{"id":2682,"date":"2022-10-28T07:32:38","date_gmt":"2022-10-28T06:32:38","guid":{"rendered":"https:\/\/toshareproject.it\/artmakerblog\/?p=2682"},"modified":"2022-10-28T07:32:38","modified_gmt":"2022-10-28T06:32:38","slug":"national-and-global-computer-security-issues-described-by-an-actual-expert","status":"publish","type":"post","link":"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/","title":{"rendered":"National and global computer security issues described by an actual expert"},"content":{"rendered":"<p>*Digital artists need to know more about these issues. \u00a0They&#8217;re a major part of the cultural landscape, especially in times of war.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/so-long-thanks-for-all-the-bits\">https:\/\/www.ncsc.gov.uk\/blog-post\/so-long-thanks-for-all-the-bits<\/a><\/p>\n<p>(&#8230;)<\/p>\n<div id=\"section_1\" class=\"pcf-article-content-item\">\n<div>\n<div class=\"pcf-BodyText\">\n<p>In cyber security, we come up with exquisite solutions to incredibly hard problems, manage risks that would make most people\u2019s toes curl and get computers to do things nobody thought was possible (or in some cases desirable). But we also continue to place ridiculous demands on users (deep breath: must not mention clicking links in emails or password policies), implicitly expect arbitrarily complex implementations of technology to be perfect and vulnerability-free in the long term, and then berate those who build the stuff we use when they fail to properly defend themselves from everything a hostile state can throw at them.<\/p>\n<p>I\u2019ve always found this cognitive dissonance interesting, but I haven\u2019t found a way to reliably and easily work out when we\u2019re asking for daft things. The nearest I\u2019ve got is to try to determine where the security burden lies and whether it\u2019s reasonable to ask that party to shoulder it.<\/p>\n<p>Is it reasonable to ask a ten-person software company to defend themselves from the Russians?<br \/>\nNope.<\/p>\n<p>Is it reasonable to ask a critical infrastructure company to not have their management systems connected to the internet with a password of \u2018Super5ecre7P@ssw0rd!\u2019?<br \/>\nBloody right it is!<\/p>\n<p>The trick for making cyber security scalable in the long term is to get the various security burdens in the right place and incentivise the entities that need to manage those burdens properly. Sometimes the obvious person to manage a burden won\u2019t be the optimal one, so we may want to shift things around so they scale better. And let\u2019s be honest, we do suffer a lot from groupthink in cyber security. So, here\u2019s my plea. The cyber security community should:<\/p>\n<ul>\n<li><a title=\"You Shape security\" href=\"https:\/\/www.ncsc.gov.uk\/collection\/you-shape-security\" target=\"_self\" rel=\"noopener\">talk to people<\/a> who aren\u2019t like us and actually listen to them<\/li>\n<li>stop blaming people who don\u2019t have our l33t skillz when something goes wrong<\/li>\n<li>build stuff that works for most people, most of the time (rather than the easy or shiny thing)<\/li>\n<li>put ourselves in the shoes of our users and ask if we\u2019re really being sensible in our expectations<\/li>\n<\/ul>\n<p>We haven\u2019t got that right yet&#8230;.<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>*Digital artists need to know more about these issues. \u00a0They&#8217;re a major part of the cultural landscape, especially in times of war. &nbsp; https:\/\/www.ncsc.gov.uk\/blog-post\/so-long-thanks-for-all-the-bits (&#8230;) In cyber security, we come up with exquisite solutions to incredibly hard problems, manage risks that would make most people\u2019s toes curl and get computers to do things nobody thought [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2682","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>National and global computer security issues described by an actual expert | Artmaker Blog<\/title>\n<meta name=\"description\" content=\"National and global computer security issues described by an actual expert | Artmaker Blog\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"National and global computer security issues described by an actual expert | Artmaker Blog\" \/>\n<meta property=\"og:description\" content=\"National and global computer security issues described by an actual expert | Artmaker Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/\" \/>\n<meta property=\"og:site_name\" content=\"Artmaker Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-28T06:32:38+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruce Sterling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/toshareproject.it\/artmakerblog\/#website\",\"url\":\"https:\/\/toshareproject.it\/artmakerblog\/\",\"name\":\"Artmaker Blog\",\"description\":\"on Toshareproject.it - curated by Bruce Sterling\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/toshareproject.it\/artmakerblog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/#webpage\",\"url\":\"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/\",\"name\":\"National and global computer security issues described by an actual expert | Artmaker