Turning off your phone isn't the answer... but what is?
Edward Farrell
Cyber security nerd, Director, Advisor, Industry Fellow @ UNSW Canberra, Annoying Gadfly
Late last week Australia discovered the silver bullet in cyber security. The prime minister presented the easy fix- just need to regularly turn off our devices every now and then, and that will stop the threat dead in its tracks. Whilst this solution may work in very very specific circumstances, I wanted to at least walk through the limitations of this fix, but also the reality that we have when conclusive endstates we induce greater risk into our digital environment.?
Why this isn't quite correct
I believe if we reverse through the Lockheed Martin Cyber Kill Chain, we can at least make some basic deductions why rebooting presents a negligible impact?
The one time this will work is when something is running in memory and the threat actor has no intention of persisting, at which point a reboot simply clears off a threat actor that needed to do a hit and run and is indifferent to the reboot anyway.
So why does this matter?
Reality is there is no harm in a reboot of a personal device at regular intervals and it may very well clear off something hanging around in memory. The issue is what I call "bear patrol syndrome" after an event in a Simpsons episode. After a minor incident with a bear walking through town, the residents of springfield employ bear patrol program with plenty of sirens and their own B2 bomber. Lisa Simpson points out that a rock present is also equally effective at performing the same function, and this is evidenced through the absence of bears. Performance based or the dramatic arts should play a limited role in cyber security; theatrics and manipulation of human behaviour with no evidence is at best a control mechanism to force positive behaviours and at worst its the?foundation for cults and attitudes that erode social fabrics.
We've seen such conditioning in the past in cyber security, including:
领英推荐
My worst experience of this was dealing with a domestic violence victim who suffered through a lack of education and reinforced by the "a current affair" approach to cyber security recently employed by the prime minister. Existing prejudices likely exacerbated through years of mental abuse, alongside thought processes and fears through introduced ideas, saw the victim convinced in the absence of evidence that their partner was still present on their electronic devices even after investigative efforts of multiple professionals. Unfortunately, a few grifters had long capitalised on this, convinced her the individual was still here, and prolonged her mental anguish. The actions taken by the prime minister only reinforce the culture of digital mysticism that have now captured so much of the western world and only serves to continue harming us.?
Looking forward, the conditioning and absence of evidence or reasonable conclusions also presents a number of risks that I foresee:?
I use the word empirical quite deliberately; the absence of evidence based approaches, even when ASD/ACSC has published the globally recognised top 35 mitigations informed by decades of incident response (incorporating the ASD essential 8) was a bit of a disappointment. You don't need to be a political genius to realise that, when you're advocated approach of rebooting regularly doesn't work and systems are still getting hosed, everyone will question what expertise our government really has to make us "the most cyber secure country by 2030".?
So what is the answer?
The best answer I could give came to me several weeks ago and probably codified during writing. Context is everything, so the best we can do is absorb what reliable information we have at hand and make a decision.
There is never a perfect decision, only tradeoffs, and whilst our digital environments will always maintain some insecurity, the economic and cultural value we have realised out of these over the years probably highlights that we have done pretty well so far, but theres always more to do.
Information Security Professional
1 年Many people have given me grief for dual wielding. The nice thing about this is I have a work phone and a personal phone from 2 different carriers so I always have phone or data service where ever I go. The other thing is, I put the work one on do not disturb when it isn't work time. It is only optional for me to look at the work phone if it isn't business hours. If something requires my attention outside of normal hours, my people know how to get a hold of me otherwise.
Cybercrime and Cybersecurity | fractionalciso.com.au
1 年??
Cyber Security Executive & Strategist with Global Experience | Driving Resilience & Trust in Tech
1 年Nicely penned, Ed. I particularly resonate with your emphasis on context. It brings to mind a quote from the stoic philosopher Epictetus, “Only the educated are free.” I wholeheartedly concur that context, information, and knowledge are the bedrock of sound judgement and appropriate action. In your view, how can we better educate the general public about the nuances of cybersecurity to foster this understanding?
Senior Defence Cyber Evangelist at GuardWare, BDM Defence/Aerospace/Space at Cider House ICT, Presenter - Defence Ready Seminar Series at Goal Group
1 年Great points Ed!