Course Overview January 16, 2007.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
C MU U sable P rivacy and S ecurity Laboratory Anti-Phishing Phil The Design and Evaluation of a Game That Teaches People Not to.
Web sites should always post a privacy policy, where they tell you why they need information from you and what they will do with it. If you're not sure.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
CyLab Usable Privacy and Security Laboratory 1 C yLab U sable P rivacy and S ecurity Laboratory Introduction.
Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Course Overview January.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Designing user studies February.
Usable Privacy and Security Course Overview Lorrie Cranor, Jason Hong, Mike Reiter Grad students and juniors and seniors –Tended to be HCI, CS, Public.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
MRESone45 MRESone45 Online Evaluation System R1 Orientation
10th Workshop "Software Engineering Education and Reverse Engineering" Ivanjica, Serbia, 5-12 September 2010 First experience in teaching HCI course Dusanka.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Course Overview January 16, 2007.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Quick Discussion – based on:
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Information Assurance Policy Tim Shimeall
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Law Enforcement.
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Usable Privacy and Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
CSCD 303 Essential Computer Security Lecture 1 - Course Details.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
ISP 1600 for Winter 2005 Web.Edu: How Internet Courses Work Course web site: Third meeting January 27, 2005.
CUSTOMER SERVICE LESSON 1: INTRODUCTION TO CUSTOMER SERVICE...
Shopping on Amazon & Safe Shopping
Cyber Info Gathering Techniques
3.6 Fundamentals of cyber security
Learn how to protect yourself against common attacks
Introduction to Programming
Unit 4 IT Security.
E 96 Introduction to Engineering Design Peter Reiher UCLA
Computer Virus and Antivirus
How to build a good reputation online
HRM- 201 Human Resource Management I
Teaching Computing to GCSE
Education – Partnership – Solutions
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Call AVG Antivirus Support | Fix Your PC
Risk of the Internet At Home
Building Engagement in Course Evaluation
Perspective Interview: Sofia Perez
Security and Usability
Web User Interface (WUI) Behavior
My House My Rules.
Spyware. By: Katheryn L. Gaston.
Tom Chothia Computer Security
Introduction to Computers
CSCD 303 Essential Computer Security
Teaching you NOT to fall for Phish
CSCD 303 Essential Computer Security
How to Stay Organized in an Online Class
Welcome to the E Safety Workshop
Internet Safety – Social Media
Lesson 2- Protecting Yourself Online
Handling Information Securely
CSCD 303 Essential Computer Security
Cybercrime By: Kimberly Foreiter
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
This is a template for a presentation that you can use to introduce your team to Harvest. You can customize the content of the slides. You’ll want to pay.
Presentation transcript:

Course Overview January 16, 2007

Outline Review syllabus and course policies Distribute survey Introduction to usable privacy and security Faculty research overview Introduce students

Simson Garfinkel and I just published a book on usable security Simson Garfinkel and I just published a book on usable security. Book includes chapters contributed by many researchers in this area. I have borrowed a number of their ideas and examples for this talk.

Syllabus http://cups.cs.cmu.edu/courses/ups-sp07/ Course numbers Grading Homework (25%) - due at 3:15pm Lecture (25%) Project (50%) Textbook and readings Schedule

Survey Please fill out course survey and bring it with you to class on Thursday

Unusable security & privacy Unpatched Windows machines compromised in minutes Phishing web sites increasing by 28% each month Most PCs infected with spyware (avg. = 25) Users have more passwords than they can remember and practice poor password security Enterprises store confidential information on laptops and mobile devices that are frequently lost or stolen

- Computing Research Association 2003 Grand Challenge “Give end-users security controls they can understand and privacy they can control for the dynamic, pervasive computing environments of the future.” - Computing Research Association 2003

Just work

security/privacy researchers and system developers But until recently, security and privacy researchers weren’t paying a whole of attention to what users wanted. Security folks worked in one department, while HCI folks worked in a different department, and they didn’t really talk much. But that is starting to change. human computer interaction researchers and usability professionals

http://cups.cs.cmu.edu/soups/ Mark your calendar for SOUPS 2007 - July 18-20 at CMU A number of recent workshops and special issues of journals aimed at usable privacy and security. … SOUPS last July and next July http://cups.cs.cmu.edu/soups/

The user experience Security and privacy are secondary tasks Nobody buys a computer so they can spend time securing it. Time we spend configuring security and privacy tools is time we are not spending doing what we really want to be doing with our computers

How do users stay safe online?

