Franklin Heath Ltd
London Futurists:
The Future of Computer
Security and “Cybercrime”
Craig Heath
@heathcr
09 January 2016
© Franklin Heath Ltd
c b CC BY 3.0
lawyerlawyer ✗
mathematicianmathematician ✗
computer scientist ✓
security engineer ✓
futurist ?
Craig Heath
09 January 2016 2
© Franklin Heath Ltd
c b CC BY 3.0
“Cyber”
09 January 2016 3
Image Credit: “DarkAngelDTB” from DeviantArt Image Credit: Colin Foran (DeviantArt: “nathantwist”)
© Franklin Heath Ltd
c b CC BY 3.0
How to Predict the Future
(vaguely scientifically)
09 January 2016 4
 Considering trends + thought experiments
 Where I’m looking for trends:
 my experience
 First job in software 1977
 computer security specialist since 1988
 history of information security
 Kerckhoffs 1883
 Bletchley Park 1939-45
 How far away is the horizon?
© Franklin Heath Ltd
c b CC BY 3.0
Computer Security vs. Cybercrime
09 January 2016 5
 Computers used to commit “traditional” crimes
 Roswell Steffen 1973 (embezzlement > $1.5M)
 Unauthorised use of computers
 Stephen Gold, Robert Schiffreen 1985
 Kevin Mitnick 1987
 Breaching computer security has itself become
defined as a new type of crime
 UK Computer Misuse Act 1990
 US Digital Millennium Copyright Act 2000
© Franklin Heath Ltd
c b CC BY 3.0
Trends: What Has Stayed the Same?
09 January 2016 6
 Information theory & computer science
 Kerckhoffs 1883
 Turing 1936
 Shannon 1948
 Saltzer & Schroeder 1975
 Passwords
 easy to understand and implement
 Social engineering attacks
 c.f. “rubber-hose cryptanalysis”
© Franklin Heath Ltd
c b CC BY 3.0
Trends: What Has Changed?
09 January 2016 7
 Number of devices, connectivity and bandwidth
 (10
9
) billions, always-on with multiple Mbps
 “Classic” crimes have moved online
 e.g. confidence tricks -> phishing
 “Beta culture”
 continual enhancement and patching
 Magnification of capabilities and consequences
 a fix can be rolled out to millions of users
 a single attacker can harm millions of users
 The “attribution problem”
 nation state or a kid in a cyber café?
© Franklin Heath Ltd
c b CC BY 3.0
Is Computer Security Getting Better
or Worse?
09 January 2016 8
 I don’t know any computer security professional
who would argue it’s getting significantly better
 I don’t know anyone who has stopped using the
Internet because it’s getting significantly worse
 Hypothesis: did we reach a sort of equilibrium in
the 1990s that is acceptable to society, now
maintained by governments and market forces?
© Franklin Heath Ltd
c b CC BY 3.0
What Influences Might Tip the
Balance? – 1. Downside
09 January 2016 9
 Increasing complexity of computer systems
 if you don’t understand it, you can’t fix it
 Increasing value available to attackers
 transaction limits increase
 ever more data goes online
 Increasing ability to affect the real world
 “Cyber Physical Systems”
 Better policing of non-computer crimes
 bad guys usually follow the path of least resistance
© Franklin Heath Ltd
c b CC BY 3.0
What Influences Might Tip the
Balance? – 2. Upside
09 January 2016 10
 Market forces
 consumer awareness
 but see “The Market for Lemons” (Akerlof 1970)
 risk of reputational damage
 cost of breaches
 and/or conditions of business insurance
 Legal forces
 regulation (c.f. building regulations)
 licensing (c.f. chartered civil engineers)
 fines or compensation awards for affected consumers
© Franklin Heath Ltd
c b CC BY 3.0
How Serious is Reputational
Damage for a Company?
09 January 2016 11
 The “Ratner Effect”
 Ratner Group value:
 1991 £680M
 1992 £49M
 ...
 2016 £7454M
Image Credit: “EG Focus” from Flickr
© Franklin Heath Ltd
c b CC BY 3.0
Why I Don’t Believe Breach Cost
Estimates
09 January 2016 12
 2011 Detica report:
 “cost of cyber crime to the UK ... £27bn per annum”
 approx. £540 per year for each adult in the UK
 Detailed response from Ross Anderson et al.:
 “Measuring the Cost of Cybercrime”, 2012
 doesn’t venture a bottom line figure, but...
 My experience:
 Costs of loss of IP are routinely vastly overstated
 Fraud losses are a normal cost of banks’ business
© Franklin Heath Ltd
c b CC BY 3.0
Crystal Ball:
Will the Equilibrium Hold?
09 January 2016 13
 If security defenders just keep doing the same
things, attackers will overtake us
 Penetration testing and code inspection isn’t
going to take us much further
 Fundamentals need to be, and can be, improved
 better product development process
 better platforms
 better tools
 better developers

