SlideShare a Scribd company logo
Why IT Security is fucked up ...
... and what we can do about it
Stefan Schumacher
www.sicherheitsforschung-magdeburg.de
Positive Hack Days 2015
Moscow, Russia
2015-05-26
$ Id: ItSec-Input.tex,v 1.4 2014/11/20 16:22:14 stefan Exp $
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 1 / 29
ToC
1 Intro
2 Social Science
3 Psychology
4 What to do?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 2 / 29
ToC
1 Intro
2 Social Science
3 Psychology
4 What to do?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 3 / 29
About me
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 4 / 29
About me
Head of the Magdeburg Institute for Security Research
Editor of the Magdeburg Journal of Security Research
Freelance Security Consultant
Hacker for 20 years, ex-NetBSD developer
Educational Science and Psychology
Research on Social Engineering, Security Awareness,
Organizational Security
psychological profiling for social engineering
my PoV is more a psychological PoV
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 5 / 29
Psychology of Security
Fundamental Research about the Perception of Security
Fundamental Research about Personality/Attitudes and Security
Organizational Development and Security
Cultural Differences
Didactics (Teaching Methodology) of Security
What to teach?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 6 / 29
ToC
1 Intro
2 Social Science
3 Psychology
4 What to do?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 7 / 29
Security in a Post NSA age?
Talk at AusCERT (Australia) 2014
Can there be »security« in a Post NSA age?
Are the 5 eyes an almighty adversary?
Panopticon Panspectron
If so, why and how?
If not, shouldn’t we just surrender?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 8 / 29
Security in a Post NSA age?
Of course there can and will be security post NSA.
Let’s discuss some problems and ideas.
And have a holistic view (read: not just technical)
use sociological system theory and 2nd order cybernetics
use psychology to discuss human behaviour and experience
reflect on the foundation of science
and how useful are the methods we use?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 9 / 29
Definition (Outrage as a Svc @OaaSvc)
Science is awesome. You aren’t doing science in infosec. Why not?
Seems to be the overriding message of @0xKaishakunin
#AusCERT2014
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 10 / 29
Stand Back!
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 11 / 29
Consequences for us?
What do the Snowden Leaks mean for us as security researchers?
Let’s assume there is an adversary with almost unlimited
resources.
How do we have to change how security works?
What research has to be done?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 12 / 29
2nd Order Cybernetics
break the circlejerk
Cybernetics: transdisciplinary approach for exploring regulatory
systems, their structures, constraints, and possibilities.
Anything said, is said by an observer (Maturana/Varela)
add the observer to the regulatory system: 2nd order cybernetics
An observer acting in his field: 1st order cybernetics
An observer discussing how he constructs his perception of the
field he works in: 2nd order cybernetics (What the hell are we
doing here?)
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 13 / 29
Trust
Trust is one of the buzzwords here
needs to be defined or explicated
and operationalized (make it measurable)
Niklas Luhmann explicated Trust in his 1968 Book Vertrauen
as a »mechanism to reduce social complexity«
social complexity is reduced with functional specialised
subsystems
Lawyers a experts for Laws, Hackers for IT-Sec, Physicians for
Medicine etc. pp.
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 14 / 29
Consequences
IT Security needs to professionalize beyond technical problems
discussing the 31337th Buffer Overflow of the week won’t fix
fundamental problems
human factors have to be analysed
extend IT Security to Information Security
create a new scientific field of Information Security
include Psychology, Sociology, Educational Science, Didactics and
others
operationalize Information Security to make it measurable
create a new vocational field of Information Security
backed by science
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 15 / 29
ToC
1 Intro
2 Social Science
3 Psychology
4 What to do?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 16 / 29
Why Psychology?
empirical and theoretical science
describes, explains and predicts human behaviour and
experiences
human development and the internal and external causes and
conditions
Differential and Personality P., Social P., Industrial P.,
Organisational P., Pedagogical P.
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 17 / 29
What is security?
Germany, Informatics
VIVA-Kriterien
confidentiality
integrity
availability
authenticity
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 18 / 29
Paradigm Shift
see Thomas S. Kuhn The Structure of Scientific Revolution
Paradigm: a distinct concept or thought patterns and basic
assumptions
Paradigm Shift: change of these assumption
let’s change it
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 19 / 29
Psychology and IT-Security?
