Submit Search
Upload
The Future of Computer Security and Cybercrime
•
0 likes
•
630 views
C
Craig Heath
Follow
Slides from London Futurists meetup, 09 Jan 2016
Read less
Read more
Technology
Report
Share
Report
Share
1 of 13
Download now
Download to read offline
Recommended
People Power in Your Pocket
People Power in Your Pocket
Craig Heath
Mobile Security Sticks and Carrots
Mobile Security Sticks and Carrots
Craig Heath
Security Lessons from Bletchley Park and Enigma
Security Lessons from Bletchley Park and Enigma
Craig Heath
Use Access Control Systems?
Use Access Control Systems?
electricgatelocksstudy77
The New NotCompatible
The New NotCompatible
Lookout
Smartphone Security Article
Smartphone Security Article
Christopher Papazian
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
AirTight Networks
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
Lookout
Recommended
People Power in Your Pocket
People Power in Your Pocket
Craig Heath
Mobile Security Sticks and Carrots
Mobile Security Sticks and Carrots
Craig Heath
Security Lessons from Bletchley Park and Enigma
Security Lessons from Bletchley Park and Enigma
Craig Heath
Use Access Control Systems?
Use Access Control Systems?
electricgatelocksstudy77
The New NotCompatible
The New NotCompatible
Lookout
Smartphone Security Article
Smartphone Security Article
Christopher Papazian
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
AirTight Networks
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
Lookout
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
CheapSSLsecurity
Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
How to communicate effectively in a cyber attack
How to communicate effectively in a cyber attack
Ben Overlander
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Black Duck by Synopsys
Cctv research
Cctv research
a2columne12
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
HSB15 - 0xDUDE
HSB15 - 0xDUDE
Splend
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
Lookout
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
Lookout
A10 presentation overcoming the industrys insecurity complex
A10 presentation overcoming the industrys insecurity complex
Dr. Wilfred Lin (Ph.D.)
Cloud computing 30 april_2011
Cloud computing 30 april_2011
spiirit
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
PaloAltoNetworks
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
CheapSSLsecurity
IoT 2018: What's Hot, What's Not & What's Next
IoT 2018: What's Hot, What's Not & What's Next
Charles Reed Anderson
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Cynthia Calongne
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Xeneta
How Meraki and Fiber Optics Saved the Show
How Meraki and Fiber Optics Saved the Show
Cyrus Hurley
Mobile: the up and downside of risk
Mobile: the up and downside of risk
Michel de Goede
Appril legal workshop - 15 april 2015
Appril legal workshop - 15 april 2015
Olivier Oosterbaan
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
CYBERWISER .eu
Employment contracts: Are they worth the paper they are written on?
Employment contracts: Are they worth the paper they are written on?
Chartered Institute for the Management of Sport and Physical Activity
Employment Contracts & The Importance of Getting them Right
Employment Contracts & The Importance of Getting them Right
Elizabeth Aitken
More Related Content
What's hot
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
CheapSSLsecurity
Top 15 security predictions for 2017
Top 15 security predictions for 2017
Accelerate Tech
How to communicate effectively in a cyber attack
How to communicate effectively in a cyber attack
Ben Overlander
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Black Duck by Synopsys
Cctv research
Cctv research
a2columne12
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
HSB15 - 0xDUDE
HSB15 - 0xDUDE
Splend
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
Lookout
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
Lookout
A10 presentation overcoming the industrys insecurity complex
A10 presentation overcoming the industrys insecurity complex
Dr. Wilfred Lin (Ph.D.)
