July 11, 2016 By Rick M Robinson 2 min read

The summer travel season is upon us. In an age of terrorism and other threats, this means that everyone is talking about airport security lines and the Transportation Security Administration (TSA).

Yes, everyone hates standing in line at airports and taking off their shoes. But as you wait, cybersecurity professionals can take some consolation from their user’s-eye perspective on a familiar conundrum: Seeking to combine maximum security with minimum inconvenience. Risk-based security is one solution to this challenge, but it comes with challenges of its own.

A Matter of Inconvenience

Before looking specifically at risked-based security, everyone needs to acknowledge a fact: Good security is inherently inconvenient. The whole point of security is to throw obstacles, complications, difficulties — in short, inconveniences — into the path of the malicious actors who pose security threats.

Take one familiar object of hate: the password. Strong passwords are a pain because they are tricky to remember. They are difficult to remember because, to be strong, they need to be hard to guess. Some user pain is all but unavoidable.

One basic way to improve security and reduce user pain and inconvenience is to concentrate efforts on the actors we are trying to stop. This is what risk-based security is all about: The more we can zero in on the potential threats, the more we can avoid hassling everyone else.

Waiting in Line to Bypass the Line

Honing in on cybercriminals requires identifying and assessing risks, which is not always an easy process. How do you identify a potential terrorist in an airport line or a potential attacker online?

The very idea of quantifying risk factors can be dicey because, as security specialist Rick Doten told Teri Robinson of SC Magazine, “Security is an emotion and risk is a calculation.” Assessing and prioritizing risks is always going to be a fraught and demanding task, albeit a necessary one.

Risk calculation can go in two directions. The more familiar seeks to identify users who are potentially high-risk and target them for protective action. The TSA’s famous — or infamous — No-Fly List is a measure of this type. But an equally important component of risk-based security works in the opposite direction: Identify low-risk, trusted users and allow them to speed through security checkpoints.

The TSA’s version of a trusted user program is its PreCheck. But as The New York Times reported, this has its own complications. Prospective trusted users need to be identified and vetted to ensure that they do in fact deserve to be trusted. This has created a bottleneck. Requests for PreCheck status have been much greater than expected, leading to long lines for PreCheck applications and approval.

Risk-Based Security Requires Work

Enterprises can do this screening organizationally, meaning that the trusted users can be selected and screened by others and might not even be told they have reached the trusted status. Someone still needs to do the work, but the individual user doesn’t need to know about it.

The bottom line is that someone needs to do the work. Real security has costs, including unavoidable user inconvenience. Budget constraints can add further inconveniences such as delays in granting users a “trusted” status. User complaints are inevitable.

Cybersecurity professionals putting their shoes back on at the airport should use the experience as a lesson in perspective. In a world of risks, security is indeed worth some inconvenience.

More from Risk Management

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

How TikTok is reframing cybersecurity efforts

4 min read - You might think of TikTok as the place to go to find out new recipes and laugh at silly videos. And as a cybersecurity professional, TikTok’s potential data security issues are also likely to come to mind. However, in recent years, TikTok has worked to promote cybersecurity through its channels and programs. To highlight its efforts, TikTok celebrated Cybersecurity Month by promoting its cybersecurity focus and sharing cybersecurity TikTok creators.Global Bug Bounty program with HackerOneDuring Cybersecurity Month, the social media…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today