My Operationalisation of InfoSec
Security is a latent social construct.
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 20 / 29
Security and Psychology
Security is concluded by making Decisions
Individuals make decisions based on their Biography, the
Situation and how they perceive their Environment
see: von Foerster, Luhmann, Spencer Brown, Baecker et.al.
Psychology is the Science which researches these Topics.
Therefore, Psychology is required to research Security.
Psychology is the only Science able to research the basic
fundamentals of Security.
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 21 / 29
Washing your Hands
two maternity clinics in Vienna, the 1st with MDs the second with
midwifes only
more pregnant Women died in the 1st one
pregnant women would rather give birth in the streets than be
sent to the 1st clinic
Ignaz Semmelweis discovered that Physicians transmit
pathogenic agents (cadaverous poisoning)
He proposed that Physicians should wash their Hands
the death rate dropped 90%
His Idea was rejected and he was considered to be crazy
psychiatrised by force in Vienna
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
Washing your Hands
two maternity clinics in Vienna, the 1st with MDs the second with
midwifes only
more pregnant Women died in the 1st one
pregnant women would rather give birth in the streets than be
sent to the 1st clinic
Ignaz Semmelweis discovered that Physicians transmit
pathogenic agents (cadaverous poisoning)
He proposed that Physicians should wash their Hands
the death rate dropped 90%
His Idea was rejected and he was considered to be crazy
psychiatrised by force in Vienna
This can only be explained by Psychology
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
Washing your Hands
two maternity clinics in Vienna, the 1st with MDs the second with
midwifes only
more pregnant Women died in the 1st one
pregnant women would rather give birth in the streets than be
sent to the 1st clinic
Ignaz Semmelweis discovered that Physicians transmit
pathogenic agents (cadaverous poisoning)
He proposed that Physicians should wash their Hands
the death rate dropped 90%
His Idea was rejected and he was considered to be crazy
psychiatrised by force in Vienna
This can only be explained by Psychology
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
1996: Ariane 5 Flight 501
320 000 000 Euro
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 23 / 29
ToC
1 Intro
2 Social Science
3 Psychology
4 What to do?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 24 / 29
Societal Problems
digital divide
economy and IT
checks and balances?
How do politicians decide about things they don’t understand?
(Max Weber again ...)
and scientists?
Why and How did Rijndael become AES? NSA? NIST? Illuminati?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 25 / 29
Societal Problems
digital divide
economy and IT
checks and balances?
How do politicians decide about things they don’t understand?
(Max Weber again ...)
and scientists?
Why and How did Rijndael become AES? NSA? NIST? Illuminati?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 25 / 29
Political Problems
Cyber-War? Cyber-Terror?
discussed by political scientists – who often don’t understand
technology
discussed by IT sec – who often don’t understand social
implications
discussed by the military – who often don’t understand anything
discussed by legal experts – who often don’t understand
technology and social implications
How to discuss Anonymous? Hacktivism? Neutral?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 26 / 29
Political Problems
Cyber-War? Cyber-Terror?
discussed by political scientists – who often don’t understand
technology
discussed by IT sec – who often don’t understand social
implications
discussed by the military – who often don’t understand anything
discussed by legal experts – who often don’t understand
technology and social implications
How to discuss Anonymous? Hacktivism? Neutral?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 26 / 29
Reflection
The information technology of society?
The hackers of society?
The intelligence services of society?
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 27 / 29
Conclusion
IT-Security needs it’s own research field: security research
with it’s own foundation, methods and tools
rooted in:
Maths as formal science
CS/EE as engineering science
Sociology, Political Science as social science
Jurisprudence as normative science
Philosophy as mother of all sciences
Psychology as hub science
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 28 / 29
Information Security
Pedagogy
Curriculum
Universities
Vociational Schools
Schools
Didactics
Whom to teach?
What to teach?
How to teach?
Training
JurisprudenceNorms
Philosophy Philosophy of Science
Political Science
Policies
Governance
Normative Processes
Sociology
Systems of Society
Organisational Sociology
Industrial Sociology
Psychology
Personality Traits and Security
Research Methods
Perceptions of Security
Human Factors
Maths Formal Science
Electrical Engineering
Computer Science
sicherheitsforschung-magdeburg.de
stefan.schumacher@sicherheitsforschung-magdeburg.de
sicherheitsforschung-magdeburg.de/publikationen/
journal.html
youtube.de/
Sicherheitsforschung
Twitter: 0xKaishakunin
Xing: Stefan Schumacher
GnuPG: 9475 1687 4218 026F 6ACF 89EE
8B63 6058 D015 B8EF
Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 29 / 29

More Related Content

PDF
Алгоритмы решения задачи о булевой выполнимости (SAT) и их применение в крипт...
