Defining Cybersecurity with Gene Spafford - Computerphile

Поділитися
Вставка
  • Опубліковано 14 лис 2023
  • Legendary cyber-security expert Professor Gene Spafford joins us to try to define what cyber-security even is! "Spaf" as he's known, is a faculty member at Purdue University and now Honorary Professor at the University of Nottingham.
    Dr Spafford is a Fellow of the American Academy of Arts and Sciences, the Association for the Advancement of Science, the ACM, the IEEE, and the (ISC)2; a Distinguished Fellow of the ISSA; and a member of the Cyber Security Hall of Fame, the only person to ever hold all these distinctions.
    The book "Cybersecurity, Myths and Misconceptions" can be found here: bit.ly/C_CyberMythsBook
    / computerphile
    / computer_phile
    This video was filmed and edited by Sean Riley.
    Computer Science at the University of Nottingham: bit.ly/nottscomputer
    Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharanblog.com
    Thank you to Jane Street for their support of this channel. Learn more: www.janestreet.com

КОМЕНТАРІ • 93

  • @teh_jibbler
    @teh_jibbler 6 місяців тому +45

    "We could teach someone else everything from the bare circuitry, up to the human-computer interface and how it all worked and how it all fit together. I would contend that there's no person alive who can do that anymore because the systems have gotten so complex."
    You said it man. We're boned.

    • @ivanskyttejrgensen7464
      @ivanskyttejrgensen7464 6 місяців тому +6

      I think that threshold was crossed around late 80s when I was taught the whole stack from electronics to firmware to OS to applications. Around that time the complexity of systems started to increase beyond what a single person could comprehend.

    • @KraylusGames
      @KraylusGames 6 місяців тому +12

      Interestingly, the same thing happened to medicine in the early 20th century. There is no doctor alive today who knows every aspect of medicine, instead we have generalists who have bredth but not depth and we have specialists with depth but not bredth.
      This is already happening in tech as well. There are fewer and fewer "full-stack" engineers. Instead we have specialists for specific parts of the stack or even specific pieces of hardware, frameworks, and libraries.

    • @goldnutter412
      @goldnutter412 6 місяців тому

      Yep. Except the boned bit. Web 3 is going to enable a completely new level of security. The world will run on blockchains, mostly private ones.
      It will take a few years yet before people are capable of seeing this, but it is obvious to those of us who saw web1 and the horrifying oversights in TCP/IP design, Windows security, and so on. The malware scene was a slowly then suddenly explosion, and then the obvious happened. Online crime gangs, a massive carding scene selling batches of stolen CC numbers.. and this was was on the OPEN internet in the early 2000s ! it has only been 1 paradigm (20 years) which is the minimum for realisation of large problems to become widespread and we start to adapt.
      The real problem is phishing, social engineering attacks because attackers leverage the human emotional response or complacency.. or they play the long game and gain trust over time. Digital provenance is the blockchain superpower, and a big key to AI issues, knowing where the data came from solves so much. But it's a long build process, almost 20 years now so.. whatever your opinion is you will see soon enough.

    • @londonbobby
      @londonbobby 6 місяців тому +1

      Are we though? We probably know less about medicine and the human body than we do about IT and yet we seem to muddle through.

    • @QuantumHistorian
      @QuantumHistorian 6 місяців тому +6

      The same thing is true of just about anything. Nobody knows how to go from drilling oil, to refining plastic, to filling it up with ink and selling it as a biro. Yet biros get made, and we write with them, and it all works out fine. It just means that we have to think in terms of collective systems rather than individuals - but that's what civilization has fundamentally been about for some 6000 years now.

  • @agoatmannameddesire8856
    @agoatmannameddesire8856 6 місяців тому +30

    General public: No one understands how AI systems work!
    People who work in cybersecurity: I got bad news for you about non-AI systems, too.

  • @marklonergan3898
    @marklonergan3898 6 місяців тому +18

    You mention that being completely secure is impossible so therefore it can't be the definition, but i feel having an impossible (ideological) target as your definition should be acceptable. Referring to the cyber security of a system isn't a yes or no question - it's a scale of how secure it is, so even though 100% is unobtainable, that doesn't prevent us from having a scale.

