CYBEREYE—Commentary

William Jackson | Will IT security founder on the reef of human behavior?

If the pundits, officials and experts who spoke at last week’s RSA security conference in San Francisco are correct, we probably can’t expect the security of our information infrastructures and systems to get much better anytime soon. That is because information technology security increasingly butts up against human behavior.

IT security has never been only about technology. It is a mix of technology, process, policy and people. Common wisdom has it that technology is usually the easy part of the equation to solve. Human behavior is the wild card; a combination of ignorance, poor judgment and a perverse willingness to thwart our own best interests often causes the best-laid plans of chief information security officers to go awry.

A common theme echoed by the speakers at the conference was the need for better cooperation, better coordination and better education in IT security. In other words, we’ve done the easy part. Now we have to get people straightened out.

In his opening keynote speech at the conference, Art Coviello, president of RSA, called for greater cooperation in the security community. “We must embrace a common development process. We must collaborate on standards,” he said. “We need to share technology.”

Coviello and representatives from Microsoft and Cisco Systems asserted that their companies are already working together. But Scott Charney, corporate vice president of Microsoft’s Trustworthy Computing Group, conceded that business considerations will sometimes continue to trump technology and security issues. He also offered what he called the Charney theorem for why security is so difficult: “There are always a percentage of the people who are up to no good.”

Software assurance is another sore point. Writing secure software is not impossible, so why isn’t it more common? It’s a people issue.

“The guys who write systems are pushing their people to write secure software,” said Alan Paller, director of research at the SANS Institute. “But the application people have never done that.”

W. Hord Tipton, executive director of the International Information Systems Security Certification Consortium and a former Interior Department chief information officer, said, “We seem to be losing ground” in the race to develop secure software.

Mischel Kwon, director of the U.S. Computer Emergency Readiness Team, emphasized the human element in network security when she called it a team sport.

“We have to stop isolating ourselves as security experts,” she said. “Our adversaries are collaborating. They are working together.”

The human element even inhibits the interoperability of security tools, said Richard George, technology director of the National Security Agency’s Information Assurance Directorate. “We have a history of making things that are supposed to work together not work together,” he said.

William Billings, chief security officer at Microsoft Federal, said many security tools are interoperable and administrators need to differentiate between technology issues and training issues. “The hard part is how to get the IT staff to pull the data out,” he said.

That is not to say that there are no technology issues to be resolved in IT security. Many problems remain, and there will always be a need to find and fix them. But the experts seem to think that security technology has outpaced the ability or willingness of people to use it. Without some significant changes in the way vendors, administrators and users think about IT security, improvements are likely to be marginal, and we will continue to lose ground against the bad guys, who are free to focus on the soft underbelly of human behavior when attacking our systems.

About the Author

William Jackson is freelance writer and the author of the CyberEye blog.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above