PDF
SSDL: один день из жизни разработчика
PPTX
Как увидеть невидимые инциденты
PPT
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
PDF
Аспекты деятельности инсайдеров на предприятии
PDF
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
PPTX
Fingerprinting and Attacking a Healthcare Infrastructure
PPT
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПО
Алгоритмы решения задачи о булевой выполнимости (SAT) и их применение в крипт...
SSDL: один день из жизни разработчика
Как увидеть невидимые инциденты
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Аспекты деятельности инсайдеров на предприятии
Janitor to CISO in 360 Seconds: Exploiting Mechanical Privilege Escalation
Fingerprinting and Attacking a Healthcare Infrastructure
Восток — дело тонкое, или Уязвимости медицинского и индустриального ПО

Viewers also liked (20)

PPTX
Эксплуатируем неэксплуатируемые уязвимости SAP
PPTX
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
PDF
Magic Box, или Как пришлось сломать банкоматы, чтобы их спасти
PDF
Боремся с читингом в онлайн-играх
PPTX
Ковбой Энди, Рик Декард и другие охотники за наградой
PDF
DNS как линия защиты/DNS as a Defense Vector
PPTX
200 open source проектов спустя: опыт статического анализа исходного кода
PDF
Обратная разработка бинарных форматов с помощью Kaitai Struct
PDF
Вирусы есть? А если найду?
PPTX
Как «вправить» автомобилю «мозги»
PPTX
Защищенность GSM
PPTX
Современные DDoS-атаки: тенденции, опасность, подходы к защите
PDF
Использование KASan для автономного гипервизора
PDF
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
PPT
Псевдобезопасность NFC-сервисов
PPTX
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
PDF
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
PPTX
Application security? Firewall it!
PDF
Строим ханипот и выявляем DDoS-атаки
PPTX
Безопасность бумажная и техническая: им не жить друг без друга
Эксплуатируем неэксплуатируемые уязвимости SAP
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
Magic Box, или Как пришлось сломать банкоматы, чтобы их спасти
Боремся с читингом в онлайн-играх
Ковбой Энди, Рик Декард и другие охотники за наградой
DNS как линия защиты/DNS as a Defense Vector
200 open source проектов спустя: опыт статического анализа исходного кода
Обратная разработка бинарных форматов с помощью Kaitai Struct
Вирусы есть? А если найду?
Как «вправить» автомобилю «мозги»
Защищенность GSM
Современные DDoS-атаки: тенденции, опасность, подходы к защите
Использование KASan для автономного гипервизора
john-devkit: 100 типов хешей спустя / john-devkit: 100 Hash Types Later
Псевдобезопасность NFC-сервисов
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Если нашлась одна ошибка — есть и другие. Один способ выявить «наследуемые» у...
Application security? Firewall it!
Строим ханипот и выявляем DDoS-атаки
Безопасность бумажная и техническая: им не жить друг без друга
Ad

Similar to Why IT Security Is Fucked Up (20)

PDF
Regulating New Technologies in Uncertain Times Leonie Reins
PPTX
Hieupc-The role of psychology in enhancing cybersecurity
PDF
Walter Mitty Essay.pdf
PDF
Deviant Security The Technical Computer Security Practices Of Cyber Criminals...
PDF
Pervasive Advertising 1st Edition Jrg Mller Florian Alt Daniel Michelis Auth
PPTX
If you can't beat em, join em
PDF
Computer hacking – Is it Ethical PPT
PDF
PSI Handbook of Business Security Two Volumes Set 1st Edition W. Timothy Coombs
PDF
Pavlos_Isaris_final_report
PDF
Cybersecurity, Cryptography, and Privacy
PDF
99 best cyber security podcasts for beginners
PDF
Technosciencesociety Technological Reconfigurations Of Science And Society 1s...
PDF
Digital Transformation In Policing The Promise Perils And Solutions Reza Mont...