More Related Content

PDF
People Power in Your Pocket
PPTX
Mobile Security Sticks and Carrots
PDF
Security Lessons from Bletchley Park and Enigma
PDF
Use Access Control Systems?
PDF
The New NotCompatible
DOCX
Smartphone Security Article
PPTX
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
PDF
Feds: You have a BYOD program whether you like it or not
People Power in Your Pocket
Mobile Security Sticks and Carrots
Security Lessons from Bletchley Park and Enigma
Use Access Control Systems?
The New NotCompatible
Smartphone Security Article
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
Feds: You have a BYOD program whether you like it or not

What's hot (20)

PPTX
The Top Five Cybersecurity Threats for 2018
PPTX
Top 15 security predictions for 2017
PDF
How to communicate effectively in a cyber attack
PPTX
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
ODT
Cctv research
PDF
2015 Cybersecurity Predictions
PDF
HSB15 - 0xDUDE
PDF
Relentless Mobile Threats to Avoid
PDF
5 Ways to Protect your Mobile Security
PDF
A10 presentation overcoming the industrys insecurity complex
DOC
Cloud computing 30 april_2011
PDF
Palo Alto Networks 2016 Cybersecurity Predictions
PDF
Norton Cyber Security Insights Report 2017
PPTX
IoT 2018: What's Hot, What's Not & What's Next
PPTX
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
PDF
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
PDF
How Meraki and Fiber Optics Saved the Show
PDF
Mobile: the up and downside of risk
PPTX
Appril legal workshop - 15 april 2015
PPTX
Tackling today's cyber security challenges - WISER Services & Solutions
The Top Five Cybersecurity Threats for 2018
Top 15 security predictions for 2017
How to communicate effectively in a cyber attack
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Cctv research
2015 Cybersecurity Predictions
HSB15 - 0xDUDE
Relentless Mobile Threats to Avoid
5 Ways to Protect your Mobile Security
A10 presentation overcoming the industrys insecurity complex
Cloud computing 30 april_2011
Palo Alto Networks 2016 Cybersecurity Predictions
Norton Cyber Security Insights Report 2017
IoT 2018: What's Hot, What's Not & What's Next
Security workshop at CONNECT 2020 by Calongne, Rose, Hamons
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
How Meraki and Fiber Optics Saved the Show
Mobile: the up and downside of risk
Appril legal workshop - 15 april 2015
Tackling today's cyber security challenges - WISER Services & Solutions
Ad

Viewers also liked (20)

PDF
Employment contracts: Are they worth the paper they are written on?
PDF
Employment Contracts & The Importance of Getting them Right
PPTX
Computer In The Future
PPT
The Future of Computer Science, and Why Every Other Major Sucks By Comparison
PPT
Business And The Law
PPTX
Future of computer science - Key recommendations by executive panel
PPT
The Future Of Computer Technology
PPSX
future of a computer litrate
PPT
Future Computer
 