    • @tracyrreed
      @tracyrreed 6 місяців тому +6

      Spaff would totally agree with you there. He's just saying that we can and should aspire to do even better.

  • @CheddarKungPao
    @CheddarKungPao 6 місяців тому +15

    Brilliant talk by Prof. Spafford. Thank you to Sean, the esteemed Professor and anyone else who helped in making this happen.

  • @user-he8xk2vz5j
    @user-he8xk2vz5j 5 місяців тому +2

    Crazy logging into youtube and seeing one of my former Purdue professors here... Spaf is a genius, and is the one who started me on my interest in the topic of ethics around AI.

  • @ivanskyttejrgensen7464
    @ivanskyttejrgensen7464 6 місяців тому +19

    Regarding the definition or design of safe state and operations in a program: Over the years there have been a lot of research into formal specifications, mathematical-like proofs of program correctness etc., but it seems that when the program gets "big enough" the main problem becomes how to define the desired behavior because the requirements are more abstract and not easily defined formally.
    I still fine formal methods and program proofs very useful in smaller, low-level components, because if I can expect them to work as specified I can use my brain power to consider the higher-level complexities.

    • @MrBluelightzero
      @MrBluelightzero 6 місяців тому +1

      Maybe the solution is to stop making programs so big.

    • @QuantumHistorian
      @QuantumHistorian 6 місяців тому +7

      @@MrBluelightzero That seems like saying we should stop people dying in car crashes by limiting their top speed to 5km/h. Sure, it would work. But it's rather missing the point, and comes at an enormous cost.

  • @cDogRage
    @cDogRage 6 місяців тому +2

    Meteor collision event warning, IT staff: "We've been preparing for this all our lives."

  • @cidercreekranch
    @cidercreekranch 6 місяців тому +4

    Complexity as a whole will tend towards infinity. Complexity in information systems, as a whole, is analogous to entropy in thermodynamics. Deploying more information systems lead to greater complexity. The best that we can hope for is to reduce the rate of increase.

  • @goesbymoon
    @goesbymoon 6 місяців тому +2

    YOOOO!!! i recognize spaf, he gave an ethics lecture at Purdue for cs grad students that i attended like a year ago :> he seemed really nice and it's so cool to see him on this channel!

  • @OcteractSG
    @OcteractSG 6 місяців тому +4

    We live in an anti-security world. Browsers run executable JavaScript with asking permission, websites frequently rely on said JavaScript, every little object or service has an app, games and apps almost always expect network access, and so on. Security is hard to do technically and inconvenient to practice.

  • @rezdm
    @rezdm 6 місяців тому +5

    To my opinion what is not covered is what is _cyber_ risk, what constitutes as _cyber_? Imagine a situation: a criminal wants to steal, say, a diamond in a room behind some door with an electronic/computer combination lock. There are, for example the following options: a) just smash the door b) use social engineering to get access to mail of a person and use it to find the number combination c) hack the lock d) brute-force this lock. Which of these would be a breach of a "cyber security"?

    • @londonbobby
      @londonbobby 6 місяців тому

      Also, risk is seen as something to be avoided rather than managed, not a particularly useful approach.

  • @roamtim
    @roamtim 6 місяців тому +3

    Such a succinct explanation of the myriad of issues, thanks for sharing!

  • @billharshbarger7191
    @billharshbarger7191 6 місяців тому

    Spaf! I'm so happy to see him on your channel!

  • @ejmakela7525
    @ejmakela7525 6 місяців тому +1

    This is great! I'd love to see more videos like this that address the fundamentals of cybersecurity/InfoSec. Please bring Mr Spafford back for more! Also consider interviewing the authors of the textbooks he referenced.

  • @chaoslab
    @chaoslab 6 місяців тому +1

    Excellent video, thanks too you both. 🥰😃

  • @timrichards589
    @timrichards589 6 місяців тому

    This is such a great video. Thanks for sharing. This should be mandatory viewing for any executive involved in funding cybersecurity within their organization.