PDF
Privacyinvading Technologies And Privacy By Design Safeguarding Privacy Liber...
PDF
Security Metrics Management Gerald L. Kovacich
PPTX
Effective Cybersecurity Communication Skills
PDF
Responsible AI A Global Policy Framework 1st Edition Itechlaw Association
PDF
Dr. Roman V. Yampolskiy. Top Cyber News MAGAZINE. May 2024
PDF
Security Metrics Management Gerald L. Kovacich
PDF
Sanjiv-Crypto-BMP
Regulating New Technologies in Uncertain Times Leonie Reins
Hieupc-The role of psychology in enhancing cybersecurity
Walter Mitty Essay.pdf
Deviant Security The Technical Computer Security Practices Of Cyber Criminals...
Pervasive Advertising 1st Edition Jrg Mller Florian Alt Daniel Michelis Auth
If you can't beat em, join em
Computer hacking – Is it Ethical PPT
PSI Handbook of Business Security Two Volumes Set 1st Edition W. Timothy Coombs
Pavlos_Isaris_final_report
Cybersecurity, Cryptography, and Privacy
99 best cyber security podcasts for beginners
Technosciencesociety Technological Reconfigurations Of Science And Society 1s...
Digital Transformation In Policing The Promise Perils And Solutions Reza Mont...
Privacyinvading Technologies And Privacy By Design Safeguarding Privacy Liber...
Security Metrics Management Gerald L. Kovacich
Effective Cybersecurity Communication Skills
Responsible AI A Global Policy Framework 1st Edition Itechlaw Association
Dr. Roman V. Yampolskiy. Top Cyber News MAGAZINE. May 2024
Security Metrics Management Gerald L. Kovacich
Sanjiv-Crypto-BMP
Ad

More from Positive Hack Days (20)

PPTX
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
PPTX
Как мы собираем проекты в выделенном окружении в Windows Docker
PPTX
Типовая сборка и деплой продуктов в Positive Technologies
PPTX
Аналитика в проектах: TFS + Qlik
PPTX
Использование анализатора кода SonarQube
PPTX
Развитие сообщества Open DevOps Community
PPTX
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
PPTX
Автоматизация построения правил для Approof
PDF
Мастер-класс «Трущобы Application Security»
PDF
Формальные методы защиты приложений
PDF
Эвристические методы защиты приложений
PDF
Теоретические основы Application Security
PPTX
От экспериментального программирования к промышленному: путь длиной в 10 лет
PDF
Уязвимое Android-приложение: N проверенных способов наступить на грабли
PPTX
Требования по безопасности в архитектуре ПО
PDF
Формальная верификация кода на языке Си
PPTX
Механизмы предотвращения атак в ASP.NET Core
PDF
SOC для КИИ: израильский опыт
PDF
Honeywell Industrial Cyber Security Lab & Services Center
PDF
Credential stuffing и брутфорс-атаки
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Как мы собираем проекты в выделенном окружении в Windows Docker
Типовая сборка и деплой продуктов в Positive Technologies
Аналитика в проектах: TFS + Qlik
Использование анализатора кода SonarQube
Развитие сообщества Open DevOps Community
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Автоматизация построения правил для Approof
Мастер-класс «Трущобы Application Security»
Формальные методы защиты приложений
Эвристические методы защиты приложений
Теоретические основы Application Security
От экспериментального программирования к промышленному: путь длиной в 10 лет
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Требования по безопасности в архитектуре ПО
Формальная верификация кода на языке Си
Механизмы предотвращения атак в ASP.NET Core
SOC для КИИ: израильский опыт
Honeywell Industrial Cyber Security Lab & Services Center
Credential stuffing и брутфорс-атаки

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Modernizing your data center with Dell and AMD
PPTX
Big Data Technologies - Introduction.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Modernizing your data center with Dell and AMD
Big Data Technologies - Introduction.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Understanding_Digital_Forensics_Presentation.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Review of recent advances in non-invasive hemoglobin estimation
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Why IT Security Is Fucked Up

  • 1. Why IT Security is fucked up ... ... and what we can do about it Stefan Schumacher www.sicherheitsforschung-magdeburg.de Positive Hack Days 2015 Moscow, Russia 2015-05-26 $ Id: ItSec-Input.tex,v 1.4 2014/11/20 16:22:14 stefan Exp $ Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 1 / 29
  • 2. ToC 1 Intro 2 Social Science 3 Psychology 4 What to do? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 2 / 29
  • 3. ToC 1 Intro 2 Social Science 3 Psychology 4 What to do? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 3 / 29
  • 4. About me Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 4 / 29
  • 5. About me Head of the Magdeburg Institute for Security Research Editor of the Magdeburg Journal of Security Research Freelance Security Consultant Hacker for 20 years, ex-NetBSD developer Educational Science and Psychology Research on Social Engineering, Security Awareness, Organizational Security psychological profiling for social engineering my PoV is more a psychological PoV Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 5 / 29
