A Model for When Disclosure Helps Security: Difference between revisions
No edit summary |
|||
Line 26: | Line 26: | ||
==Additional Notes and Highlights== | ==Additional Notes and Highlights== | ||
Outline: | |||
Introduction | |||
I. A Model for When Disclosure Helps Security | |||
A. Case A: The Open Source Paradigm 6 | |||
B. Case B: The Military Paradigm 9 | |||
C. Case C: The Information Sharing Paradigm | |||
D. Case D: The Public Domain | |||
E. The 2x2 Matrix for When Disclosure Improves Security | |||
II. The Key Reasons Computer and Network Security May Vary From Other Security Problems | |||
A. Hiddenness and the First-Time Attack 17 | |||
B. Uniqueness of the Defense | |||
C. Why Low Uniqueness May Be Common for Computer and Network Security | |||
1. Firewalls | |||
2. Mass-market Software and Computer Games | |||
3. Encryption | |||
III. Relaxing the Open Source Assumptions – Computer and Network Security in the Real World 20 | |||
A. The Assumption that Disclosure Will Not Help the Attackers | |||
1. The Enlargement of the Public Domain in a World of Search Engines | |||
2. Deterrence as a Result of Disclosure | |||
3. Don’t Disclose Private Keys, Passwords, or Combinations to a Safe | |||
4. Why Secret Surveillance May Improve Security | |||
5. When Do Attackers Already Know of the Vulnerability? | |||
a. Discovering and Exploiting Vulnerabilities | |||
b. The Analogy Between Exploiting Vulnerabilities and the Efficient Capital Markets Hypothesis | |||
B. The Assumption that Disclosure Will Tend to Improve the Design of Defenses | |||
1. Variables that Affect When Open Source or Proprietary Software May Provide Better Security | |||
a. Expertise of Inside and Outside Programmers | |||
b. The Incentives to Improve the Defense | |||
c. Persistence of the Expertise | |||
d. The Institutional Context for Patching | |||
e. Interoperability and Openness | |||
2. The Role of Disclosure in Creating Long-Run Security and Assuming Accountability | |||
C. The Assumption that Disclosure Will Spread Effective Defense To Others | |||
Conclusion: Security, Privacy, and Accountability |
Revision as of 13:46, 29 June 2010
Full Title of Reference
A Model for When Disclosure Helps Security: What is Different About Computer and Network Security?
Full Citation
Peter P. Swire, A Model for When Disclosure Helps Security: What is Different About Computer and Network Security? (Journal on Telecommunications and High Technology Law, Vol. 2, Public Law and Legal Theory Working Paper Series No. 17, 2004). Web
Categorization
Issues: Information Sharing/Disclosure
Key Words
security, free software, secrecy
Synopsis
This Article asks the question: When does disclosure actually help security? The discussion begins with a paradox. Most experts in computer and network security are familiar with the slogan that there is no security through obscurity. The Open Source and encryption view is that revealing the details of a system will actually tend to improve security, notably due to peer review. In sharp contrast, a famous World War II slogan says loose lips sink ships. Most experts in the military and intelligence areas believe that secrecy is a critical tool for maintaining security. Both cannot be right - disclosure cannot both help and hurt security.
Using a law and economics approach to resolve the paradox, Part I provides a model for deciding when either the Open Source or the military/intelligence viewpoints is likely to be correct. Part II explains why many computer and network security problems appear different from the traditional security problems of the physical world. Part III applies the analytic tools developed earlier in the paper to issues including the following: the enlargement of the public domain in a world of search engines; the relationship between disclosure and deterrence; the importance of not disclosing passwords or the combination to a safe.
Additional Notes and Highlights
Outline:
Introduction I. A Model for When Disclosure Helps Security A. Case A: The Open Source Paradigm 6 B. Case B: The Military Paradigm 9 C. Case C: The Information Sharing Paradigm D. Case D: The Public Domain E. The 2x2 Matrix for When Disclosure Improves Security II. The Key Reasons Computer and Network Security May Vary From Other Security Problems A. Hiddenness and the First-Time Attack 17 B. Uniqueness of the Defense C. Why Low Uniqueness May Be Common for Computer and Network Security 1. Firewalls 2. Mass-market Software and Computer Games 3. Encryption III. Relaxing the Open Source Assumptions – Computer and Network Security in the Real World 20 A. The Assumption that Disclosure Will Not Help the Attackers 1. The Enlargement of the Public Domain in a World of Search Engines 2. Deterrence as a Result of Disclosure 3. Don’t Disclose Private Keys, Passwords, or Combinations to a Safe 4. Why Secret Surveillance May Improve Security 5. When Do Attackers Already Know of the Vulnerability? a. Discovering and Exploiting Vulnerabilities b. The Analogy Between Exploiting Vulnerabilities and the Efficient Capital Markets Hypothesis B. The Assumption that Disclosure Will Tend to Improve the Design of Defenses 1. Variables that Affect When Open Source or Proprietary Software May Provide Better Security a. Expertise of Inside and Outside Programmers b. The Incentives to Improve the Defense c. Persistence of the Expertise d. The Institutional Context for Patching e. Interoperability and Openness 2. The Role of Disclosure in Creating Long-Run Security and Assuming Accountability C. The Assumption that Disclosure Will Spread Effective Defense To Others Conclusion: Security, Privacy, and Accountability