
– Making it clear what the risk consequences are of possible actions.
• Usability includes technology, people, and processes.
• Poor usability can undermine all the other incentive elements.
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 21
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
2. Risk Information Systems
• Information systems to continuously collect and aggregate operational cyber trust information.
– Security and privacy metrics and assessments
– IP asset inventories, licenses, obligations, contingencies
– Digital rights, cost and revenue streams
• Analysis to discover cause-effect relationships
• Models are needed to help stakeholders make forward-looking, value-based decisions based on risk scenarios and trade-offs.
• Models will have to cope with many forms of ignorance and uncertainty
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 22
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
3. Risk Communications
• “Risk” has different meanings at individual, organization, and society levels
• Very specific to context and systemic performance
• Best to give feedback in real-time
• Risk factors are very interdependent, making the cause-effect relationships very complicated
• Relevant knowledge is contingent, tentative, vague, ambiguous, and even contradictory
• Risk cannot always be measured by a simple numerical scales
• Prior perceptions and mental models are critical
• Most people find the technical details befuddling and taxing
• Many social and political obstacles to disclosing information about cyber trust and risks
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 23
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
4. Social Knowledge
• Knowledge about cyber trust is widely distributed, not concentrated
– Vulnerabilities, exposures, incidents, losses, mitigation, cost, and
forward-looking estimates and perceptions.
– Cyber trust is very dependent on context. Only the people in that
specific context have the necessary information and perspectives to
make proper judgments.
• Cyber trust involves both perceptions and forward-looking estimations of risk. These are social processes.
• There may be some elements of incentive-based cyber trust that can only be produced by the “wisdom of the crowds”, including valuation of hard-to-estimate risks and best practices.
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 24
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
5. Markets
• Problem: incomplete markets– “markets” = trading systems that allow buyers and sellers to
exchange goods and/or services, including information.
– Buyers do not know what improvements cyber trust they are getting when they buy each product or service.
– Economic actors can not make rational trade-off decisions, leading to inefficient allocation of resources and less-than-optimal results.
• Possible market innovations:– Synthetic and simulated markets that are created specifically to
discover prices
– Prediction markets to draw out the “wisdom of the crowds”
– “Cap and trade” markets for externalities
– Markets for private information (e.g. “Zero-day” vulnerability auctions)
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 25
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Application: Financial Services (FS)
• The FS sector is one of many sectors that face significant cyber trust challenges:
– Information security – insider abuse and fraud, external targeted
attacks and fraud (e.g. “phishing”, money laundering, etc.)
– Privacy – misuse of customer’s private data (including identity
theft), threats to confidential information (insider trading, improper
disclosure, etc.),
– Intellectual property protection – computer software, proprietary
financial data, and even patented business processes.
– Digital rights – not significant in FS now, but might be changing.
• FS leads in operational risk modeling and enterprise risk management
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 26
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Context: Two Viewpoints on Economic Risk
#1 “Rational Investor”(Capital Asset Pricing,Discounted Cash Flow)
#2 “Insurance Actuary”(Ruin Theory,“Iceberg Risk”)
“Ruin”
time
timechange in value
change in value
valu
eva
lue random walk with
“avalanches”
random walk
p(v)
p(v)
What matters:• Mean, variance• Fat part of the curve
When:• Quarterly EPS• Earnings volatility• Shorter time periods
99%
What matters:• Extreme events• Tail of the curve
When:• Credit rating• Solvency• Reserve funds• Longer time periods
Normaldistributions
“Fat Tailed”and skeweddistributions
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 27
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Budgeted CostsA
nnua
l Pro
babi
lity
Total Annual Cost of Information Security (log scale)
mean
1x 10x 100x 1,000x
2 3 4 5 6 7
“Budgeted” “Self-insurance” “Catastrophic”
bankruptcy
1
Definition: Costs that in are in the budget somewhere
What’s included:• All direct spending on security, privacy, IP protection…• Plus indirect costs, plus the expected value of all high
frequency losses and some small mix of lower frequency losses.
• Also includes the opportunity costs – business activities that are prevented or inhibited by security.
How it’s estimated:• Accounting records, budgets, and business cases• Cost-driver models (i.e. linear relationships between
operational metrics and indirect or overhead costs, etc.)
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 28
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Ways to Make Self-Insurance Cost “Real”
• Link it to real cyber insurance policies
• Set up a real self-insurance fund via Finite Risk program or tradable subordinated debt
• Use it as the “glue” for multi-firm “risk sharing” pools
– Focused on information sharing and mutual assistance, with incentive instruments
• Link to performance management and incentive compensation
– Subdivide Self-Insurance Cost into a “Risk Budget” for each org. unit, or
– Use it as a “risk adjustment” factor for other performance metrics
• Create incentive instruments tied to self-insurance costs or cost drivers for…
– Security outsource vendors
– Supply chain partners
– Channel partners
– Customers
– Alliance partners
• Public disclosure
– SEC filings, other regulatory
filings
– Stakeholder reports
– Credit rating agencies
– “Cap and Trade” markets
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 29
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Catastrophic Costs
• Q: How much confidence should we have that the firm can survive InfoSec catastrophes?
• The rule: prioritized loss scenarios above a significance threshold that cover the space of possibilities.
– Use for business continuity preparation → agility and robustness
– Avoid failures of imagination and “fighting the last war”
– Root out unintended consequences
– Categorize and prioritize – don’t waste time on precision estimates
– Strategic scenario analysis, “war gaming”, etc.
– Focus on discovery, “out of the box”, and reframing
– Challenge conventional wisdom!
• “It’s not what we don’t know that will kill us. It’s what we know that ain’t so”.
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 30
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
The Challenge
• Information Security performance is an unruly moving target– Fast-changing, rapidly evolving.
– Evolutionary strategic game between attackers and defenders
• Potential Impact– False sense of security, complacency
– Fighting the last war
– Falling behind in the “arms race”
– Failures of imagination
– Chasing ghosts (F.U.D)
– Unintended consequences (self-defeating behaviors, mal-adaptations)
• Why it’s hard– Shrouded in uncertainty, ignorance, ambiguity, and indeterminism
– Not just “puzzle solving”, but also “mystery solving” (“Unknown unknowns”)
– Must integrate with enterprise performance and incentive systems
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 31
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Meta-metrics for “Double Loop Learning”
Single loop learning:• Control loop with pre-
defined outcome
Double loop learning:• Control loop that adjusts
the defined outcome.
Source: http://www.learning-org.com/
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 32
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
A Model of Risk Management
Source:
The point: Risk mitigation must be seen in the context of risk taking
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 33
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Learning – Do We Know What We Need to Know?
• Balanced Scorecard: "Learning & Growth” perspective– Typically includes skills, employee retention/satisfaction, research, etc.
– Not independent of other metrics. Should link to other metrics in causal and feedback loops.
– Single loop vs. double loop learning
• Learning in order to solve “puzzles”– Security Awareness Training
– Security Management Training (incl. use of metrics)
– Incident Management (preparation, planning)
• Learning in order to solve “mysteries”– Threat awareness
– Emerging (and emergent) vulnerabilities
– Systemic risk
– Interdependencies with other enterprise risk “silos”
Covered in typicalsecurity metrics scorecards
Requires meta-metrics
i-Society 07, Merrillville, IN - Oct. 10, 2007
Page 34
© 2007 Meritology. All Rights Reserved
Towards Incentive-based Cyber Trust
Learning in Order to Solve “Mysteries”
Puzzles(closed ended)
Mysteries(open ended)