July 11, 2016 By Rick M Robinson 2 min read

The summer travel season is upon us. In an age of terrorism and other threats, this means that everyone is talking about airport security lines and the Transportation Security Administration (TSA).

Yes, everyone hates standing in line at airports and taking off their shoes. But as you wait, cybersecurity professionals can take some consolation from their user’s-eye perspective on a familiar conundrum: Seeking to combine maximum security with minimum inconvenience. Risk-based security is one solution to this challenge, but it comes with challenges of its own.

A Matter of Inconvenience

Before looking specifically at risked-based security, everyone needs to acknowledge a fact: Good security is inherently inconvenient. The whole point of security is to throw obstacles, complications, difficulties — in short, inconveniences — into the path of the malicious actors who pose security threats.

Take one familiar object of hate: the password. Strong passwords are a pain because they are tricky to remember. They are difficult to remember because, to be strong, they need to be hard to guess. Some user pain is all but unavoidable.

One basic way to improve security and reduce user pain and inconvenience is to concentrate efforts on the actors we are trying to stop. This is what risk-based security is all about: The more we can zero in on the potential threats, the more we can avoid hassling everyone else.

Waiting in Line to Bypass the Line

Honing in on cybercriminals requires identifying and assessing risks, which is not always an easy process. How do you identify a potential terrorist in an airport line or a potential attacker online?

The very idea of quantifying risk factors can be dicey because, as security specialist Rick Doten told Teri Robinson of SC Magazine, “Security is an emotion and risk is a calculation.” Assessing and prioritizing risks is always going to be a fraught and demanding task, albeit a necessary one.

Risk calculation can go in two directions. The more familiar seeks to identify users who are potentially high-risk and target them for protective action. The TSA’s famous — or infamous — No-Fly List is a measure of this type. But an equally important component of risk-based security works in the opposite direction: Identify low-risk, trusted users and allow them to speed through security checkpoints.

The TSA’s version of a trusted user program is its PreCheck. But as The New York Times reported, this has its own complications. Prospective trusted users need to be identified and vetted to ensure that they do in fact deserve to be trusted. This has created a bottleneck. Requests for PreCheck status have been much greater than expected, leading to long lines for PreCheck applications and approval.

Risk-Based Security Requires Work

Enterprises can do this screening organizationally, meaning that the trusted users can be selected and screened by others and might not even be told they have reached the trusted status. Someone still needs to do the work, but the individual user doesn’t need to know about it.

The bottom line is that someone needs to do the work. Real security has costs, including unavoidable user inconvenience. Budget constraints can add further inconveniences such as delays in granting users a “trusted” status. User complaints are inevitable.

Cybersecurity professionals putting their shoes back on at the airport should use the experience as a lesson in perspective. In a world of risks, security is indeed worth some inconvenience.

More from Risk Management

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

How cyberattacks on grocery stores could threaten food security

4 min read - Grocery store shoppers at many chains recently ran into an unwelcome surprise: empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford, Food Lion and Stop and Shop. Specific details of the nature of the attack have not yet been publicly released.Because the attack affected many digital systems, some stores were not able to accept credit/debit cards, while others had to shut…

Taking the fight to the enemy: Cyber persistence strategy gains momentum

4 min read - The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting down threats before they materialize — has become the new frontier. This shift, spearheaded by the United States and rapidly adopted by its allies, highlights the realization that defense alone is no longer enough to secure cyberspace.The momentum behind this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today