  • @morningsssss2857
    @morningsssss2857 20 днів тому

    more of Gene, please :)

  • @TimL_
    @TimL_ 6 місяців тому +2

    Interesting approach to the topic, thank you for the presentation and the book recommendations.

  • @cable567
    @cable567 6 місяців тому

    It should be noted that defining cybersecurity cannot be the same as defining fields of discovery such as math and science. Cyber Security is a human creation that is ever evolving.

  • @FlyingJolly
    @FlyingJolly 6 місяців тому +7

    That the number of programmers doubles every five years is significant concern. Junior programmers are prone to make security mistakes until they've encountered them personally. Building secure systems comes with experience. And keeping up-to-date on threats is a problem for those of us who have been in the field for decades.

    • @QuantumHistorian
      @QuantumHistorian 6 місяців тому +4

      If you need experience to do a competent job (rather than doing it more efficiently), then it feels like a failure in education/training more than anything else.

  • @adambyte256
    @adambyte256 6 місяців тому +2

    So how far back is first principles? Creating a new processor instruction set, and then inventing a chip that runs it?

    • @agoatmannameddesire8856
      @agoatmannameddesire8856 6 місяців тому +1

      Given all the recent speculative execution vulnerabilities...

    • @ProfessorSpaf
      @ProfessorSpaf 6 місяців тому

      That depends on what your definition of "secure" is going to be. The classic Ken Thompson paper, "Reflections on Trust" comes to mind....

  • @johnsenchak1428
    @johnsenchak1428 6 місяців тому +1

    MORE VIDEOS LIKE THIS !

  • @llundber
    @llundber 8 днів тому

    Great discussion.
    Though it’s hard to believe that large companies are still being hacked - often by simplest means such as SQL injection or access spoofing.
    Is this mainly a matter of sunk costs and not allocating sufficient resources to fixing even the most basic, well-known holes?

  • @PhilBoswell
    @PhilBoswell 6 місяців тому +2

    Just to check, is the y-axis at 12:00 labelled upside-down? Surely the *less* you spend, the more risk you take? 🤔

    • @3snoW_
      @3snoW_ 6 місяців тому +4

      I interpreted that as the risk that is covered by your security measures, so more money means more coverage.

    • @spaf
      @spaf 6 місяців тому +9

      Yes, I mislabeled the axis.. It should be "Reduction in risk"

  • @johnsenchak1428
    @johnsenchak1428 6 місяців тому +1

    GREAT VIDEO !

  • @Obscurai
    @Obscurai 6 місяців тому +1

    After years of accepting identified risks, corporations have a huge accumulated IT security debts that are never revisited until systems are replaced (and not even then). This is a measurable metric and yet does not result in better security.

  •  6 місяців тому +1

    One would hope that Spectre / Meltdown and its relatives would have woken up the industry. The fact that essentially the same security hole exists in completely different CPUs with completely different architectures from completely different manufacturers *must* be a wake-up call! This could only happen because there has been a complete failure across the entire industry to try and understand the ramifications the ever more complex interactions caused by piling ever more complex optimizations on top of ever more complex features. Security needs to be implemented from day 0 as an overarching goal.

  • @programming.jesus1234
    @programming.jesus1234 4 місяці тому +1

    simplicity and correctness. We are finished the exploratory time. We understand the problems well enough, now it is time to create the simplest, most pure and correct solution. I am working on this currently

  • @jfwfreo
    @jfwfreo 6 місяців тому

    Are any of the books by Bruce Schneier relevant to the field of cyber security?

  • @bluegizmo1983
    @bluegizmo1983 6 місяців тому

    One of the biggest misconceptions about cyber security is that you can go to school to learn how to do it, then once you graduate your done learning... Cyber security is a forever changing and rapid changing landscape. Pretty much everything you've learned in cyber security school will be useless in 5 to 10 years or less. You MUST forever be learning the new threat landscapes and attack vectors while your working in the industry, not just while your taking classes in school. Pretty much the only attack vector that is guaranteed not to change is social engineering.