  • 6. Psychology of Security Fundamental Research about the Perception of Security Fundamental Research about Personality/Attitudes and Security Organizational Development and Security Cultural Differences Didactics (Teaching Methodology) of Security What to teach? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 6 / 29
  • 7. ToC 1 Intro 2 Social Science 3 Psychology 4 What to do? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 7 / 29
  • 8. Security in a Post NSA age? Talk at AusCERT (Australia) 2014 Can there be »security« in a Post NSA age? Are the 5 eyes an almighty adversary? Panopticon Panspectron If so, why and how? If not, shouldn’t we just surrender? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 8 / 29
  • 9. Security in a Post NSA age? Of course there can and will be security post NSA. Let’s discuss some problems and ideas. And have a holistic view (read: not just technical) use sociological system theory and 2nd order cybernetics use psychology to discuss human behaviour and experience reflect on the foundation of science and how useful are the methods we use? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 9 / 29
  • 10. Definition (Outrage as a Svc @OaaSvc) Science is awesome. You aren’t doing science in infosec. Why not? Seems to be the overriding message of @0xKaishakunin #AusCERT2014 Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 10 / 29
  • 11. Stand Back! Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 11 / 29
  • 12. Consequences for us? What do the Snowden Leaks mean for us as security researchers? Let’s assume there is an adversary with almost unlimited resources. How do we have to change how security works? What research has to be done? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 12 / 29
  • 13. 2nd Order Cybernetics break the circlejerk Cybernetics: transdisciplinary approach for exploring regulatory systems, their structures, constraints, and possibilities. Anything said, is said by an observer (Maturana/Varela) add the observer to the regulatory system: 2nd order cybernetics An observer acting in his field: 1st order cybernetics An observer discussing how he constructs his perception of the field he works in: 2nd order cybernetics (What the hell are we doing here?) Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 13 / 29
  • 14. Trust Trust is one of the buzzwords here needs to be defined or explicated and operationalized (make it measurable) Niklas Luhmann explicated Trust in his 1968 Book Vertrauen as a »mechanism to reduce social complexity« social complexity is reduced with functional specialised subsystems Lawyers a experts for Laws, Hackers for IT-Sec, Physicians for Medicine etc. pp. Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 14 / 29
  • 15. Consequences IT Security needs to professionalize beyond technical problems discussing the 31337th Buffer Overflow of the week won’t fix fundamental problems human factors have to be analysed extend IT Security to Information Security create a new scientific field of Information Security include Psychology, Sociology, Educational Science, Didactics and others operationalize Information Security to make it measurable create a new vocational field of Information Security backed by science Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 15 / 29
  • 16. ToC 1 Intro 2 Social Science 3 Psychology 4 What to do? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 16 / 29
  • 17. Why Psychology? empirical and theoretical science describes, explains and predicts human behaviour and experiences human development and the internal and external causes and conditions Differential and Personality P., Social P., Industrial P., Organisational P., Pedagogical P. Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 17 / 29
  • 18. What is security? Germany, Informatics VIVA-Kriterien confidentiality integrity availability authenticity Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 18 / 29
  • 19. Paradigm Shift see Thomas S. Kuhn The Structure of Scientific Revolution Paradigm: a distinct concept or thought patterns and basic assumptions Paradigm Shift: change of these assumption let’s change it Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 19 / 29
  • 20. Psychology and IT-Security? My Operationalisation of InfoSec Security is a latent social construct. Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 20 / 29
  • 21. Security and Psychology Security is concluded by making Decisions Individuals make decisions based on their Biography, the Situation and how they perceive their Environment see: von Foerster, Luhmann, Spencer Brown, Baecker et.al. Psychology is the Science which researches these Topics. Therefore, Psychology is required to research Security. Psychology is the only Science able to research the basic fundamentals of Security. Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 21 / 29