PPTX
Nanocomputers or Future computer Nanotechnology
PDF
DSD-INT 2015 - The future of computer modeling of coastal wetland - maselhe
PDF
The Future of Computers and the Internet - Mens en computer in 2030?
PPTX
A Perspective on the Future of Computer Architecture
PPT
Employment Contracts 101
PPT
An Introduction to Nano computers
PPT
Computer Misuse Act
PPT
How Computers Will Help In The Future
PPTX
The Future Of Computers
PPT
Next Generation Computer
PPT
Future of Computers
Employment contracts: Are they worth the paper they are written on?
Employment Contracts & The Importance of Getting them Right
Computer In The Future
The Future of Computer Science, and Why Every Other Major Sucks By Comparison
Business And The Law
Future of computer science - Key recommendations by executive panel
The Future Of Computer Technology
future of a computer litrate
Future Computer
 
Nanocomputers or Future computer Nanotechnology
DSD-INT 2015 - The future of computer modeling of coastal wetland - maselhe
The Future of Computers and the Internet - Mens en computer in 2030?
A Perspective on the Future of Computer Architecture
Employment Contracts 101
An Introduction to Nano computers
Computer Misuse Act
How Computers Will Help In The Future
The Future Of Computers
Next Generation Computer
Future of Computers
Ad

Similar to The Future of Computer Security and Cybercrime (20)

PDF
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
PDF
Cyber Resilience
PPTX
The Evolution of Cybercrime
PPTX
What is Information Security and why you should care ...
PPTX
Breakfast Briefings - February 2018
PPTX
cybersecurity-ppt.pptx btech unit unknown aktu
PDF
2014 the future evolution of cybersecurity
PPTX
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
PPT
Cyber ppt
PDF
Dell Technologies Cyber Security playbook
PPTX
Cyber Security in the Manufacturing Industry: New challenges in the informati...
PPTX
CYBER SECURITY and cyber law with management.PPT.pptx
PPTX
The 2018 Threatscape
PPTX
Cyber Security and the CEO
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PPTX
Cybersecurity All information and topic wise
PDF
Rise of cyber security v0.1
PDF
Clear and present danger: Cyber Threats and Trends 2017
PDF
Cyber security for ia and risk 150601
PPTX
IT & Network Security Awareness
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cyber Resilience
The Evolution of Cybercrime
What is Information Security and why you should care ...
Breakfast Briefings - February 2018
cybersecurity-ppt.pptx btech unit unknown aktu
2014 the future evolution of cybersecurity
CyberSecurity SONI CHANDAN TEACHER TRAINING MATERIALS
Cyber ppt
Dell Technologies Cyber Security playbook
Cyber Security in the Manufacturing Industry: New challenges in the informati...
CYBER SECURITY and cyber law with management.PPT.pptx
The 2018 Threatscape
Cyber Security and the CEO
CRI "Lessons From The Front Lines" March 26th Dublin
Cybersecurity All information and topic wise
Rise of cyber security v0.1
Clear and present danger: Cyber Threats and Trends 2017
Cyber security for ia and risk 150601
IT & Network Security Awareness

Recently uploaded (20)

PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Modernising the Digital Integration Hub
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
sustainability-14-14877-v2.pddhzftheheeeee
Modernising the Digital Integration Hub
A proposed approach for plagiarism detection in Myanmar Unicode text
NewMind AI Weekly Chronicles – August ’25 Week III
The influence of sentiment analysis in enhancing early warning system model f...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Microsoft Excel 365/2024 Beginner's training
Developing a website for English-speaking practice to English as a foreign la...
Zenith AI: Advanced Artificial Intelligence
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
sbt 2.0: go big (Scala Days 2025 edition)
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
OpenACC and Open Hackathons Monthly Highlights July 2025
Final SEM Unit 1 for mit wpu at pune .pptx

