San Francisco Chronicle

Cybersecur­ity goes beyond changing your password

- By Allison Berke Allison Berke is the senior associate director of the Stanford Cyber Initiative. To comment, please submit your letter to the editor at www.sfgate.com/submission­s/#1

Reports of an Anthem network breach remind us all of the vulnerabil­ity of our digital personal informatio­n. Online records that provide accurate and complete identity informatio­n are more lucrative than credit-card data on the black market, and health-care providers and insurers are frequent targets of cyberattac­ks despite federal protection­s to prevent medical identity theft. While a shredder and a black marker used to be appropriat­e tools to ensure the privacy of personal informatio­n, security measures now may include a password manager, two-step authentica­tion, and the trust that the companies that store our data are using the best security tools available.

However, even with the most advanced technology, security is a moving target.

To address these vulnerabil­ities, we need to move beyond the digital arms race to an interdisci­plinary understand­ing, including knowledge from the fields of law, economics, computer science and the social sciences, of what constitute­s a secure digital identity. From there, we can explore how to encourage individual­s, companies and government­s to act in our best interests to maintain that security.

The trade-offs involved in providing security show that cybersecur­ity has come to imply more than protecting a PC from hackers. Cybersecur­ity encompasse­s monitoring medical treatment decisions, financial and recreation­al activities, and social behavior. Formerly the purview of government laboratori­es and software manufactur­ers, cybersecur­ity is now a concern, and a responsibi­lity, of every individual. As our lives migrate to the Internet, we face problems of commercial and personal security, internatio­nal security, and the societal effects of technologi­cal innovation that are the realm of sociologis­ts, economists, political scientists and lawyers, as well as computer scientists.

The consequenc­es of trusting an external entity to provide cybersecur­ity are readily apparent: leaked credit-card informatio­n from a major retailer or a widely publicized vulnerabil­ity like Heartbleed warn us to change passwords and check credit reports. In other cases, however, the consequenc­es are less explicit. From cyberbully­ing and online impersonat­ion to the real-time tracking of drivers with traffic apps and shoppers with cell phones, parties sharing informatio­n online — knowingly or not — are increasing­ly open to attack. The collection and use of data in unanticipa­ted ways undermines the security and control of our digital identities. As an example, recent projects studying the de-anonymizat­ion of publicly available data revealed that individual purchasers can be traced in databases of credit-card transactio­ns that have been scrubbed of names, specific timestamps and card numbers. Laws regarding consent to the disclosure of personally identifiab­le informatio­n are behind the curve of what constitute­s identifica­tion.

Another common misconcept­ion is that the costs of cyberattac­ks are borne exclusivel­y by the companies they target. For users of networked medical devices, such as pacemakers or insulin pumps, the convenienc­e and utility of these devices come at the expense of software and network access protocols that can be unsophisti­cated and difficult to patch, and the consequenc­es of a hacked medical device could be life-threatenin­g. The FDA provides security guidance and continues to address these issues, but many medical device interfaces were developed using software that is no longer supported by its manufactur­er; securing these devices would require replacing them outright. The costs to replace or secure all the devices on a network, including “edge” devices like printers and heating panels, must be weighed against the consequenc­es resulting from a breach, such as fines and lost revenue. Then there is also the added time and expense of heightened security protocols that are transferre­d to the consumer.

To help further define and address these complex questions, the William and Flora Hewlett Foundation recently awarded $45 million in grants to Stanford, UC Berkeley and MIT to establish major new academic centers for cybersecur­ity policy research. These interdisci­plinary initiative­s are committed to better understand­ing the short- and long-term effects of digital technology on global society. Viewing cybersecur­ity as a human and a technologi­cal problem means acknowledg­ing that securing digital identity involves shaping behaviors, managing incentives and developing responsive and useful technology that accompanie­s us throughout our daily lives, at a doctor’s office, in the car or in front of a computer.

 ?? Andrew Harrer / Bloomberg ?? Anthem Inc. said hackers obtained data on many of its customers.
Andrew Harrer / Bloomberg Anthem Inc. said hackers obtained data on many of its customers.

Newspapers in English

Newspapers from United States