SlideShare a Scribd company logo
1 of 35
Shadow IT and the
Shadowing of IT
SAMUEL GREENFELD
SOUTH FLORIDA ISSA MEETING - 15 JUNE 2017
Disclaimer
This is a Personal Presentation
Not my current/past/future employers’
Not any past/future schools’ either
What is Shadow IT?
Users using Information Technology services within an organization other than those officially
supported & allowed
◦ Sometimes entire departments
◦ Sometimes with the tacit/implicit permission of others
Could be due to things such as:
◦ Lack of known internal services, or they don’t meet a need
◦ Bureaucracy
◦ The user(s) simply not caring
IT Being Shadowed
Users are getting more tech savvy, but they cannot do everything on their own
In order to use many Shadow IT services, users often have to bypass safeguards, or be
encouraged to use them
Goes beyond just Shadow IT to Suppliers & Third Parties obtaining company data
Reactive Responses
Port blocking/restricting:
◦ Result: Everything starts running over HTTP/HTTPS (TCP Ports 80/443)
SSL Interception
◦ Certificate Pinning
Users not given admin rights, often don’t update things
◦ Automatic Updaters
◦ Just run everything out of the user’s home directory
Social Engineering
Recommended Reading: http://www.tristanharris.com/
Make it as easy as possible to do the desired action, and hard as possible not to do it
◦ UI design changes
◦ Constant pestering via mail/notifications/etc.
◦ App settings reset on logoff, new settings added and enabled with updates, & things requiring group
policy/registry keys/obscure ways to shut them off
◦ Gamification – our brains are easily addicted to intermittent, random rewards
◦ Only so much of an attention span any human can keep
◦ Includes any rules/security training you’re giving them!
Fear of Missing Out
Wear someone out, then ask at the end
Users like Easy
Wesabe vs Mint (Yodlee)
◦ Think of all the secondary information they got
Only have to type passwords once during signup, or link to Google/Facebook/etc.
◦ Make it as easy to get in as possible, hard to get out
Never have to see the EULA or terms of service
Better to ask forgiveness than permission
App Permissions
Non-Obvious Permission Usage
Ultrasonic (Microphone & speaker based) & Bluetooth Beacons
Periodic geolocation
Permission usage when app not actively being used
Additional functionality added later within an allowed permission set
Shared Android filesystem space
Proximity detection – both to suppliers’ locations as well as competitors’
◦ Home/work – where you are during certain hours of the day when you don’t move as much
Data Aggregation
Stuff At the Edge of Regulations
Sold a Product, and then your
Usage is Sold
Stuff you cannot control
Analytics
Often used to see how users generally interact with the Application, Operating System, or
Website, and what problems they may encounter
Multiple Systems (Dual, Triple, sometimes even 20+) in a single app or website
◦ Found in certain IT security products – vendors will say “it’s documented!”
◦ May be on by default
◦ May need several individual controls to shut off, if they can be shut off
◦ May be subject to firewall bypass rules generated by/within said product
◦ The Ghostery plugin is one way to view these for websites
Machine Learning
Machine Learning (2)
http://www.evolvingai.org/fooling
Privacy Policies (Easy)
Privacy Policies (Maybe OK?)
Privacy Policies (Gibberish)
“Individual identifying information such as…”
“Non-individual identifying information such as…”
The “such as” collected always sounds non-threatening. What is not listed often is not.
Often the “Non-individual” information is enough (on its own or in combination with other
resources) to identify individuals
◦ Serial Numbers
◦ IP Addresses
◦ Everything but a person’s name
What happens with a company is acquired?
Benefits of IT Being Shadowed
Herd Immunity
◦ Antivirus/whitelisting
◦ Bug reports/Patches
Feature Adding/Removal Decisions
Changes in Usage Design
Performance
◦ Larger/more important customers may be more likely to opt-out and/or block Analytics
Everyone still tries to be a member of
a herd (and often more than one)
EULA’s and their placement/treatment
Infinite scrolling news sites
Login/signup forms swapping
Non-Disclosure/Non-Compete Agreements
The Search for the Silver Bullet
Everyone still wants to aim for zero data loss
Everyone still wants their own big data hoard, and believes it is uniquely valuable
Everyone’s a Hypocrite
“My data is uniquely valuable and important”
“I am allowed to find out as much as I want to about you, but you are not allowed to do the
same for me”
What we should be designing for
Conclusion
It is impossible (or at least impractical) to zero out the possibility of data loss
Instead of designing for zero data missing & then handling the exceptions, I think we need to
design with the expectation that data loss will occur
Questions?
https://www.slideshare.net/SamuelGreenfeld/shadow-it-and-the-shadowing-of-it/

