User Education Baik Sangyong Cheng Zeng. Agenda Why Need User Education Examples of User Education Security-Reinforcing Application for User Education.

Slides:



Advertisements
Similar presentations
Chapter 9 Motivation Explain what motivation is and why managers need to be concerned about it Describe from the perspectives of expectancy theory and.
Advertisements

How to protect yourself, your computer, and others on the internet
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
 Understand how safety behavior is shaped  Analyze employee behavior  Pinpoint, observe, and measure specific behaviors  Provide positive feedback.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Behavioral Theories Of Learning
Chapter 5 Motivation Theories
MOTIVATION THAT WHICH CAUSES BEHAVIOR TO BEGIN SUSTAINED BEHAVIOR.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Users Are Not The Enemy A. Adams and M. A. Sasse Presenter: Jonathan McCune Security Reading Group February 6, 2004.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Behaviorism Ed Tech Masters Program Summer What is behaviorism all about? Psychology is purely the study of external behavior Behavior is objective.
June is an easy way to communicate. It costs nothing to send an , but it does require a connection to the Internet. You can.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Quiz Review.
Protecting Our Personal Space Security in a Virtual World.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Norman SecureSurf Protect your users when surfing the Internet.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Chapter 9 Motivation.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Organizational Behavior. 2 Chapter 6 Study Questions  What is motivation?  What do the content theories suggest about individual needs and motivation?
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Class Activity: User Education on SNS Phishing. Contextual Training Users are sent simulated phishing s by the experimenter to test user’s vulnerability.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
etiquette Etiquette s always go to any of the following: Staff
Staying Safe Online Keep your Information Secure.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing Internet scams. Phishing phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and.
Awicaksi E-Commerce Security & Payment System E-Commerce.
Topic 5: Basic Security.
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
Helping your family to stay in control Living with technology.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Jeanne Ormrod Eighth Edition © 2014, 2011, 2008, 2006, 2003 Pearson Education, Inc. All rights reserved. Educational Psychology Developing Learners.
Improving Security Decisions with Polymorphic and Audited Dialogs José Carlos Brustoloni and Ricardo Villamarín-Salomón Dept. Computer Science University.
Any criminal action perpetrated primarily through the use of a computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
Human Resources Training and Individual Development Learning and Motivation January 28, 2004.
Safe Computing Practices. What is behind a cyber attack? 1.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Exchange Online Advanced Threat Protection
Introduction to Web Safety
Internet Identity, Safety, & Security
Information Security.
Lesson 3 Safe Computing.
Lawson System Foundation 9.0
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
DON’T GET HOOKED! YOU MAY BE UNAWARE BUT YOU ARE A PHISHING TARGET FOR CYBER CRIMINALS. A. Unknown sender address B. Offer too good to be true &
Observational Learning
The Psychology of Security
Computer Security.
Manual Water Ski Directory
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Being Aware of What You Share
Human Learning.
Cybersecurity Simplified: Phishing
Presentation transcript:

User Education Baik Sangyong Cheng Zeng

Agenda Why Need User Education Examples of User Education Security-Reinforcing Application for User Education Class Activity Anti-Phishing Phil Demo Fallacies of User Education

Why Need User Education User Education Teach users how to be safe online Protect people from security and privacy threats “Human In The Loop” Model User As Weakest Link in Security Activities "Given a choice between dancing pigs and security, users will pick dancing pigs every time.“ --Edward Felten and Gary McGraw

Examples of User Education Network Advertising Initiative (NAI) ( Digital Advertising Alliance (DAA) ( DAA’s Education Principle: The DAA must maintain a central educational website and provide educational ads.

Network Advertising Initiative

Digital Advertising Alliance

Cookie Education

Cartoon about Spoofing [

A Look At Cookies

Cookies

Got Cookies

What They Know Advertising Cookies And You

Which one do you like?