The Future of Computer Security and Cybercrime

  • 1. Franklin Heath Ltd London Futurists: The Future of Computer Security and “Cybercrime” Craig Heath @heathcr 09 January 2016
  • 2. © Franklin Heath Ltd c b CC BY 3.0 lawyerlawyer ✗ mathematicianmathematician ✗ computer scientist ✓ security engineer ✓ futurist ? Craig Heath 09 January 2016 2
  • 3. © Franklin Heath Ltd c b CC BY 3.0 “Cyber” 09 January 2016 3 Image Credit: “DarkAngelDTB” from DeviantArt Image Credit: Colin Foran (DeviantArt: “nathantwist”)
  • 4. © Franklin Heath Ltd c b CC BY 3.0 How to Predict the Future (vaguely scientifically) 09 January 2016 4  Considering trends + thought experiments  Where I’m looking for trends:  my experience  First job in software 1977  computer security specialist since 1988  history of information security  Kerckhoffs 1883  Bletchley Park 1939-45  How far away is the horizon?
  • 5. © Franklin Heath Ltd c b CC BY 3.0 Computer Security vs. Cybercrime 09 January 2016 5  Computers used to commit “traditional” crimes  Roswell Steffen 1973 (embezzlement > $1.5M)  Unauthorised use of computers  Stephen Gold, Robert Schiffreen 1985  Kevin Mitnick 1987  Breaching computer security has itself become defined as a new type of crime  UK Computer Misuse Act 1990  US Digital Millennium Copyright Act 2000
  • 6. © Franklin Heath Ltd c b CC BY 3.0 Trends: What Has Stayed the Same? 09 January 2016 6  Information theory & computer science  Kerckhoffs 1883  Turing 1936  Shannon 1948  Saltzer & Schroeder 1975  Passwords  easy to understand and implement  Social engineering attacks  c.f. “rubber-hose cryptanalysis”
  • 7. © Franklin Heath Ltd c b CC BY 3.0 Trends: What Has Changed? 09 January 2016 7  Number of devices, connectivity and bandwidth  (10 9 ) billions, always-on with multiple Mbps  “Classic” crimes have moved online  e.g. confidence tricks -> phishing  “Beta culture”  continual enhancement and patching  Magnification of capabilities and consequences  a fix can be rolled out to millions of users  a single attacker can harm millions of users  The “attribution problem”  nation state or a kid in a cyber café?
  • 8. © Franklin Heath Ltd c b CC BY 3.0 Is Computer Security Getting Better or Worse? 09 January 2016 8  I don’t know any computer security professional who would argue it’s getting significantly better  I don’t know anyone who has stopped using the Internet because it’s getting significantly worse  Hypothesis: did we reach a sort of equilibrium in the 1990s that is acceptable to society, now maintained by governments and market forces?
  • 9. © Franklin Heath Ltd c b CC BY 3.0 What Influences Might Tip the Balance? – 1. Downside 09 January 2016 9  Increasing complexity of computer systems  if you don’t understand it, you can’t fix it  Increasing value available to attackers  transaction limits increase  ever more data goes online  Increasing ability to affect the real world  “Cyber Physical Systems”  Better policing of non-computer crimes  bad guys usually follow the path of least resistance
  • 10. © Franklin Heath Ltd c b CC BY 3.0 What Influences Might Tip the Balance? – 2. Upside 09 January 2016 10  Market forces  consumer awareness  but see “The Market for Lemons” (Akerlof 1970)  risk of reputational damage  cost of breaches  and/or conditions of business insurance  Legal forces  regulation (c.f. building regulations)  licensing (c.f. chartered civil engineers)  fines or compensation awards for affected consumers
  • 11. © Franklin Heath Ltd c b CC BY 3.0 How Serious is Reputational Damage for a Company? 09 January 2016 11  The “Ratner Effect”  Ratner Group value:  1991 £680M  1992 £49M  ...  2016 £7454M Image Credit: “EG Focus” from Flickr
  • 12. © Franklin Heath Ltd c b CC BY 3.0 Why I Don’t Believe Breach Cost Estimates 09 January 2016 12  2011 Detica report:  “cost of cyber crime to the UK ... £27bn per annum”  approx. £540 per year for each adult in the UK  Detailed response from Ross Anderson et al.:  “Measuring the Cost of Cybercrime”, 2012  doesn’t venture a bottom line figure, but...  My experience:  Costs of loss of IP are routinely vastly overstated  Fraud losses are a normal cost of banks’ business
  • 13. © Franklin Heath Ltd c b CC BY 3.0 Crystal Ball: Will the Equilibrium Hold? 09 January 2016 13  If security defenders just keep doing the same things, attackers will overtake us  Penetration testing and code inspection isn’t going to take us much further  Fundamentals need to be, and can be, improved  better product development process  better platforms  better tools  better developers