11.07.2015 Views

syssec_red_book

syssec_red_book

syssec_red_book

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

25.2. Research ThemesRisk management aims to assess the economic value of security, toprovide a rational basis for allocating resources to improve securityafter identifying and assessing risks—and to determine if we are doingenough, or too much, and if we are spending resources on the rightthings. A scientific basis for establishing such facts is currently missing.One central problem here is that concrete data are often lacking, andmore research could provide a more solid basis.A much more fundamental problem is that risk assessment is typicallydone by an individual party, one of the many parties that collectivelyprovide a complex value chain. For an individual party in such a complexvalue chain there may not be any economics incentives to fix a problem.Indeed, in cyber security there are many externalities: costs that areborne by other parties and hence not incorporated in price. For example,someone whose home PC is part of a botnet might not notice any adverseeffects, and hence not be motivated to go through all the hassle ofcleaning it. Perverse incentives may be a more important cause of securityproblems rather than the lack of suitable technical protection mechanisms.We need to carry out new studies into the incentives and externalities.We need research to get a better understanding of the economics ofsecurity—and the economic (dis)incentives that occur—and for morestructural solutions of security problems.Understanding economic drivers—and where these fail—is also crucialto determine where regulation is needed, and more generally whatthe government’s role should be in cyber security. Different regulatoryframeworks and legal constraints may apply in the various applicationdomains, and at different levels: national, EU, and international.8. Secure Design, Tooling, and EngineeringSecurity engineering is a relatively new field and still lacks the methodsand tools to design, build and cost-effectively test secure systems. ICTsystems in use today are typically not designed and built with security inmind. As a result, security is often dealt with retrospectively, only aftersecurity problems arise. Security problems then have to be solved by anadd-on in the design, when bad initial design decisions can no longer bereversed. When it comes to the software, fixing the problems requirescostly bug fixes to patch implementations.Ideally, systems should be designed with security and privacy in mindfrom the start—ensuring Security by Design or Privacy by Design. Theyshould then be implemented and tested using sound engineering principlesand analysis techniques, in order to avoid security problems ordetect them at an early stage. While considerable progress has been155

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!