32 of the Best and Worst Infosec Analogies
Information security is a weird egg. You can be in it and understand it, yet have a hard time explaining it to the lay person or even your colleagues. For that reason, the infosec industry has glommed onto a never-ending chain of analogies and metaphors to better explain the intangibles of digital security.
We can’t seem to keep them all straight, nor do we know them all. So we reached out to security influencers and asked them what their favorite and least favorite infosec analogies or metaphors were and why they loved and hated them so much. I took a little editorial liberty and squeezed in a few sayings that don’t necessarily qualify as analogies or metaphors, but I think you’ll appreciate them nonetheless.
1. “Networks are like candy bars: Hard and crunchy on the outside, but soft and gooey on the inside.” |
|
2. “Information Superhighway.”Besides being overused, this metaphor is really dated and barely explains the nuances of the Internet. When Krebs hears this not even Internet 101 explanation of online technology, “I immediately think of policy wonks in Washington who love to blather on about ‘cyber-this’ and ‘cyber-that’ but who clearly lack a real depth of understanding about the issues or any real experience in the ‘cyber’ trenches.” |
|
3. “Snow shoveling.” |
|
4. “Policy.”The term is used by all groups for anything and everything, complained Haletky, “There’s a policy for data protection, one for performance management, one for security, one for compliance. The word just does not mean anything because there is ‘policy’ for everything, but when security says it, they imply something more important.” For infosec, Haletky suggest more telling words such as “control” and “procedures” instead of “policy.” |
|
5. “Hamster wheel of pain.” |
|
6. “XYZ is like the DNA in our product.”Biology and evolution are very complex sciences and shouldn’t be used to simplify an explanation of security, said Ranum who said that when a vendor claims that “XYZ is like the DNA in our product,” he’ll respond by asking, “In your analogy what are the base pairs?” Similarly, if a vendor tells you their product is on steroids, then it probably has acne and shrunken testicles. |
|
7. “You can bake a cake without sugar and nobody will notice, until they actually try it. By then it’s too late.”In another variation of “The cake is a lie,” Wendy Nather (@451wendy), Research Director, Enterprise Security Practice at 451 Research, notes that the best cakes/companies have sugar/security baked in. “The typical reaction to missing security is to try to slap it on afterwards in the form of ‘icing’ (e.g., ‘Can’t we just put a firewall in front of it?’),” noted Nather who believes that there are many security products that follow the “icing” model, such as web application firewalls. “It just isn’t the same as baking the security in to begin with,” said Nather. It doesn’t take a malicious hacker to break “top of the cake” security, said Nather who noted, “My kids are very good at separating the icing from the cake.” |
|
8. “Fortress security.” |
|
9. “Infosec isn’t about the cost of ownership, it’s about the cost of pwnership.”Given that digital crime has no set known procedures, security professionals have to respond in kind. “Infosec makes its own rules and does what it needs to get the job done,” said Troy Hunt (@troyhunt), software architect, Microsoft MVP, and author of the blog troyhunt.com. “It requires a very analytical and somewhat subversion mind that can be equal parts creative and destructive.” |
|
10. “Defense in depth.”Jaquith hates this catchall phrase because it means “buy lots of crap and pray something works” instead of offering up a more creative business solution. “For example,” said Jaquith, “If your executives are being serially infected with malware, the best answer might not be to double up on anti-malware, buy an expensive SIEM and install web security agents. Maybe the simplest and best solution is to get them all iPads.” |
|
11. “Brakes on a racing car.” |
|
12. “Cyber 9/11” and “Cyber Pearl Harbor.”These terms are usually pulled out to hype an issue, build an agenda, get quoted, and make headlines. They’re also dated as Shostack noted that the term “Cyber Pearl Harbor” has been used since 1991 in his post “The Boy Who Cried Cyber Pearl Harbor.” “To be using these phrases is an insult to those who suffered or were affected by those real events,” said Honan. |
|
13. “Risk management is like herding lizards.” |
|
14. “ROSI – Return on Security Investment”“For most security things, we can’t quantify risk, so you can’t quantify return,” said Ellis. “It’s a rat race.” |
