Schneier on Security: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 26: Line 26:
[[Keyword_Index_and_Glossary_of_Core_Ideas#Identity_Fraud/Theft | Identity Fraud/Theft]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Identity_Fraud/Theft | Identity Fraud/Theft]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Information_Asymmetries | Information Asymmetries]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Information_Asymmetries | Information Asymmetries]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#National_Security | National Security]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#National_Security | National Security Policy]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Phishing | Phishing]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#Phishing | Phishing]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#SPAM | SPAM]],
[[Keyword_Index_and_Glossary_of_Core_Ideas#SPAM | SPAM]],

Revision as of 14:17, 2 July 2010

Full Title of Reference

Schneier on Security

Full Citation

Bruce Schneier, Schneier on Security (2008). Purchase

BibTeX

Categorization

Overview: Books

Threats and Actors: Actors and Incentives; The Threat and Skeptics; Transportation

Issues: Metrics; Risk Management and Investment; Privacy; Usability/Human Factors

Approaches: Government Organizations; Regulation/Liability

Key Words

Botnet, Cyber Crime, Data Mining, Department of Homeland Security, Disclosure Policy, Identity Fraud/Theft, Information Asymmetries, National Security Policy, Phishing, SPAM, Worm

Synopsis

This collection of essays on security: on security technology, on security policy, and on how security works in the real world was previously published between June 2002 and June 2008. They offer a computer security expert's insights into a wide range of security issues, including the risk of identity theft (vastly overrated), the long-range security threat of unchecked presidential power, why computer security is fundamentally an economic problem, the industry power struggle over controlling your computer, and why national ID cards won't make us safer, only poorer. Schneier recognizes that the ultimate security risk is people and that many security paractices are, in fact, security risks. While not primarily a treatise on cybersecurity (although several of the essays address cybersecurity), Schneier's insights are applicable to any security situation where limited resources make trade-offs necessary.

Review by Ben Rothke

Perhaps no one in the world gets security like author Bruce Schneier does. ... Schneier on Security is a collection of the best articles that Bruce has written from June 2002 to June 2008, mainly from his Crypto-Gram Newsletter, his blog, and other newspapers and magazine. The book is divided into 12 sections, covering nearly the entire range of security issues from terrorism, aviation, elections, economics, psychology, the business of security and much more.

Two of the terms Schneier uses extensively throughout the book are intelligence and economics. From an intelligence perspective, he feels that Washington has spent far too much on hardware and other trendy security devices that create a sense of security theater. The security theater gives an aura and show of security, but in reality, has little real effect.

The lack of intelligence is most manifest with airports, which are a perfect example of misguided security. Schneier notes that current trends in US airport security requires that people remove their shoes, due to a one-time incident with shoe-based explosive. Such an approach completely misses the point. Also, Schneier notes that the attempt to create a no-fly list, by feeding a limited set of characteristics into a computer, which is somehow expected to divine a person's terrorist leaning, is farcical.

Schneier therefore feels that the only way to effectively uncover terrorist plats is via intelligence and investigations, not via large-scale processing of everyone. Intelligence is an invaluable tool against terrorism, and the beauty of it is that it works regardless of what the terrorists are plotting. The bottom line according to Schneier in the book is that too much of the United State's counterterrorism security spending is not designed to protect us from the terrorists; but instead to protect public officials from criticism when another attack occurs.

Schneier also astutely notes that for the most part, security is not really so much of a technical issue, rather one of economics. A perfect example he gives is that of bulletproof vests. Since they are so effective, why doesn't everyone wear them all of the time? The reason people don't is that they do not think they are worth the cost. It is not worth the money or inconvenience, as the risk of being shot for most people is quite low. As a security consumer, people have made the calculation that not wearing a bulletproof vest is a good security trade-off. Schneier also notes that much of what is being proposed as national security is a bad security trade-off. It is not worth it and as consumers, the public is being ripped off.

Another recurring theme throughout the book is how the Bush administration has little by little eroded the Constitution, all in the name of fighting terrorism. Schneier notes that the brilliant framework the founding fathers created by creating divisions of power (executive, legislative, judicial) with checks and balances violates a basic unwritten rule, that the government should be granted only limited powers, and for limited purposes. Since there is a certainty that government powers will be abused.

Schneier observes that the USA PATRIOT is a perfect example of this abuse. The Constitution was designed and carefully outlines which powers each branch may exercise. While Schneier is best-known as a cryptographer and security expert, Schneier on Security also shows him to be a defender of the Constitution. In a number of essays in the book, he shows how unchecked presidential powers is bad not only for security, but for the preservation of democracy.

In chapter 8, on the topic of the economics of security, Schneier suggests a three-step program for improving computer and network security. He notes that none of them have anything to do with technology; they all have to do with businesses, economics, and people.

In chapter 9, on the psychology of security, Schneier writes that he tells people that if something is in the news, then they do not have to worry about it. He writes that the very definition of news is something that hardly ever happens. It's when something is not in the news, when it is so common that it is no longer news, drunk drivers killing people, domestic violence, deaths from diabetes, etc., that is when you should start worrying. And much of the terrorist threats that the Department of Homeland Security is spending tens of billions of dollars on, are those news threats, such as shoe bombers and liquid explosives that present very little real threat to the people of the US.

A fundamental theme of the book is that security is a trade-off. And far too many people have made the security trade-off without thinking if it is truly worth it. In essay after essay, Schenier challenges those assertions. Since 9/11, much has been given up in the name of terrorism, and that has been personal privacy and security. Schenier asks, has it been worth it?

Schneier on Security is an exceptionally important book that is overflowing with thought-provoking articles. Schneier gets above vague adages such as the war on terror and gets to the heart of the matter. His insight details what the real threats are, and what we should really be worrying about. The irony is that what Washington does is often the exact opposite of what should be done.

Much of the security carried out in the name of 9/11 has proven to be infective in the seven years since the attack. Schneier on Security is a manifesto of what should have been done, and what should be done. The book is eye-opening from the first page to the last. It lets you know that the next time you see grandma asked to take her shoes off by a TSA agent at the airport, why she is simply a bit player in the large security theater. And why spending tens of billions on a charade like that, makes that a tragedy of epic proportions.

Additional Notes and Highlights

Expertise Required: None

Table of Contents
 Introduction
 Terrorism and Security
 National Security Policy
 Airline Travel
 Privacy and Surveillance
 ID Cards and Security
 Election Security
 Security and Disasters
 Economics of Security
 Psychology of Security
 Business of Security
 Cybercrime and Cyberwar
 Computer and Information Security
 References
 Index

Bruce Schneier's blog covering security and security technology.

Bruce Schneier's monthly email newsletter of blog articles.