Cybersecurity and People: Challenges in Predicting User Actions Joachim Meyer Dept. of Industrial Engineering Fleischman School of Engineering Tel Aviv.

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

Computer Security Workshops Security Introduction, Central Principles and Concepts.
Identity Federation: Some Challenges and Thoughts OGF 19 Jan 30, 2007 Von Welch
The State of Security Management By Jim Reavis January 2003.
CyLab Usable Privacy and Security Laboratory 1 C yLab U sable P rivacy and S ecurity Laboratory Introduction.
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Sources of Magnetic Field
Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Course Overview January.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Understanding the Human in.
Electric Charge and Electric Field
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Safer Web Browsing Terry Labach Information Security Services IST.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Technology Security Risk Management. Technology Security Risks 1. Data Confidentiality risk 2. System Integrity risk 3. System Availability risk 4. Customer.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
BIG DATA NICOLAS MUNOZ. Topics What is Big Data? Benefits & Drawbacks How does it work? Companies doing Big Data Market for Big Data Applications of Big.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
“EMC CoE DATA SCIENCE - Making Sense of BIG DATA” Alon Kaufman, Ph.D. Director of Research & Innovation, RSA IL CTO.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
@Yuan Xue CS 285 Network Security Fall 2008.
Practising Safer Web Browsing Terry Labach Information Security Services IST February 17, 2012.
Working Connection Computer and Network Security - Introduction - Dr. Hwajung Lee Radford University.
Another perspective on Network Security Network Security Essentials: Applications and Standards, 4/E William Stallings ISBN-10: ISBN-13:
PRESENTATION ON BIOMETRICS
Computer and Network Security - Message Digests, Kerberos, PKI –
@Yuan Xue CS 285 Network Security Fall 2013 Yuan Xue.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
An Introduction to Biometrics
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-1 Overview and Introduction.
Using Hand Gestures for Alternative User Verification
ITwin iTwin Presented by: G.Vyshnavi 14A81A0572 CSE-B.
Microsoft Windows NT 4.0 Authentication Protocols
Chuck Frank Northern Kentucky University
ISO Smart and Sustainable Cities developments
IS511 Introduction to Information Security Usable Security
Information Security.
Password Management Limit login attempts Encrypt your passwords
Wireless Networks (CNET - 333)
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Jee sook, Eun May 2004 Presented in IEEE 802.1af - key management
Virtual Private Networks (VPN)
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
An Introduction to Web Application Security
How to Operationalize Big Data Security Analytics
A Must to Know - Testing IoT
Security and Usability
Virtual Private Networks
Project Oxygen… Shashwat Shriparv
Chuck Frank Northern Kentucky University
Types of Research Questions
Another perspective on Network Security
Authentication & the Web
ISO Smart and Sustainable Cities developments
Topic 5: Communication and the Internet
Confusion and Diffusion
Access Security Who you are What you have What you know.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
The Computer as a Medium for Sharing Knowledge
PLANNING A SECURE BASELINE INSTALLATION
Cryptographic Protocols
SIMULATION IN THE FINANCE INDUSTRY BY HARESH JANI
Overview and Introduction (Lecture Contents Summary)
October is National Cybersecurity Awareness Month
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Cybersecurity and People: Challenges in Predicting User Actions Joachim Meyer Dept. of Industrial Engineering Fleischman School of Engineering Tel Aviv University

Humans “Humans are incapable of securely storing high- quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations. (They are also large, expensive to maintain, difficult to manage, and they pollute the environment. It is astonishing that these devices continue to be manufactured and deployed. But they are sufficiently pervasive that we must design our protocols around their limitations.)” −− C. Kaufman, R. Perlman, and M. Speciner. Network Security: PRIVATE Communication in a PUBLIC World. 2nd edition. Prentice Hall, page 237, 2002.

Some topics we study … Risk taking in system use – There are several interrelated behaviors Adjusting of system settings – People aren’t good at it Responses to alerts and advice – Alerts are often ignored Authentication

Model Controlled Experiments Observations in the Field

???

Bank = b3aYZ Amazon = aa66x! Phonebill = p$2$ta1 The Challenge of Access Control

What affects authentication behavior? Authentication method – (password, graphic, biometric) Authentication complexity – (e.g., password length, required accuracy of movements) Authentication frequency Importance of protection – (likelihood and severity of threats) Situation – (stress, time pressure, etc.)

The big problem – matters are messy. Intentions, feedback, learning, communication