{"id":156,"date":"2011-02-05T09:19:11","date_gmt":"2011-02-05T15:19:11","guid":{"rendered":"http:\/\/fraudblock.wordpress.com\/?p=156"},"modified":"2011-02-05T09:19:11","modified_gmt":"2011-02-05T15:19:11","slug":"the-best-cyber-security-practices-are","status":"publish","type":"post","link":"https:\/\/amirbekian.com\/blog\/2011\/02\/the-best-cyber-security-practices-are\/","title":{"rendered":"The best cyber security practices are&#8230;"},"content":{"rendered":"<p>&#8230;the ones which don&#8217;t expect any action or assume any expertise from the end user. Naturally.<\/p>\n<p>I did try to make a case for &#8216;no substitution for user education&#8217; <a title=\"Is there an alternative to user\u00a0education?\u2026\" href=\"http:\/\/fraudblock.wordpress.com\/2007\/12\/27\/is-there-an-alternative-to-user-education\/\">several years ago<\/a>.  However, clearly, with explosive penetration of Internet being as  ubiquitous and essential service as phone or even water &amp;  electricity the prospect of having a security-savvy user base &#8211; capable  of understanding the difference between <em>HTTP <\/em>and <em>HTTPS<\/em>, or <em>paypal.com<\/em> and <em>paypal.abc.com<\/em> &#8211; keeps getting further away. Indeed, the answer to growing cyber fraud  threat cannot rely solely on an assumption of average netizen&#8217;s  abilities to detect and fight back the ever sophisticated attacks from  the bad guys. Continuing the analogy with physical security it&#8217;s  equivalent to saying &#8220;let&#8217;s assume all good guys have a gun and know how  and when to use it to defend themselves&#8221;. This strategy might have  worked in the Wild West (if it did), but has poor chances in the 21st  century&#8217;s Cyber World\u00a0 (sorry, NRA).<\/p>\n<p>Not surprisingly, the industry slowly but surely moves towards, let&#8217;s  call it, &#8220;built-in security&#8221;. The shift in mindset could be  characterized by<strong> security considerations becoming more of a driver and less of an afterthought<\/strong>.<\/p>\n<p>For example, it&#8217;s well known that many users chronically fail to  patch their computers &#8211; operating systems and applications (browsers,  PDF readers, Java VM, etc.). That leaves them wide open to &#8216;exploits in  the wild&#8217; &#8211; inevitably resulting in data being  stolen, machines being infected and getting &#8216;enlisted&#8217; to a botnet. In order to address this situation more companies are  switching to &#8216;stealth update&#8217; mode. For instance, unlike its  competitors, Google&#8217;s Chrome chooses not to ask the user to initiate an  update &#8211; it does it silently without users even knowing it. Windows 7  seems to adopt the same approach &#8211; by default the users are not asked to  perform any action to have their operating system to be patched.<\/p>\n<p>The same rule applies to other security measures. Facebook recently introduced a nice feature enabling switching its <a href=\"http:\/\/www.wired.com\/threatlevel\/2011\/01\/facebook-https\/\">traffic to HTTPS<\/a>.  Alas, the option is off by default and the 600 mln users are expected  to go to their account settings and turn it on manually (most probably  Facebook was afraid of the cost of wholesale movement to HTTPS). Again,  Google shines here. Not only it moved all its <a href=\"http:\/\/gmailblog.blogspot.com\/2010\/01\/default-https-access-for-gmail.html\">gmail service to HTTPS<\/a> well before Facebook did, it also made it universal and by default &#8211; no  user action was expected. I bet vast majority of gmail service users  didn&#8217;t even notice the change. Another less known example is also  recently introduced <a href=\"http:\/\/en.wikipedia.org\/wiki\/HTTP_Strict_Transport_Security\">Strict Transport Security<\/a> which allows web servers to prevent non-secure (or even suspicious)  connections in order to prevent man-in-the-middle attacks. Again,  &#8220;average&#8221; users need not to even know the mechanism exists.<\/p>\n<p>These trends are bound to gain momentum. I imagine more and more  companies will switch to HTTPS in the near future, and patching will not  require user confirmation by default (perhaps leaving an   &#8220;ask me  first&#8221; before updating option &#8211; off by default &#8211; for tech-savvy &#8211; or  perky &#8211; users). More services will move away from simple password-based  authentication. Microsoft Essentials will become an integral part of the  Windows OS (if anti-trust allows them to do so). Applications will  become increasingly sandboxed. And so on&#8230;<\/p>\n<p>This is not to say that one day you will be able to survive in the  Cyber World without some basic knowledge and prudence &#8211; just like you  need some common sense to live everyday life &#8211; from how to cross the  street to avoiding dangerous neighborhoods. However, that knowledge  should be kept to minimum, be intuitive, be transparent and belong to  public domain and even school (kindergarten?) curriculum.\u00a0 In the end  the rules should be simple enough that &#8211; unless you are striving for   the <a href=\"http:\/\/www.darwinawards.com\/\">Darwin Award<\/a> &#8211; by following them you are not risking your (cyber) well-being. The rest should be taken care of by the smart technology. Ideally.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8230;the ones which don&#8217;t expect any action or assume any expertise from the end user. Naturally. I did try to make a case for &#8216;no substitution for user education&#8217; several years ago. However, clearly, with explosive penetration of Internet being as ubiquitous and essential service as phone or even water &amp; electricity the prospect of &hellip; <a href=\"https:\/\/amirbekian.com\/blog\/2011\/02\/the-best-cyber-security-practices-are\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The best cyber security practices are&#8230;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[9,25],"class_list":["post-156","post","type-post","status-publish","format-standard","hentry","category-general-observations-commentary","category-prognosis","tag-cyber-security","tag-user-education"],"_links":{"self":[{"href":"https:\/\/amirbekian.com\/blog\/wp-json\/wp\/v2\/posts\/156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amirbekian.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/amirbekian.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/amirbekian.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/amirbekian.com\/blog\/wp-json\/wp\/v2\/comments?post=156"}],"version-history":[{"count":0,"href":"https:\/\/amirbekian.com\/blog\/wp-json\/wp\/v2\/posts\/156\/revisions"}],"wp:attachment":[{"href":"https:\/\/amirbekian.com\/blog\/wp-json\/wp\/v2\/media?parent=156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/amirbekian.com\/blog\/wp-json\/wp\/v2\/categories?post=156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/amirbekian.com\/blog\/wp-json\/wp\/v2\/tags?post=156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}