iTnews
  • Home
  • News
  • Technology
  • Security

Humans not evolved for IT security

By Iain Thomson
Oct 24 2007 2:44PM
Follow google news

Human beings aren't evolved for security in the modern world, and particularly the IT security world, according to security guru Bruce Schneier.

Humans not evolved for IT security
He told delegates at the 2007 RSA Conference that there is a gap between the reality of security and the emotional feel of security due to the way our brains have evolved. This leads to people making bad choices.

"As a species we got really good at estimating risk in an East African village 100,000 years ago. But in 2007 London? Modern times are harder."

Our brains evolved to deal with the reality of security, but emotional aspects also have a big role, he added. There are a number of such factors that prevent people from making the right security decisions. For instance:

  • Exaggerate uncommon risks – for example, air travel is safer than cars but because car accidents are common they are seen as less risky

  • Unknown risks – The unknown is always scary

  • Personified risk – Osama Bin Laden is scarier than a faceless threat

  • Involuntary risks – We overestimate the risks of situations where we have no control, like natural disasters

  • Risks that could be controlled – The DC sniper caused a few deaths but the response was way out of proportion.


"In the technology industry we like to think we're computers, but we're not even close," he said.

"The brain is still in beta mode, it's got all sorts of patches and workarounds. It's not perfectly created, it's clearly evolved up."

Too often in the industry products appealed to people's emotions rather than addressing business facts and that was hurting the industry.

Add iTnews as your trusted source

Add iTnews As Your Trusted Source Add iTnews As Your Trusted Source
Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
evolvedforhumansitnotsecurity

Related Articles

  • Parallel bug discovery triggers premature Linux LPE disclosure Parallel bug discovery triggers premature Linux LPE disclosure
  • Cleanaway tidies up endpoint security Cleanaway tidies up endpoint security
  • 'ClickFix' attack tricks users into hacking themselves, ACSC warns 'ClickFix' attack tricks users into hacking themselves, ACSC warns
  • 'PCPJack' cloud worm hijacks TeamPCP hacker infrastructure 'PCPJack' cloud worm hijacks TeamPCP hacker infrastructure
Join our WhatsApp Channel

Partner Content

Take control of your connectivity with Telstra’s Adaptive Networks Centre
Partner Content Take control of your connectivity with Telstra’s Adaptive Networks Centre
InnoEX and Hong Kong Electronics Fair (Spring Edition) will open in April 2026
Promoted Content InnoEX and Hong Kong Electronics Fair (Spring Edition) will open in April 2026
Why AI, sovereignty and visibility are redefining cyber strategy: Infotrust
Partner Content Why AI, sovereignty and visibility are redefining cyber strategy: Infotrust
The Toggle Tax: 5 signs your support team is Mental-Tasking, not Multitasking
Partner Content The Toggle Tax: 5 signs your support team is Mental-Tasking, not Multitasking

Sponsored Whitepapers

Beyond RAG basics: Strategies and best practices for implementing RAG
Beyond RAG basics: Strategies and best practices for implementing RAG
AI Workflows vs AI Agents Whitepaper
AI Workflows vs AI Agents Whitepaper
Context Engineering with Hybrid Search for Agentic AI
Context Engineering with Hybrid Search for Agentic AI
Building AI-powered Search Experiences
Building AI-powered Search Experiences
Shining a Light in the Dark: Observability and Security
Shining a Light in the Dark: Observability and Security

Events

  • iTnews Executive Retreat - Data & AI Edition iTnews Executive Retreat - Data & AI Edition
  • iTnews Cloud Covered Breakfast Summit iTnews Cloud Covered Breakfast Summit
  • iTnews State of Security Breakfast iTnews State of Security Breakfast
  • The 2026 iAwards The 2026 iAwards
  • Integrate 2026 Integrate 2026
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Qld gov says students, staff caught in Canvas cyber incident

Qld gov says students, staff caught in Canvas cyber incident

Medibank reveals attack vector and cost of 2022 security breach

Medibank reveals attack vector and cost of 2022 security breach

Aus universities and TAFEs investigating exposure to Canvas cyber incident

Aus universities and TAFEs investigating exposure to Canvas cyber incident

techpartner.news logo
Sydney-based AI-cloud waste startup raises $3m
Sydney-based AI-cloud waste startup raises $3m
Brennan uses NiCE to modernise its contact centre
Brennan uses NiCE to modernise its contact centre
Impact Awards: Tecala slashes customer response times for fintech IQumulate
Impact Awards: Tecala slashes customer response times for fintech IQumulate
Interactive introduces private cloud platform
Interactive introduces private cloud platform
Digital61 expands cybersecurity portfolio
Digital61 expands cybersecurity portfolio
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.