{"id":6905,"date":"2010-12-16T12:48:05","date_gmt":"2010-12-16T16:48:05","guid":{"rendered":"http:\/\/quotulatiousness.ca\/blog\/?p=6905"},"modified":"2011-02-19T11:15:25","modified_gmt":"2011-02-19T15:15:25","slug":"bruce-schneier-on-security-in-2020","status":"publish","type":"post","link":"https:\/\/quotulatiousness.ca\/blog\/2010\/12\/16\/bruce-schneier-on-security-in-2020\/","title":{"rendered":"Bruce Schneier on Security in 2020"},"content":{"rendered":"<p>Aside from all the ugly new terms coined to describe the phenomena, the evolution of security is one of the most under-appreciated stories of the decade. The <a href=\"http:\/\/www.schneier.com\/blog\/archives\/2010\/12\/security_in_202.html\" target=\"_blank\">next decade<\/a> is going to be even more important to how we live our lives:<\/p>\n<blockquote>\n<p>There\u2019s really no such thing as security in the abstract. Security can only be defined in relation to something else. You\u2019re secure from something or against something. In the next 10 years, the traditional definition of IT security &mdash; \u00adthat it protects you from hackers, criminals, and other bad guys &mdash; \u00adwill undergo a radical shift. Instead of protecting you from the bad guys, it will increasingly protect businesses and their business models from you.<\/p>\n<p>Ten years ago, the big conceptual change in IT security was <em>deperimeterization<\/em>. A wordlike grouping of 18 letters with both a prefix and a suffix, it has to be the ugliest word our industry invented. The concept, though &mdash; \u00adthe dissolution of the strict boundaries between the internal and external network &mdash; was both real and important.<\/p>\n<\/blockquote>\n<p>So, that was then. This is now:<\/p>\n<blockquote>\n<p>Today, two other conceptual changes matter. The first is <em>consumerization<\/em>. Another ponderous invented word, it\u2019s the idea that consumers get the cool new gadgets first, and demand to do their work on them. Employees already have their laptops configured just the way they like them, and they don&#8217;t want another one just for getting through the corporate VPN. They\u2019re already reading their mail on their BlackBerrys or iPads. They already have a home computer, and it\u2019s cooler than the standard issue IT department machine. Network administrators are increasingly losing control over clients.<\/p>\n<p>This trend will only increase. Consumer devices will become trendier, cheaper, and more integrated; and younger people are already used to using their own stuff on their school networks. It\u2019s a recapitulation of the PC revolution. The centralized computer center concept was shaken by people buying PCs to run VisiCalc; now it\u2019s iPads and Android smart phones.<\/p>\n<\/blockquote>\n<p>I&#8217;ve certainly noticed this myself: it was forced to my attention a couple of years ago, when a change of employment required me to buy and maintain my own &#8220;business&#8221; computer and software. Without seriously stressing my wallet, I was able to buy far more capable equipment than my previous employer had provided. Being able to check my email on multiple devices was very important, and once I&#8217;d started doing that, I realized the need to do many other things regardless of the machine I happened to be using. There are, of course, trade-offs involved:<\/p>\n<blockquote>\n<p>The second conceptual change comes from cloud computing: our increasing tendency to store our data elsewhere. Call it <em>decentralization<\/em>: our email, photos, books, music, and documents are stored somewhere, and accessible to us through our consumer devices. The younger you are, the more you expect to get your digital stuff on the closest screen available. This is an important trend, because it signals the end of the hardware and operating system battles we&#8217;ve all lived with. Windows vs. Mac doesn&#8217;t matter when all you need is a web browser. Computers become temporary; user backup becomes irrelevant. It\u2019s all out there somewhere &mdash; \u00adand users are increasingly losing control over their data.<\/p>\n<\/blockquote>\n<p>Anyway, there&#8217;s lots more interesting stuff. Go <a href=\"http:\/\/www.schneier.com\/blog\/archives\/2010\/12\/security_in_202.html\" target=\"_blank\">read the whole thing<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aside from all the ugly new terms coined to describe the phenomena, the evolution of security is one of the most under-appreciated stories of the decade. The next decade is going to be even more important to how we live our lives: There\u2019s really no such thing as security in the abstract. Security can only [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25,10,15],"tags":[109,129,58,334],"class_list":["post-6905","post","type-post","status-publish","format-standard","hentry","category-economics","category-liberty","category-technology","tag-computers","tag-hack","tag-internet","tag-security"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2hpV6-1Nn","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/6905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/comments?post=6905"}],"version-history":[{"count":7,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/6905\/revisions"}],"predecessor-version":[{"id":7890,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/6905\/revisions\/7890"}],"wp:attachment":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/media?parent=6905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/categories?post=6905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/tags?post=6905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}