Cloud computing 30 april_2011
Cloud computing 30 april_2011
spiirit
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
PaloAltoNetworks
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
CheapSSLsecurity
IoT 2018: What's Hot, What's Not & What's Next
IoT 2018: What's Hot, What's Not & What's Next
Charles Reed Anderson
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Cynthia Calongne
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Xeneta
How Meraki and Fiber Optics Saved the Show
How Meraki and Fiber Optics Saved the Show
Cyrus Hurley
Mobile: the up and downside of risk
Mobile: the up and downside of risk
Michel de Goede
Appril legal workshop - 15 april 2015
Appril legal workshop - 15 april 2015
Olivier Oosterbaan
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
CYBERWISER .eu
What's hot
(20)
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
Top 15 security predictions for 2017
Top 15 security predictions for 2017
How to communicate effectively in a cyber attack
How to communicate effectively in a cyber attack
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Cctv research
Cctv research
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
HSB15 - 0xDUDE
HSB15 - 0xDUDE
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
A10 presentation overcoming the industrys insecurity complex
A10 presentation overcoming the industrys insecurity complex
Cloud computing 30 april_2011
Cloud computing 30 april_2011
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
IoT 2018: What's Hot, What's Not & What's Next
IoT 2018: What's Hot, What's Not & What's Next
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
How Meraki and Fiber Optics Saved the Show
How Meraki and Fiber Optics Saved the Show
Mobile: the up and downside of risk
Mobile: the up and downside of risk
Appril legal workshop - 15 april 2015
Appril legal workshop - 15 april 2015
Tackling today's cyber security challenges - WISER Services & Solutions
Tackling today's cyber security challenges - WISER Services & Solutions
Viewers also liked
Employment contracts: Are they worth the paper they are written on?
Employment contracts: Are they worth the paper they are written on?
Chartered Institute for the Management of Sport and Physical Activity
Employment Contracts & The Importance of Getting them Right
Employment Contracts & The Importance of Getting them Right
Elizabeth Aitken
Computer In The Future
Computer In The Future
babylove0860
The Future of Computer Science, and Why Every Other Major Sucks By Comparison
The Future of Computer Science, and Why Every Other Major Sucks By Comparison
guest543f875
Business And The Law
Business And The Law
RobbieA
Future of computer science - Key recommendations by executive panel
Future of computer science - Key recommendations by executive panel
Tata Consultancy Services
The Future Of Computer Technology
The Future Of Computer Technology
august1
future of a computer litrate
future of a computer litrate
Pooja Tanwar
Future Computer
Future Computer
j p
Nanocomputers or Future computer Nanotechnology
Nanocomputers or Future computer Nanotechnology
MAGNIFIER
DSD-INT 2015 - The future of computer modeling of coastal wetland - maselhe
DSD-INT 2015 - The future of computer modeling of coastal wetland - maselhe
Deltares
The Future of Computers and the Internet - Mens en computer in 2030?
The Future of Computers and the Internet - Mens en computer in 2030?
Beat Signer
A Perspective on the Future of Computer Architecture
A Perspective on the Future of Computer Architecture
ARCCN
Employment Contracts 101
Employment Contracts 101
This account is closed
An Introduction to Nano computers
An Introduction to Nano computers
Anoop Keezhillath
Computer Misuse Act
Computer Misuse Act
mrmwood
How Computers Will Help In The Future
How Computers Will Help In The Future
brittney
The Future Of Computers
The Future Of Computers
skyhighphoto83
Next Generation Computer
Next Generation Computer
Anil Kumar
Future of Computers
Future of Computers
guest19ab3c
Viewers also liked
(20)
Employment contracts: Are they worth the paper they are written on?
Employment contracts: Are they worth the paper they are written on?
Employment Contracts & The Importance of Getting them Right
Employment Contracts & The Importance of Getting them Right
Computer In The Future
Computer In The Future
The Future of Computer Science, and Why Every Other Major Sucks By Comparison
The Future of Computer Science, and Why Every Other Major Sucks By Comparison
Business And The Law
Business And The Law
Future of computer science - Key recommendations by executive panel
Future of computer science - Key recommendations by executive panel
The Future Of Computer Technology
The Future Of Computer Technology
future of a computer litrate
future of a computer litrate
Future Computer
Future Computer
Nanocomputers or Future computer Nanotechnology
Nanocomputers or Future computer Nanotechnology
DSD-INT 2015 - The future of computer modeling of coastal wetland - maselhe
DSD-INT 2015 - The future of computer modeling of coastal wetland - maselhe
The Future of Computers and the Internet - Mens en computer in 2030?
