Q&A: Schneier says cybercrime problem 'might not be fixable'
Business changes are needed to combat identity thieves, BT Counterpane CTO contends
IDG News Service - Bruce Schneier is an expert on cryptography and a well-known author and commentator on information security issues in general. Schneier also is chief technology officer at BT Counterpane, a managed security services vendor that is part of BT PLC; the company was founded by Schneier as Counterpane Internet Security Inc. in 1999 and then acquired by BT in October 2006. At the Infosecurity Europe 2008 conference in London this week, Schneier spoke with the IDG News Service about the psychology of data security and the effectiveness of security software. Excerpts follow:
Are antivirus vendors just making money by giving people a feeling of security instead of real security? Antivirus products actually work; they have for years. A lot of the software on this show floor is just snake oil, but antivirus does work. You should have an antivirus program; you should have it updated regularly. It doesn't make you secure, but it gets that bottom layer of the trivial stuff. It's not sufficient, but it's certainly necessary.
People are tricked into downloading malicious software through social engineering. Have people become so conditioned — mainly by watching television — that they believe whatever appears on their PC monitors? Yes, but it's not television. People believe what they see on the Net not because of television but because of the trappings of reality. So when you got to BT.com, you see the BT logo, the BT font, the PR material, and you think, "Yeah, it's BT" — like when you go to your bank, you see the logo and the tellers.
On the Web, it could be a fake BT.com site and you don't notice, because it's trivially easy to copy. So people do believe what they see on the Internet — not because of television, but because the Internet has the trappings of the real world. All of those social cues you get to know to trust something — it looks professional, nothing's misspelled — you see those things and you believe it's real.
Do you think people will ever become more suspicious of the Internet? Younger people will pick it up. But certainly you can always fool people unless there is some external validation of [Web sites]. Unless you can do that, there's no guarantee that [users] are not going to be fooled.
What do you think the biggest online threat is right now? Crime.
So how do you fix it? It's expensive to investigate, and it's cross-jurisdictional. It might not be fixable. A lot of [the solution] is going to be making the things that criminals are going after harder to get. You're not going to stop the criminals [from trying]. But in the United States, it's really easy to get a credit card in someone else's name. The credit card companies like it that way. So a lot of it is looking at how the criminals are attacking things and making it harder [for] them. The brokerage companies want it to be easy for you to log on and make trades. Make it harder, and the businesses don't like that.They're afraid that it will drive away customers. Of course. If I strip-search you before you go into the bank, you might change branches. In the U.S., the government doesn't have the [guts] to require stuff like [stronger authentication]. You've got to make the banks responsible for losses. The brokerage company has to [reimburse] me if I didn't make a [fraudulent] trade — period, end of sentence. That's how you fix it. Because then, my brokerage is going to start buying security; otherwise, they won't.
The basic rule of security: you make the entity in the best position to mitigate the risk responsible for the risk. Make them responsible — they'll figure it out. That's how capitalism works.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility Lacking the time for proper training and education, SMB administrators often resort to taking shortcuts to keep their environment running.This paper discusses the...
- Logicalis eBook: SAP HANA: The Need for Speed Without timely business insights, organizations today can suffer logistical, manufacturing, and even financial disaster in a matter of minutes
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to...
- Building Tomorrow's Infrastructure Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. All Endpoint Security White Papers | Webcasts