This real-world example is very relevant to our digital world today. Let’s imagine your information and data are the crown jewels in the vault and the service provider is the bank. In the digital world, we need to start assuming the robbers are inside and behind the teller window. They’re making their way towards the vault or are perhaps already in there. Making this assumption is the only way to keep one’s data safe in this increasingly hostile online world.
The recent celebrity hacking scandal drives this point home. Without all of the facts, it’s hard to tell what happened at this point. Initial ideas are that Apple’s iCloud service had an API weakness which allowed hackers to brute-force the passwords of many celebrities and make off with their most intimate photos. (Edit: Apple is now denying this) If this is the case, the real-world analogy would be that Apple forgot to put a camera and/or alarm on the back door. However, if multi-factor authentication had been enabled, or the photos themselves had been encrypted in another container, then the photos would not have been able to be seen or used.
Unfortunately, non-technical people are finding out what InfoSec professionals have been screaming about since the Internet was text-only: it is very insecure out there. And the majority of people using the Internet today can be easily convinced to trade convenience for their security and privacy. Single-factor authentication, chip-less credit cards that are easily compromised, easy-to-guess password reset mechanisms: these are just a few examples of low-security items we use every day. So who’s to blame? Well, if we play that game, then the answer is: everyone involved. Users should have better awareness of what they’re getting themselves into and hold some of the liability for keeping their accounts secure. Providers should offer the highest-level of security by default, not as an Opt-In mechanism. Software makers should be held liable for holes in their software. If all of these things happen, there will still be breaches, but by closing the easiest and most obvious holes, the hackers must then be more persistent and better equipped. It also increases the time it will take for a successful attack, which means they can be detected earlier in the kill-chain and prevented from causing damage.