The Future of Computers and the Internet - Mens en computer in 2030?
A Perspective on the Future of Computer Architecture
A Perspective on the Future of Computer Architecture
Employment Contracts 101
Employment Contracts 101
An Introduction to Nano computers
An Introduction to Nano computers
Computer Misuse Act
Computer Misuse Act
How Computers Will Help In The Future
How Computers Will Help In The Future
The Future Of Computers
The Future Of Computers
Next Generation Computer
Next Generation Computer
Future of Computers
Future of Computers
Similar to The Future of Computer Security and Cybercrime
TME0212-49
TME0212-49
Bill Mitchell
Mapping media industry challenges (media vision day 2016)
Mapping media industry challenges (media vision day 2016)
Olivier Braet
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
Morgan Jones
Hacking back in self defense
Hacking back in self defense
David Willson, Attorney, CISSP, Security +
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
Brad Deflin
Paranoia or risk management 2013
Paranoia or risk management 2013
Henrik Kramshøj
INT 1010 10-3.pdf
INT 1010 10-3.pdf
Luis R Castellanos
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Black Duck by Synopsys
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Ekonomikas ministrija
Take Down
Take Down
Prof John Walker FRSA Purveyor Dark Intelligence
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Paige Rasid
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
Cigniti Technologies Ltd
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Centurylink 2018 threat report
Centurylink 2018 threat report
Andrew Prosser
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
Quick Explanation of Internet Privacy
Quick Explanation of Internet Privacy
Trading Atlas
Marketplace Innovation Report | Q2, 2016
Marketplace Innovation Report | Q2, 2016
Endava
Bill gurleys-above-the-crowd-compilation (1)
Bill gurleys-above-the-crowd-compilation (1)
tylerboone
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
Symantec
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
Accenture Operations
Similar to The Future of Computer Security and Cybercrime
(20)
TME0212-49
TME0212-49
Mapping media industry challenges (media vision day 2016)
Mapping media industry challenges (media vision day 2016)
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
Hacking back in self defense
Hacking back in self defense
Cyber Risk in Real Estate Sales - Workshop Presentation
Cyber Risk in Real Estate Sales - Workshop Presentation
Paranoia or risk management 2013
Paranoia or risk management 2013
INT 1010 10-3.pdf
INT 1010 10-3.pdf
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Take Down
Take Down
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
Centurylink 2018 threat report
Centurylink 2018 threat report
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Quick Explanation of Internet Privacy
Quick Explanation of Internet Privacy
Marketplace Innovation Report | Q2, 2016
Marketplace Innovation Report | Q2, 2016
Bill gurleys-above-the-crowd-compilation (1)
Bill gurleys-above-the-crowd-compilation (1)
Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
Collective Ingenuity against Cyber Attacks
Collective Ingenuity against Cyber Attacks
Recently uploaded
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Bhuvaneswari Subramani
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Zilliz
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
johnbeverley2021
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2
Recently uploaded
(20)
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Elevate Developer Efficiency & build GenAI Application with Amazon Q
Elevate Developer Efficiency & build GenAI Application with Amazon Q
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
The Future of Computer Security and Cybercrime
1.
Franklin Heath Ltd London
Futurists: The Future of Computer Security and “Cybercrime” Craig Heath @heathcr 09 January 2016
2.
© Franklin Heath
Ltd c b CC BY 3.0 lawyerlawyer ✗ mathematicianmathematician ✗ computer scientist ✓ security engineer ✓ futurist ? Craig Heath 09 January 2016 2
3.
© Franklin Heath
Ltd c b CC BY 3.0 “Cyber” 09 January 2016 3 Image Credit: “DarkAngelDTB” from DeviantArt Image Credit: Colin Foran (DeviantArt: “nathantwist”)
4.
