The Importance of Being Earnest [in Security Warnings] Serge Egelman (UC Berkeley) Stuart Schechter (Microsoft Research)

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness Devdatta Akhawe UC Berkeley Adrienne Porter Felt Google, Inc.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 User Studies Motivation January.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
June 19, 2006TIPPI21 Web Wallet Preventing Phishing Attacks by Revealing User Intentions Rob Miller & Min Wu User Interface Design Group MIT CSAIL Joint.
Virtual techdays INDIA │ 9-11 February 2011 Safe Browsing Experience for your Home & Office M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Security Warnings TROPE: Teachers’ Resources for Online Privacy Education 1.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
How It Applies In A Virtual World
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Data Security.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Protecting Your Computer & Your Information
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Web Security Tips Li-Chiou Chen & Mary Long Pace University September 1 st, 2010.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Microsoft ® Office ® 2010 Office 2010 Security: Protecting your files.
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Internet safety By Suman Nazir
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Online Job Applications Workshop Coordinators Sharon Feeney – Andrea Reynolds –
The Information School of the University of Washington Information System Design Info-440 Autumn 2002 Session #20.
Done by… Hanoof Al-Khaldi Information Assurance
Scott Ruoti. †, Tyler Monson. , Justin Wu. , Daniel Zappala
links and attachments: Help stop malware from spreading
IT Security  .
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Spear Phishing Ways to Minimize its Risks
Information Security Session October 24, 2005
Reconnaissance Report Trillium Technologies
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Internet Safety – Social Media
What devices use the internet?
Presentation transcript:

The Importance of Being Earnest [in Security Warnings] Serge Egelman (UC Berkeley) Stuart Schechter (Microsoft Research)

Prologue You’ve Been Warned: An Empirical Study on The Effectiveness of Web Browser Phishing Warnings CHI ‘08, with L. Cranor and J. Hong Controlled experiment to evaluate phishing warnings through the lens of the C-HIP model 2

Communication-Human Information Processing (C-HIP) Model  Do users notice the indicator?  Do users believe the indicator?  Are they motivated to take the recommended actions?  Will they perform those actions?  How do the indicators interact with other stimuli? Wogalter, M Communication-Human Information Processing (C-HIP) Model. In Wogalter, M., ed., Handbook of Warnings. Lawrence Erlbaum Associates,  Do users know what it means?  Do users understand what it wants them to do? 3

Lessons Learned Interrupt the primary task – Force the user to notice and respond Prevent habituation – Serious warnings should not be confused with less serious ones Provide clear choices – If the warning is understood, recommendations are still needed Fail safely – The recommended action should always be obvious or a default Draw trust away from the website – Warnings should not have to compete with a suspicious website – Serious warnings should either distort or not show the website 4

Impact: Changes were afoot! 5

VALIDATION 6

…so we tested it Does option text matter? Does red background matter? Laboratory study – Eye tracking – 45 participants – 3 conditions 7

8

Method Recruited Hotmail users to visit Microsoft for a usability study of Hotmail We paid them to read/interact with …deletion counted as an interaction We sent a phishing message towards the end that attempted to steal their actual Hotmail credentials, triggering a warning 9

Results Interaction between background and options – More time viewing the warning (Χ 2 =7.83, p<0.020) Attributed to Control vs. Search (p<0.010, d=0.98) – Recognition (Φ=0.497, p<0.001) Control: 53% Home: 33% Search: 20% So why were they still phished? ConditionPhishedTotal Time Control512.0s Home317.8s Search431.0s 10

It all comes down to risk Only 24% understood the consequences – Everyone else mentioned generic threats Malware, spam, spyware, etc. “this is not my computer” “ I was not using my personal computer so I didn't care if this one got infected” Misunderstanding of threat model – 10 of 12 phished said website looked legit Two weren’t sure, but submitted info anyway 11

12

13

Bounded rationality What did you believe the warning suggested? 11 of 12 “victims” said to “leave the website” 10 of 12 said website “looked legitimate” 9 of 10 who clicked more information were not victims 14

Moral hazard Only 14 (31% of 45) understood that the threat was to their personal information… … everyone else mentioned threats to computer: “I could potentially get a virus or spyware” “Getting a virus running on your computer” “Will get some spyware” Rational behavior, if these threats were correct! 15

Conclusion The warnings failed to motivate participants! Bounded rationality Moral hazard Lesson: risks/consequences need to be explicitly stated to motivate users. 16

Epilogue Crying Wolf: An Empirical Study of SSL Warning Effectiveness USENIX Security ’09, with J. Sunshine, H. Almuhimedi, N. Atri, and L. F. Cranor Controlled experiment to validate these observations: concisely stating risks improved SSL warning effectiveness 17

Epilogue 18 Users ignored the warning on sites that were not collecting sensitive information, but obeyed it on sites that were!

Questions? 19