Staying Clear of Cyber Tricks

Security Reinforcement Applications Vicarious Security Reinforcement “Using Reinforcement to Strengthen Users' Secure Behaviors” Security-Reinforcing Applications (SRA) Inspired by Operant Conditioning Model Reward users' secure behavior Vicarious Security Reinforcement (VSR) Inspired by Social Learning Theory Help accelerate SRA benefits Results SRA improves users' secure behaviors Not extinguish after several weeks VSR accelerates learning of desired security behaviors in SRA users. [Villamarín-Salomón et al., 2010]

Operant Conditioning (OC) Model Operant Conditioning A form of psychological learning An individual acquires or maintains a behavior as a result of the behavior's consequences to the individual Reinforcer Consequence that strengthen a behavior Positive Reinforcement Present something pleasing Negative Reinforcement Remove something displeasing Punishment Consequence that weaken a behavior Antecedent Stimuli present in the environment only immediately before behaviors that are reinforced

Security-Reinforcing Applications Reinforce users' secure behaviors Deploy within organizations Secure Behavior Rejection of unjustified risks (UR) Acceptance of justified risks (JR) Insecure Behaviors Acceptance of unjustified risks (UR) Rejection of justified risks (JR) Justified Risks primary tasks no other alternatives to accomplish such tasks no means to mitigate the risks

Example of UR and JR UR may be an message containing an attachment that is unexpected, from an unknown sender, unnecessary to the user's job-related tasks, or of a type that may spread infections (e.g.,.exe). In this case, the user may mitigate the risk by, e.g., asking the sender to retransmit the attachment in a less risky file format (e.g.,.txt). JR may be represented by an that (a) the user was expecting and contains an attachment useful to complete a work-related task, or (b) was sent by a known member of the user's organization, with wording not appearing out of character for such sender, and explaining clearly why the recipient needs the attachment for her work.

Security-Reinforcing Applications

Vicarious Security Reinforcement Problems when using SRA: Take time for users to understand association between secure behavior and reward Users handle some of risks, but may miss others “Vicarious security reinforcement (VSR) can model secure behaviors and present their desirable consequences without waiting for users to emit fortuitously such behaviors and stumble upon their consequences.”

Social Learning (SL) Theory Learning in social context Individuals can also acquire and maintain behaviors by observing their consequences in others (models) Vicarious reinforcement sub process Attention Retention Reproduction Motivation Difference to Imitation refrain from unwanted behavior by observing subsequent consequences

Vicarious Security Reinforcement

Experiment

Comparison with PhishGuru SRAs Embedded rewards Organization-specific security policies and targeted attacks With supervision Educate about complex policies PhishGuru Links to websites with educational cartoons Organization-specific security policies and targeted attacks Without supervision quicker apply simpler policies

Class Activity: User Education on SNS Phishing

Contextual Training Users are sent simulated phishing s by the experimenter to test user’s vulnerability regarding phishing attacks At the end of the study, user is notified about phishing attacks No immediate feed-back

Embedded Training Teaches user about phishing during regular usage of the application, such as

Reflection Principle Reflection is the process by which learners are made to stop and think about what they’re learning

Story-based Agent Environment Principle Agents are characters that help users regarding learning process

Conceptual-Procedural Principle Conceptual & Procedural knowledge influence one and another

Demo of Anti-Phishing Phil

Another Form of Phishing Attack Full Screen API Demo

Ad-Click Demo

User Should Reject Security Advice? User rejecting security advice is rational from an economic perspective 100% of certificate error warnings appear to be false positive Most security advices provide poor cost-benefit tradeoff to users and is rejected How can we blame users for not adhering to certificate warnings when vast majority of them are false positives?

Users are the Weakest Link in Security Why attack machines when users are so easy to target? Most large web-sites offer security tips to users Not so effective however Users are lazy

Why Do Users Disregard Security Warnings? Overwhelmed Benefits are moot or perceived as moot Strong password does nothing in presence of keylogger How often does user perceive a real attack?

Password Policies

Teaching Users to Identify Phishing Sites By Reading URL Phishers quickly evolve

Certificate Errors Type Type Type paypal control + enter Search Google for PayPal and click link Click bookmarked Click bookmarked Problems?

Discussion