  • @carlborgen
    @carlborgen 6 місяців тому +1

    Computational irreducibility says good luck specifying all states

  • @davidlindstrom4383
    @davidlindstrom4383 6 місяців тому +9

    The defnition of "security" is an issue in US politics, too, where many say, "border security," to describe preventing people from crossing without legal authorization, while others use the term to mean that people who cross the border are not in danger of being harmed while doing so.
    Similarly, some use, "election security," to describe an election system that prevents ineligible votes from being cast, while others seem to use it to describe a system that prevents those who are not authorized to tally votes from independently validating the election results.

  • @LupinoArts
    @LupinoArts 6 місяців тому +1

    I never understood the trope of documentaries to cut in the interviewer nodding... why do you do that?

  • @tomholroyd7519
    @tomholroyd7519 6 місяців тому +1

    This man helped to build the internet

  • @bertblankenstein3738
    @bertblankenstein3738 6 місяців тому +1

    Wrt secure systems, there are nuclear bimb proof data centres. I guess you have to put a limit and come up with some risk/cost analysis.

    • @ProfessorSpaf
      @ProfessorSpaf 6 місяців тому +1

      Exactly. Security is not an absolute. It is always relative to a set of threats and a budget for mitigations.

  • @generalzugs6017
    @generalzugs6017 6 місяців тому +1

    So, you're saying that my free version of AVG is not gona save me from covid od aliens with covid? Damn!

  • @landsgevaer
    @landsgevaer 6 місяців тому

    Where is the chained printer paper?

    • @Computerphile
      @Computerphile  6 місяців тому

      In England at the moment! (The prof did this remotely from Indiana!) -Sean

  • @FindecanorNotGmail
    @FindecanorNotGmail 6 місяців тому +13

    I absolutely hate that the word "cyber-" has become prominent as a prefix for this field.
    Back when I had my education in computer security, we did not use it. We used "cybernetics" to denote control systems, staying away from how it was misused in sci-fi novels.

    • @tracyrreed
      @tracyrreed 6 місяців тому

      I blame old men in government who thought "cyber" sounded cool back in the 80s. I didn't hear anyone talk about "the cyber" except for them until they forced it on the rest of industry.

    • @xtrakewlguy666
      @xtrakewlguy666 6 місяців тому +1

      You're telling me you haven't cyberjacked in to the infodome to leach out some data cyphers? Do you even remodulate the mainframe in the virtualsphere's technobrain??

  • @Iswimandrun
    @Iswimandrun 6 місяців тому +17

    So code scanning tools won't save us.

    • @Iswimandrun
      @Iswimandrun 6 місяців тому

      And fixing exploits as they get discovered won't save us as the fixes might make new exploits. So software architects that makes good specifications plus a good development strategy with test driven development is the answer?

    • @____r72
      @____r72 6 місяців тому +3

      not while there’s bipolar people roaming the earth looking for a juicy troll sesh

    • @chrism72727
      @chrism72727 6 місяців тому

      What are code scanning tools scanning for? They can't be scanning for the unknown.

  • @226011
    @226011 6 місяців тому

    Please do a video about sim-swap scam methods

  • @MrBluelightzero
    @MrBluelightzero 6 місяців тому +1

    Something, something, $5 wrench.

  • @Diggnuts
    @Diggnuts 6 місяців тому +1

    Cyber security maps to medicine if the more we knew about medicine, the less old and more sick we got. If anybody thinks this will ever get better, I have got some bridges to sell to you.

  • @goldnutter412
    @goldnutter412 6 місяців тому

    Great point about software people use all the time.
    If Microsoft software suddenly destroys all your data, too bad. LLC, maximum $5 liability..

  • @davt8355
    @davt8355 6 місяців тому +2

    I hope that one day computer science students realise that computer science won't give them a good job but Cybersecurity and IT does.

    • @londonbobby
      @londonbobby 6 місяців тому

      Wasn't that long ago when few people gave a flying duck about IT security, very career limiting. Now its all the rage and pretty lucrative if you're any good at it.

    • @QuantumHistorian
      @QuantumHistorian 6 місяців тому +1

      There's definitely a lot of confusion between computer science and software engineering, with many people thinking they're the same. They are not. The former is a branch of mathematics, the latter a technical, applied skill. The difference is the same as between a physicist and a structural engineer. Of course, the structural engineer needs to know some physics, but that doesn't mean that their knowledge, their skill set, or their jobs are the same.