© Franklin Heath
Ltd c b CC BY 3.0 How to Predict the Future (vaguely scientifically) 09 January 2016 4 Considering trends + thought experiments Where I’m looking for trends: my experience First job in software 1977 computer security specialist since 1988 history of information security Kerckhoffs 1883 Bletchley Park 1939-45 How far away is the horizon?
5.
© Franklin Heath
Ltd c b CC BY 3.0 Computer Security vs. Cybercrime 09 January 2016 5 Computers used to commit “traditional” crimes Roswell Steffen 1973 (embezzlement > $1.5M) Unauthorised use of computers Stephen Gold, Robert Schiffreen 1985 Kevin Mitnick 1987 Breaching computer security has itself become defined as a new type of crime UK Computer Misuse Act 1990 US Digital Millennium Copyright Act 2000
6.
© Franklin Heath
Ltd c b CC BY 3.0 Trends: What Has Stayed the Same? 09 January 2016 6 Information theory & computer science Kerckhoffs 1883 Turing 1936 Shannon 1948 Saltzer & Schroeder 1975 Passwords easy to understand and implement Social engineering attacks c.f. “rubber-hose cryptanalysis”
7.
© Franklin Heath
Ltd c b CC BY 3.0 Trends: What Has Changed? 09 January 2016 7 Number of devices, connectivity and bandwidth (10 9 ) billions, always-on with multiple Mbps “Classic” crimes have moved online e.g. confidence tricks -> phishing “Beta culture” continual enhancement and patching Magnification of capabilities and consequences a fix can be rolled out to millions of users a single attacker can harm millions of users The “attribution problem” nation state or a kid in a cyber café?
8.
© Franklin Heath
Ltd c b CC BY 3.0 Is Computer Security Getting Better or Worse? 09 January 2016 8 I don’t know any computer security professional who would argue it’s getting significantly better I don’t know anyone who has stopped using the Internet because it’s getting significantly worse Hypothesis: did we reach a sort of equilibrium in the 1990s that is acceptable to society, now maintained by governments and market forces?
9.
© Franklin Heath
Ltd c b CC BY 3.0 What Influences Might Tip the Balance? – 1. Downside 09 January 2016 9 Increasing complexity of computer systems if you don’t understand it, you can’t fix it Increasing value available to attackers transaction limits increase ever more data goes online Increasing ability to affect the real world “Cyber Physical Systems” Better policing of non-computer crimes bad guys usually follow the path of least resistance
10.
© Franklin Heath
Ltd c b CC BY 3.0 What Influences Might Tip the Balance? – 2. Upside 09 January 2016 10 Market forces consumer awareness but see “The Market for Lemons” (Akerlof 1970) risk of reputational damage cost of breaches and/or conditions of business insurance Legal forces regulation (c.f. building regulations) licensing (c.f. chartered civil engineers) fines or compensation awards for affected consumers
11.
© Franklin Heath
Ltd c b CC BY 3.0 How Serious is Reputational Damage for a Company? 09 January 2016 11 The “Ratner Effect” Ratner Group value: 1991 £680M 1992 £49M ... 2016 £7454M Image Credit: “EG Focus” from Flickr
12.
© Franklin Heath
Ltd c b CC BY 3.0 Why I Don’t Believe Breach Cost Estimates 09 January 2016 12 2011 Detica report: “cost of cyber crime to the UK ... £27bn per annum” approx. £540 per year for each adult in the UK Detailed response from Ross Anderson et al.: “Measuring the Cost of Cybercrime”, 2012 doesn’t venture a bottom line figure, but... My experience: Costs of loss of IP are routinely vastly overstated Fraud losses are a normal cost of banks’ business
13.
© Franklin Heath
Ltd c b CC BY 3.0 Crystal Ball: Will the Equilibrium Hold? 09 January 2016 13 If security defenders just keep doing the same things, attackers will overtake us Penetration testing and code inspection isn’t going to take us much further Fundamentals need to be, and can be, improved better product development process better platforms better tools better developers
Download now