POP! Firewalls Antivirus software Spam filters Pop-up blockers Cookie managers Spyware removers encryption software if you have kids, adult content filters, and if you want to cover your tracks, anonymity tools

After installing all that security and privacy software

Do you have any time left to get any work done?

Secondary tasks Security and privacy are secondary tasks Nobody buys a computer so they can spend time securing it. Time we spend configuring security and privacy tools is time we are not spending doing what we really want to be doing with our computers

“Users do not want to be responsible for, nor concern themselves with, their own security.” - Blake Ross Firefox developer Blake Ross wrote about a set of security assumptions in the chapter he wrote for my book. These are a good set of assumptions that most software developers might follow.

Concerns may not be aligned Security experts are concerned about the bad guys getting in Users may be more concerned about locking themselves out

Grey: Smartphone based access-control system Deployed in CMU building with computer security faculty and students Nobody questions that the security works But lots of concerns about getting locked out L. Bauer, L. F. Cranor, M. K. Reiter, and K. Vaniea. Lessons Learned from the Deployment of a Smartphone-Based Access-Control System. Technical Report CMU-CyLab-06-016, CyLab, Carnegie Mellon University, October 2006. http://www.cylab.cmu.edu/default.aspx?id=2244

Secure, but usable?

Unusable security frustrates users

Typical password advice Pick a hard to guess password Don’t use it anywhere else Change it often Don’t write it down Common knowledge that this is advice doesn’t work

What do users do when every web site wants a password?

Bank = b3aYZ Amazon = aa66x! Phonebill = p$2$ta1

From http://www.interactivetools.com/staff/dave/damons_office/

Approaches to usable security Make it “just work” Invisible security Make security/privacy understandable Make it visible Make it intuitive Use metaphors that users can relate to Train the user

Make it “just work”

This makes users very happy (but it’s not that easy)

Make decisions Developers should not expect users to make decisions they themselves can’t make Many pieces of software contain prompts in which the developers ask users to make a security-related decision. Blake Ross suggests that - Before coding up such questions, software developers should ask themselves a question: if I can’t figure it out, how are users supposed to? What additional qualifications do users possess that will help them arrive at a better conclusion? (From Blake Ross’ book chapter)

Make security understandable

“Present choices, not dilemmas” - Chris Nodder (in charge of user experience for Windows XP SP2) Chris Nodder, who was in charge of user experience for MS XP SP2, puts it this way: “Present choices, not dilemmas.” If the user doesn’t have any insights into how to answer a question, it is a dilemma, not a decision. There are some situations where users possess some additional contextual knowledge or personal preferences that may allow them to make a better decision than the implementer could make in advance. In those cases, UIs are needed that will help users understand what bit of knowledge they bring to the decision and how they can best apply it. But if the users don’t have anything useful to contribute, they should not be making the decision.

Train the user

Training people not to fall for phish Laboratory study of 28 non-expert computer users Asked to evaluate 10 web sites, take 15 minute break, evaluate 10 more web sites Experimental group read web-based training materials during break, control group played solitaire Experimental group performed significantly better identifying phish after training People can learn from web-based training materials, if only we could get them to read them!

How do we get people trained? Most people don’t proactively look for training materials on the web Many companies send “security notice” emails to their employees and/or customers But these tend to be ignored Too much to read People don’t consider them relevant

Embedded training Can we “train” people during their normal use of email to avoid phishing attacks? Periodically, people get sent a training email Training email looks like a phishing attack If person falls for it, intervention warns and highlights what cues to look for in succinct and engaging format P. Kumaraguru, Y. Rhee, A. Acquisti, L. Cranor, J. Hong, and E. Nunge. Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System. CyLab Technical Report. CMU-CyLab-06-017, 2006. http://www.cylab.cmu.edu/default.aspx?id=2253

Diagram intervention

Explains why they are seeing this message

Explains how to identify a phishing scam

Explains what a phishing scam is

Explains simple things you can do to protect self

Comic strip intervention

Embedded training evaluation Lab study compared two prototype interventions to standard security notice emails from Ebay and PayPal Existing practice of security notices is ineffective Diagram intervention somewhat better Comic strip intervention worked best Interventions most effective when based on real brands

Faculty research overview Lorrie Cranor Jason Hong CMU Usable Privacy and Security (CUPS) Laboratory http://cups.cs.cmu.edu/

Student introductions Introduce yourself to your neighbor and tell them your background. Tell them why you’re taking the course and what you want to get out of the course Form a group of ~4 and repeat Form a group of ~8 and repeat Pick someone to stand up in front of the class, introduce your group members, and summarize the reasons people in your group are taking the course and what you want to get out of the course

CMU Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/