  • 22. Washing your Hands two maternity clinics in Vienna, the 1st with MDs the second with midwifes only more pregnant Women died in the 1st one pregnant women would rather give birth in the streets than be sent to the 1st clinic Ignaz Semmelweis discovered that Physicians transmit pathogenic agents (cadaverous poisoning) He proposed that Physicians should wash their Hands the death rate dropped 90% His Idea was rejected and he was considered to be crazy psychiatrised by force in Vienna Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
  • 23. Washing your Hands two maternity clinics in Vienna, the 1st with MDs the second with midwifes only more pregnant Women died in the 1st one pregnant women would rather give birth in the streets than be sent to the 1st clinic Ignaz Semmelweis discovered that Physicians transmit pathogenic agents (cadaverous poisoning) He proposed that Physicians should wash their Hands the death rate dropped 90% His Idea was rejected and he was considered to be crazy psychiatrised by force in Vienna This can only be explained by Psychology Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
  • 24. Washing your Hands two maternity clinics in Vienna, the 1st with MDs the second with midwifes only more pregnant Women died in the 1st one pregnant women would rather give birth in the streets than be sent to the 1st clinic Ignaz Semmelweis discovered that Physicians transmit pathogenic agents (cadaverous poisoning) He proposed that Physicians should wash their Hands the death rate dropped 90% His Idea was rejected and he was considered to be crazy psychiatrised by force in Vienna This can only be explained by Psychology Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 22 / 29
  • 25. 1996: Ariane 5 Flight 501 320 000 000 Euro Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 23 / 29
  • 26. ToC 1 Intro 2 Social Science 3 Psychology 4 What to do? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 24 / 29
  • 27. Societal Problems digital divide economy and IT checks and balances? How do politicians decide about things they don’t understand? (Max Weber again ...) and scientists? Why and How did Rijndael become AES? NSA? NIST? Illuminati? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 25 / 29
  • 28. Societal Problems digital divide economy and IT checks and balances? How do politicians decide about things they don’t understand? (Max Weber again ...) and scientists? Why and How did Rijndael become AES? NSA? NIST? Illuminati? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 25 / 29
  • 29. Political Problems Cyber-War? Cyber-Terror? discussed by political scientists – who often don’t understand technology discussed by IT sec – who often don’t understand social implications discussed by the military – who often don’t understand anything discussed by legal experts – who often don’t understand technology and social implications How to discuss Anonymous? Hacktivism? Neutral? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 26 / 29
  • 30. Political Problems Cyber-War? Cyber-Terror? discussed by political scientists – who often don’t understand technology discussed by IT sec – who often don’t understand social implications discussed by the military – who often don’t understand anything discussed by legal experts – who often don’t understand technology and social implications How to discuss Anonymous? Hacktivism? Neutral? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 26 / 29
  • 31. Reflection The information technology of society? The hackers of society? The intelligence services of society? Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 27 / 29
  • 32. Conclusion IT-Security needs it’s own research field: security research with it’s own foundation, methods and tools rooted in: Maths as formal science CS/EE as engineering science Sociology, Political Science as social science Jurisprudence as normative science Philosophy as mother of all sciences Psychology as hub science Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 28 / 29
  • 33. Information Security Pedagogy Curriculum Universities Vociational Schools Schools Didactics Whom to teach? What to teach? How to teach? Training JurisprudenceNorms Philosophy Philosophy of Science Political Science Policies Governance Normative Processes Sociology Systems of Society Organisational Sociology Industrial Sociology Psychology Personality Traits and Security Research Methods Perceptions of Security Human Factors Maths Formal Science Electrical Engineering Computer Science
  • 34. sicherheitsforschung-magdeburg.de stefan.schumacher@sicherheitsforschung-magdeburg.de sicherheitsforschung-magdeburg.de/publikationen/ journal.html youtube.de/ Sicherheitsforschung Twitter: 0xKaishakunin Xing: Stefan Schumacher GnuPG: 9475 1687 4218 026F 6ACF 89EE 8B63 6058 D015 B8EF Stefan Schumacher Why IT Security is fucked up ... Positive Hack Days 2015 29 / 29