690
Views
14
CrossRef citations to date
0
Altmetric
Original Articles

Perverse Effects in Defense of Computer Systems: When More Is Less

Pages 597-620 | Published online: 05 Oct 2016
 

Abstract

With computer security spending on the rise, organizations seem to have accepted the notion that buying more—and more expensive—defenses allows them to better protect their computer systems. In the context of complex computer systems, however, defenses can also have the opposite effect, creating new, unforeseen vulnerabilities in the systems they are intended to protect. Advocacy for defense-in-depth and diverse security measures has contributed to this “more is better” mentality for defending computer systems, which fails to consider the complex interaction of different components in these systems, especially with regard to what impact new security controls may have on the operation and functionality of other, preexisting defenses. We give examples of several categories of perverse effects in defending computer systems and draw on the theory of unintended consequences and the duality of technology to analyze the origins of these perverse effects, and to develop a classification scheme for the different types and some methods for avoiding them.

Additional information

Notes on contributors

Josephine Wolff

Josephine Wolff ([email protected]) is an assistant professor in the Public Policy Department at Rochester Institute of Technology and a member of the extended faculty of the Computing Security Department. She is a faculty associate at the Harvard Berkman Center for Internet & Society and a fellow at the New America Cybersecurity Initiative. She holds a master’s degree in technology and policy and a Ph.D. in engineering systems from MIT. Previously, she worked at Microsoft, the Center for Democracy and Technology, and the Department of Defense. Her research interests include cybersecurity policy, impacts of computer security controls, economics of information security, and liability regimes for cybersecurity incidents. Her academic writing has been published in Telecommunications Policy and presented at the Research Conference on Communications, Information, and Internet Policy. Her writing has also appeared in Slate, The Atlantic, Scientific American, Newsweek, the New Republic, and the New York Times.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 640.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.