Certification and evaluation: A security economics perspective

Ross Anderson, Shailendra Fuloria

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

There has been some discussion in the industrial control system security community of evaluation and certification. There are already at least two independent third party evaluators, and some have advocated common criteria certification of products used in critical systems. The broader IT security community has considerable experience of evaluation and certification, which we seek to summarise and share in this paper. Certification is not a silver bullet, and can very easily end up as spin rather than substance: as `security theatre' designed to reassure customers or regulators rather than a genuine risk-reduction mechanism. It can also be very expensive, and once entrenched it can impose deadweight costs on industry that are difficult to eliminate even when certification processes are widely seen as failing. We discuss a number of further issues such as perverse incentives, usability and liability and argue that the industry should proceed with great caution.
Original languageEnglish
Title of host publication2009 IEEE Conference on Emerging Technologies Factory Automation
PublisherInstitute of Electrical and Electronics Engineers
Number of pages7
ISBN (Electronic)978-1-4244-2728-4
ISBN (Print)978-1-4244-2727-7
DOIs
Publication statusPublished - 4 Dec 2009
Event2009 IEEE Conference on Emerging Technologies & Factory Automation (ETFA) - Mallorca, Spain
Duration: 22 Sept 200926 Sept 2009

Publication series

NameIEEE Conference on Emerging Technologies & Factory Automation
PublisherIEEE
ISSN (Print)1946-0740
ISSN (Electronic)1946-0759

Conference

Conference2009 IEEE Conference on Emerging Technologies & Factory Automation (ETFA)
Abbreviated titleETFA 2009
Country/TerritorySpain
CityMallorca
Period22/09/0926/09/09

Fingerprint

Dive into the research topics of 'Certification and evaluation: A security economics perspective'. Together they form a unique fingerprint.

Cite this