Blog\",\"isPartOf\":{\"@id\":\"https:\/\/toshareproject.it\/artmakerblog\/#website\"},\"datePublished\":\"2022-10-28T06:32:38+00:00\",\"dateModified\":\"2022-10-28T06:32:38+00:00\",\"author\":{\"@id\":\"https:\/\/toshareproject.it\/artmakerblog\/#\/schema\/person\/6f20726ed2761431f3e0ff4e096c3085\"},\"description\":\"National and global computer security issues described by an actual expert | Artmaker Blog\",\"breadcrumb\":{\"@id\":\"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/toshareproject.it\/artmakerblog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"National and global computer security issues described by an actual expert\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/toshareproject.it\/artmakerblog\/#\/schema\/person\/6f20726ed2761431f3e0ff4e096c3085\",\"name\":\"Bruce Sterling\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/toshareproject.it\/artmakerblog\/#personlogo\",\"inLanguage\":\"en-GB\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c390e8ed4db57a34278dcf667f928a643cf769a865c8a8632dcd310412bb9a99?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c390e8ed4db57a34278dcf667f928a643cf769a865c8a8632dcd310412bb9a99?s=96&d=mm&r=g\",\"caption\":\"Bruce Sterling\"},\"description\":\"Art director at Share Festival, author and journalist\",\"sameAs\":[\"http:\/\/toshareproject.it\/tomorrowart\"],\"url\":\"https:\/\/toshareproject.it\/artmakerblog\/author\/brucesterling\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"National and global computer security issues described by an actual expert | Artmaker Blog","description":"National and global computer security issues described by an actual expert | Artmaker Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/","og_locale":"en_GB","og_type":"article","og_title":"National and global computer security issues described by an actual expert | Artmaker Blog","og_description":"National and global computer security issues described by an actual expert | Artmaker Blog","og_url":"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/","og_site_name":"Artmaker Blog","article_published_time":"2022-10-28T06:32:38+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruce Sterling","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/toshareproject.it\/artmakerblog\/#website","url":"https:\/\/toshareproject.it\/artmakerblog\/","name":"Artmaker Blog","description":"on Toshareproject.it - curated by Bruce Sterling","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/toshareproject.it\/artmakerblog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/#webpage","url":"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/","name":"National and global computer security issues described by an actual expert | Artmaker Blog","isPartOf":{"@id":"https:\/\/toshareproject.it\/artmakerblog\/#website"},"datePublished":"2022-10-28T06:32:38+00:00","dateModified":"2022-10-28T06:32:38+00:00","author":{"@id":"https:\/\/toshareproject.it\/artmakerblog\/#\/schema\/person\/6f20726ed2761431f3e0ff4e096c3085"},"description":"National and global computer security issues described by an actual expert | Artmaker Blog","breadcrumb":{"@id":"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/toshareproject.it\/artmakerblog\/national-and-global-computer-security-issues-described-by-an-actual-expert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/toshareproject.it\/artmakerblog\/"},{"@type":"ListItem","position":2,"name":"National and global computer security issues described by an actual expert"}]},{"@type":"Person","@id":"https:\/\/toshareproject.it\/artmakerblog\/#\/schema\/person\/6f20726ed2761431f3e0ff4e096c3085","name":"Bruce Sterling","image":{"@type":"ImageObject","@id":"https:\/\/toshareproject.it\/artmakerblog\/#personlogo","inLanguage":"en-GB","url":"https:\/\/secure.gravatar.com\/avatar\/c390e8ed4db57a34278dcf667f928a643cf769a865c8a8632dcd310412bb9a99?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c390e8ed4db57a34278dcf667f928a643cf769a865c8a8632dcd310412bb9a99?s=96&d=mm&r=g","caption":"Bruce Sterling"},"description":"Art director at Share Festival, author and journalist","sameAs":["http:\/\/toshareproject.it\/tomorrowart"],"url":"https:\/\/toshareproject.it\/artmakerblog\/author\/brucesterling\/"}]}},"_links":{"self":[{"href":"https:\/\/toshareproject.it\/artmakerblog\/wp-json\/wp\/v2\/posts\/2682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/toshareproject.it\/artmakerblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/toshareproject.it\/artmakerblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/toshareproject.it\/artmakerblog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/toshareproject.it\/artmakerblog\/wp-json\/wp\/v2\/comments?post=2682"}],"version-history":[{"count":1,"href":"https:\/\/toshareproject.it\/artmakerblog\/wp-json\/wp\/v2\/posts\/2682\/revisions"}],"predecessor-version":[{"id":2683,"href":"https:\/\/toshareproject.it\/artmakerblog\/wp-json\/wp\/v2\/posts\/2682\/revisions\/2683"}],"wp:attachment":[{"href":"https:\/\/toshareproject.it\/artmakerblog\/wp-json\/wp\/v2\/media?parent=2682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/toshareproject.it\/artmakerblog\/wp-json\/wp\/v2\/categories?post=2682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/toshareproject.it\/artmakerblog\/wp-json\/wp\/v2\/tags?post=2682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}