More Related Content

Similar to Shadow IT and the Shadowing of IT

BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden UserJeff Stokes
 
Making User Authentication More Usable
Making User Authentication More UsableMaking User Authentication More Usable
Making User Authentication More UsableJim Fenton
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxlynettearnold46882
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesJeff Stokes
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
CI-ISSA '23 - Bad Multi-Factor
CI-ISSA '23 - Bad Multi-FactorCI-ISSA '23 - Bad Multi-Factor
CI-ISSA '23 - Bad Multi-FactorCurtis Brazzell
 
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
Opening Up User-Centric Identity
Opening Up User-Centric IdentityOpening Up User-Centric Identity
Opening Up User-Centric IdentityEduserv Foundation
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymondspencerharry
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyJan Wong
 
Journals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docxJournals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docxpriestmanmable
 
Secure and Maintain Your Computer Lab
Secure and Maintain Your Computer Lab Secure and Maintain Your Computer Lab
Secure and Maintain Your Computer Lab TechSoup
 

Similar to Shadow IT and the Shadowing of IT (20)

BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Crouching Admin, Hidden User
Crouching Admin, Hidden UserCrouching Admin, Hidden User
Crouching Admin, Hidden User
 
Making User Authentication More Usable
Making User Authentication More UsableMaking User Authentication More Usable
Making User Authentication More Usable
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
IoT vendor questions
IoT vendor questionsIoT vendor questions
IoT vendor questions
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
CI-ISSA '23 - Bad Multi-Factor
CI-ISSA '23 - Bad Multi-FactorCI-ISSA '23 - Bad Multi-Factor
CI-ISSA '23 - Bad Multi-Factor
 
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson University
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Opening Up User-Centric Identity
Opening Up User-Centric IdentityOpening Up User-Centric Identity
Opening Up User-Centric Identity
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymond
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Journals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docxJournals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docx
 
P3 m2
P3 m2P3 m2
P3 m2
 
Securing Your Business
Securing Your BusinessSecuring Your Business
Securing Your Business
 
Secure and Maintain Your Computer Lab
Secure and Maintain Your Computer Lab Secure and Maintain Your Computer Lab
Secure and Maintain Your Computer Lab
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 

Recently uploaded

Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 

Recently uploaded (20)

Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 

Shadow IT and the Shadowing of IT

  • 1. Shadow IT and the Shadowing of IT SAMUEL GREENFELD SOUTH FLORIDA ISSA MEETING - 15 JUNE 2017
  • 2. Disclaimer This is a Personal Presentation Not my current/past/future employers’ Not any past/future schools’ either
  • 3. What is Shadow IT? Users using Information Technology services within an organization other than those officially supported & allowed ◦ Sometimes entire departments ◦ Sometimes with the tacit/implicit permission of others Could be due to things such as: ◦ Lack of known internal services, or they don’t meet a need ◦ Bureaucracy ◦ The user(s) simply not caring
  • 4. IT Being Shadowed Users are getting more tech savvy, but they cannot do everything on their own In order to use many Shadow IT services, users often have to bypass safeguards, or be encouraged to use them Goes beyond just Shadow IT to Suppliers & Third Parties obtaining company data
  • 5. Reactive Responses Port blocking/restricting: ◦ Result: Everything starts running over HTTP/HTTPS (TCP Ports 80/443) SSL Interception ◦ Certificate Pinning Users not given admin rights, often don’t update things ◦ Automatic Updaters ◦ Just run everything out of the user’s home directory
  • 6. Social Engineering Recommended Reading: http://www.tristanharris.com/ Make it as easy as possible to do the desired action, and hard as possible not to do it ◦ UI design changes ◦ Constant pestering via mail/notifications/etc. ◦ App settings reset on logoff, new settings added and enabled with updates, & things requiring group policy/registry keys/obscure ways to shut them off ◦ Gamification – our brains are easily addicted to intermittent, random rewards ◦ Only so much of an attention span any human can keep ◦ Includes any rules/security training you’re giving them!
  • 7.
  • 9. Wear someone out, then ask at the end
  • 10. Users like Easy Wesabe vs Mint (Yodlee) ◦ Think of all the secondary information they got Only have to type passwords once during signup, or link to Google/Facebook/etc. ◦ Make it as easy to get in as possible, hard to get out Never have to see the EULA or terms of service Better to ask forgiveness than permission
  • 12. Non-Obvious Permission Usage Ultrasonic (Microphone & speaker based) & Bluetooth Beacons Periodic geolocation Permission usage when app not actively being used Additional functionality added later within an allowed permission set Shared Android filesystem space Proximity detection – both to suppliers’ locations as well as competitors’ ◦ Home/work – where you are during certain hours of the day when you don’t move as much
  • 14.
  • 15.
  • 16. Stuff At the Edge of Regulations
  • 17. Sold a Product, and then your Usage is Sold
  • 18. Stuff you cannot control
  • 19. Analytics Often used to see how users generally interact with the Application, Operating System, or Website, and what problems they may encounter Multiple Systems (Dual, Triple, sometimes even 20+) in a single app or website ◦ Found in certain IT security products – vendors will say “it’s documented!” ◦ May be on by default ◦ May need several individual controls to shut off, if they can be shut off ◦ May be subject to firewall bypass rules generated by/within said product ◦ The Ghostery plugin is one way to view these for websites
  • 20.
  • 21.
  • 22.
  • 27. Privacy Policies (Gibberish) “Individual identifying information such as…” “Non-individual identifying information such as…” The “such as” collected always sounds non-threatening. What is not listed often is not. Often the “Non-individual” information is enough (on its own or in combination with other resources) to identify individuals ◦ Serial Numbers ◦ IP Addresses ◦ Everything but a person’s name What happens with a company is acquired?
  • 28. Benefits of IT Being Shadowed Herd Immunity ◦ Antivirus/whitelisting ◦ Bug reports/Patches Feature Adding/Removal Decisions Changes in Usage Design Performance ◦ Larger/more important customers may be more likely to opt-out and/or block Analytics
  • 29. Everyone still tries to be a member of a herd (and often more than one) EULA’s and their placement/treatment Infinite scrolling news sites Login/signup forms swapping Non-Disclosure/Non-Compete Agreements
  • 30. The Search for the Silver Bullet Everyone still wants to aim for zero data loss Everyone still wants their own big data hoard, and believes it is uniquely valuable
  • 31. Everyone’s a Hypocrite “My data is uniquely valuable and important” “I am allowed to find out as much as I want to about you, but you are not allowed to do the same for me”
  • 32.
  • 33. What we should be designing for
  • 34. Conclusion It is impossible (or at least impractical) to zero out the possibility of data loss Instead of designing for zero data missing & then handling the exceptions, I think we need to design with the expectation that data loss will occur