|
15. “Draining the moat makes it easier to scale the castle wall.” |
|
16. “Holistic security”This metaphor is presented as an ideal form of security as compared to the less desirable disconnected “point solutions,” said Ponemon who believes that holistic versus point solution contrast is arbitrary and often meaningless. It’s pure consultant speak. |
|
17. “Two hikers in the woods and a hungry bear.” |
|
18. “Best practices.”“Application Security professionals commonly advocate for ‘best practices’ with little regard for the operational environment,” argued Grossman in his post “Is It Really True That Application Security has ‘Best Practices?’” In his article, Grossman lays out a few common application security scenarios and contends there are few, if any, best practices. “The implication of a ‘best practice’ is they are essential for everyone, in every organization, and at all times,” said Grossman. |
|
19. “Feudal security.” |
|
20. “Privacy.”“Privacy isn’t about keeping secrets. Privacy is about having control over how your information is disseminated and used,” said Schneier. “When you get a creepy personalized marketing message and wonder, ‘How did they know that?’ you’re not wondering how they learned a personal secret. What they knew was probably known by all your friends, or your family, or maybe your doctor. What you’re wondering is how you lost control over that information.” |
|
21. “Risk management is like crossing a road.” |
|
22. “You don’t want to be the next XYZ do you?”In this analogy, XYZ stands for the most recent and most talked about corporate breach. Every year people will point to that company’s failure as a reason you should be scared yourself, regardless of whether your business is even in the same industry. “If you want to make a point, it should be fact-based – not just an attempt to scare or intimidate someone into agreeing to your agenda,” said Malik. |
|
23. “Black swan.” |
|
24. “Security controls are like a seat belt.”This analogy is both immature and irresponsible, said Langford, “We use seat belts so we can drive faster more safely, therefore we apply security controls so we can take more risks.” The analogy simply doesn’t match up, as we mostly use seat belts so we don’t die when we or another driver does something stupid. |
|
25. “Security Diablo.” |
|
26. “The immune system of the body”This analogy simply does not jive. “It is inadequate because the immune system does not require conscious action and effective security certainly does. Good security doesn’t just ‘happen,’” said Melançon. |
|
27. “IT security is a bit like cleaning the toilets.” |
|
28. Security is only as good as your weakest link. |
|
29. “The first step is admitting you have a problem.”“Like some people who drink too much, the security community has a problem, and we can fix it if we’re willing to admit we have breaches and talk about them,” said Adam Shostack (@adamshostack), blogger and co-author of The New School of Information Security, who admits to using the analogy, yet still recognizes that dealing with an addiction can often be much harder. Shostack practices what he preaches. Last year, he admitted to us on video how his blog became a botnet server. |
|
30. “Think like an attacker.” |
|
31. “Soccer goal security.”An advertisement once ran in Network Computing magazine featuring an image of a soccer goalie actively defending one side of a goal, oblivious to the fact that his opponent was scoring on the other side of the goal. (See the photo) “The goalie is addressing the thread he expects,” said Richard Bejtlich (@taosecurity), blogger at TaoSecurity, “The threat is smart and unpredictable, attacking a different part of the net.” “I see too many security teams misdirecting resources to nonexistent or less damaging threats,” continued Bejtlich. “Instead, they should build visibility into their security program and counter threats that are already exploiting their enterprise.” |
|
32. Chocolate fireguardThis metaphor refers to security that only “looks” good. “As soon as you apply some heat to it, it melts away, loses its structure and doesn’t provide the safety that a fireguard is expected to,” said Bruce Hallas (@brucehallas), who actually runs The Analogies Project to help others better understand business and security issues. |
I want MORE security analogies and metaphors
This is quite an extensive list, but it’s far from the complete compendium of analogies. Please share your own via Twitter (#InfosecAnalogies), and let us know what they mean and why you love them or hate them.
Stock images courtesy of Shutterstock.