  • @Primalmoon
    @Primalmoon 6 місяців тому +1

    I disagree with the professor's use of "sunk cost" over and over. Not wanting to move to a different system even if it is more secure is not necessarily a problem of a "sunk cost", it can be perfectly rational. As the professor noted earlier when talking about unclear definitions of security, security can be an economics issue.
    Imagine you're a company that already has a system built on an insecure platform that you're already making money from, and you're evaluating if you should switch to a different system for better security:
    Why move to a new, unproven system that is supposedly secure, but will require brand new and expensive development to adopt, when a company already has access to a "good enough" system with an established ecosystem and experienced developers for free? Even though it has issues that will need extra development to fix up / patch up, those are fixes / patches that can be applied to a system now, allowing the company to continue to have a revenue source from customers instead of going dark to spend years of development to switch to the new thing while their competitors steal all of its customers.

    • @ProfessorSpaf
      @ProfessorSpaf 6 місяців тому

      There are second and third order effects, too, if we knew how to measure them. You are correct that first order profit/loss might argue against switching. However, technological debt increases, and new investments to support buggy products may not be the best long-term use of funds. There are also potential social costs (loss of customer/employee personal information), repetitional costs (Company X is known to rely on faulty products), and perhaps legal costs (recent gov. regulations on disclosure and minimum safety). The point is, without a better understanding of risk and metrics, a proper investment plan is not likely to be developed.

  • @antoniogarest7516
    @antoniogarest7516 6 місяців тому +1

    🗿

  • @horsied
    @horsied 6 місяців тому

    yes

  • @aprilmeowmeow
    @aprilmeowmeow 6 місяців тому

    first

  • @EssexJames65
    @EssexJames65 6 місяців тому +2

    It's all about the data. It's confidentiality, integrity and availability of data that defines the field. The wires and tin deliver some of the controls. That's security 101 but didn't even get a mention.

    • @timisw
      @timisw 6 місяців тому

      Until it is operational technology and critical control systems. Then it is less about data and more about the availability of the cyber-physical environment.

    • @spaf
      @spaf 6 місяців тому +2

      Data security is a subset of cybersecurity. Those terms are also incomplete, vague. and not adequately measurable. This is discussed in depth in chapter 1 of the book.

  • @ApostateOfMind42
    @ApostateOfMind42 6 місяців тому

    Sixth

  • @humanaku9135
    @humanaku9135 6 місяців тому +1

    The greensreen is not doing this gentleman any favors

    • @tiavor
      @tiavor 6 місяців тому

      that's not even a greenscreen, that's just MS-Teams auto background removal.

    • @Computerphile
      @Computerphile  6 місяців тому +2

      Zoom in this case but yeah

  • @_masterbait
    @_masterbait 6 місяців тому +1

    hi mom

    • @skorp5677
      @skorp5677 6 місяців тому

      Darling, you should be in bed! 🙄😚

    • @Heinz-bx8sd
      @Heinz-bx8sd 6 місяців тому

      Hey hun'

  • @deadlock_problem
    @deadlock_problem 3 місяці тому

    Using psychology as a field that is rigorous and has standards without myths and misconceptions is very funny, probably the worst example of a field that does not have those.

    • @sathyajithps013
      @sathyajithps013 3 місяці тому

      Could you please elaborate, I'd like your view on it.

  • @HM-pb9kd
    @HM-pb9kd 6 місяців тому +2

    First

  • @UrSoMeanBoss
    @UrSoMeanBoss 2 місяці тому

    As a programmer, this has a lot of overlap with something that I can only describe as the "dependency and versioning" umbrella problem. It's feels absurd when realize how much of our modern world is held together by legacy of chewing gum and string. With the countless permutations present in our systems and environments, it's a miracle things work as well as they do. I wonder if the problems it causes will ever grow to out-weigh the sunk cost enough.

  • @user-sp7dj4rs3z
    @user-sp7dj4rs3z 6 місяців тому +1

    first

  • @ac.creations
    @ac.creations 6 місяців тому +1

    First