Editor's Notes

  1. Certificate Pinning hampers the lockdown of devices which may be both inside and outside of a network, or if you have a guest network. The actions of certain Nation states may have lead to Certificate Pinning being more commonplace.
  2. In particular, Tristan’s essays are good
  3. This is essentially psychological warfare IT should not be just concerned about fishing, personal social media accounts, etc. – getting users to recognize situations like this is important as well
  4. Yodlee screen scraped banks. Wesabe did not. Wesabe failed, and their founder cited their lack of this as one of the reasons. Now similar services included in bank websites themselves. Interestingly bank bill pay sites may also resort to screen-scraping
  5. Also known as why MDM & MAM are so important
  6. Not just Google trying home/work detection; Foursquare commented in one news report that they do it as well Bit of a rivalry going on between app and OS developers as to who can access what when with what permissions (Uber/Apple, FitBit app/Android, etc.)
  7. http://www.experian.com/assets/decision-analytics/brochures/data-enhancement.pdf If company X knows Y then several other companies can tell X what they know about Y – and if they didn’t know some part of Y, now they know as well Things passed around don’t just include facts. Experian tries to guess includes: Demographics, Age, Occupation, Personal Interests, How likely you are to purchase things, Credit Worthiness, How wealthy you are, and more
  8. https://www.getapp.com/customer-management-software/crm/w/linkedin/
  9. https://higi.com/2017/02/higi-launches-groundbreaking-population-screening-solution-for-healthcare-businesses/
  10. https://blog.avast.com/2015/11/11/the-anatomy-of-an-iot-hack/ Other Smart TVs may show ads, etc. – even if no content is on the screen
  11. Often re-uses existing security cameras/etc. May estimate age/gender/ethnicity/etc. Passive detection of cell phones and where/how frequently they are seen Inability to turn off Bluetooth on a FitBit without turning off the FitBit
  12. Ghostery is an interesting case of an ad-/tracking blocker wanting to obtain these analytics to help advertisers in the end
  13. https://java.com/en/data/details.jsp
  14. https://docs.microsoft.com/en-us/windows/configuration/windows-diagnostic-data
  15. Even restaurant workers and hair dressers are being forced to sign NDAs & Noncompetes
  16. Includes individuals, not just corporations
  17. http://www.marketwatch.com/story/college-students-would-give-up-their-friends-privacy-for-free-pizza-2017-06-13 94% with no incentives, 6% of no-incentives gave fake emails (not giving anything an option)
  18. Smaller leaks, staggered over time http://cybersquirrel1.com/