Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (http://cups.cs.cmu.edu/course-guide/)

Slides:



Advertisements
Similar presentations
Design, prototyping and construction
Advertisements

November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #12-1 Chapter 12: Design Principles Overview Principles –Least Privilege –Fail-Safe.
User Interface Structure Design
2-May-15 GUI Design. 2 HMI design There are entire college courses taught on HMI (Human-Machine Interface) design This is just a very brief presentation.
IS214 Recap. IS214 Understanding Users and Their Work –User and task analysis –Ethnographic methods –Site visits: observation, interviews –Contextual.
1 Design Principles CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 13, 2004.
Ch 11 Cognitive Walkthroughs and Heuristic Evaluation Yonglei Tao School of Computing and Info Systems GVSU.
Part 2c: Requirements Chapter 2: How to Gather Requirements: Some Techniques to Use Chapter 3: Finding Out about the Users and the Domain Chapter 4: Finding.
Human Computer Interface. HCI and Designing the User Interface The user interface is a critical part of an information system -- it is what the users.
James Tam User Centered Design Why User Centered Design is important Approaches to User Centered Design.
Part 4: Evaluation Days 25, 27, 29, 31 Chapter 20: Why evaluate? Chapter 21: Deciding on what to evaluate: the strategy Chapter 22: Planning who, what,
Heuristic Evaluation. Sources for today’s lecture: Professor James Landay: stic-evaluation/heuristic-evaluation.ppt.
Design Principles Overview Principles Least Privilege Fail-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least.
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
Designing for security and privacy. Agenda Tests Tests Project questions? Project questions? Design lecture Design lecture Assignments Assignments.
Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Course Overview January.
Today’s class Group Presentation More about principles, guidelines, style guides and standards In-class exercises More about usability Norman’s model of.
Heuristic Evaluation Evaluating with experts. Discount Evaluation Techniques  Basis: Observing users can be time- consuming and expensive Try to predict.
Nine principles of design Simple and natural dialog Speak the user’s language Minimize user’s memory load Be consistent Provide feedback Provide clearly.
Evaluating with experts
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Principles and Methods
Usability and Evaluation Dov Te’eni. Figure ‎ 7-2: Attitudes, use, performance and satisfaction AttitudesUsePerformance Satisfaction Perceived usability.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Course Overview January 16, 2007.
1 User Interface Design CIS 375 Bruce R. Maxim UM-Dearborn.
User Interface Evaluation CIS 376 Bruce R. Maxim UM-Dearborn.
Design, goal of design, design process in SE context, Process of design – Quality guidelines and attributes Evolution of software design process – Procedural,
User Interface Design Chapter 11. Objectives  Understand several fundamental user interface (UI) design principles.  Understand the process of UI design.
1 SKODA-AUTO.CZ prototype evaluation Poznań, 23th of March 2015.
Heuristic evaluation IS 403: User Interface Design Shaun Kane.
1 ISE 412 Human-Computer Interaction Design process Task and User Characteristics Guidelines Evaluation.
1 Usability evaluation and testing User interfaces Jaana Holvikivi Metropolia.
Usability Studies Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech.
1 Human-Computer Interaction  Design process  Task and User Characteristics  Guidelines  Evaluation.
1 The Web & Professional Communication English 3104.
Usability Evaluation/LP Usability: how to judge it.
Multimedia Specification Design and Production 2012 / Semester 1 / week 5 Lecturer: Dr. Nikos Gazepidis
SEG3120 User Interfaces Design and Implementation
PowerPoint Presentation for Dennis, Wixom, & Tegarden Systems Analysis and Design with UML, 3rd Edition Copyright © 2009 John Wiley & Sons, Inc. All rights.
Performance-based Documentation Malcolm Graham ESN S954, Lab 3, CAR (043/33/H02)
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Evaluating a UI Design Expert inspection methods Cognitive Walkthrough
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Heuristic Evaluation Short tutorial to heuristic evaluation
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Usable Privacy and Security.
Fall 2008CS 334: Computer SecuritySlide #1 Design Principles Thanks to Matt Bishop.
Human-Computer Interaction Design process Task and User Characteristics Guidelines Evaluation ISE
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
1 Usability evaluation and testing User interfaces Jaana Holvikivi Metropolia.
Basic Elements.  Design is the process of collecting ideas, and aesthetically arranging and implementing them, guided by certain principles for a specific.
The Design Process A bluffer’s guide to interface design A ‘proper’ Design process.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
1 Chapter 12: Design Principles Overview –There are principles for many kinds of design Generally, a design should consider: Balance, Rhythm, Proportion,
June 1, 2004© Matt Bishop [Changed by Hamid R. Shahriari] Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Slide #13-1 Design Principles CS461/ECE422 Computer Security I Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and.
1 Saltzer [1974] and later Saltzer and Schroeder [1975] list the following principles of the design of secure protection systems, which are still valid:
1 Design Principles CS461 / ECE422 Spring Overview Simplicity  Less to go wrong  Fewer possible inconsistencies  Easy to understand Restriction.
Ten Usability Heuristics These are ten general principles for user interface design. They are called "heuristics" because they are more in the nature of.
Asking Users and Experts Li Zhang (Jacey) Yuewei Zhou (Joanna)
Human Computer Interaction Lecture 15 Usability Evaluation
Security and Usability
Copyright Catherine M. Burns
Usability Testing: An Overview
Unit 14 Website Design HND in Computing and Systems Development
Usability Techniques Lecture 13.
One-timer?. A new face of the technical communicator – UX is our strength – we design to write.
Course Overview January 16, 2007.
Design Principles Thanks to Matt Bishop 2006 CS 395: Computer Security.
Presentation transcript:

Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (

Principles of Designing Secure Systems 1. Least privilege 2. Fail-safe defaults 3. Economy of mechanism 4. Complete mediation 5. Open Design 6. Separation of privilege 7. Least common mechanism 8. Psychological Acceptability 9. Defense in depth 10. Question assumptions

Principles of Designing Secure Systems 1. Least privilege 2. Fail-safe defaults 3. Economy of mechanism 4. Complete mediation 5. Open Design 6. Separation of privilege 7. Least common mechanism 8. Psychological Acceptability 9. Defense in depth 10. Question assumptions Psychological Acceptability  Hide complexity introduced by security mechanisms  Ease of installation, configuration, use  Human factors critical here

Usable Security "A computer is secure if you can depend on it and its software to behave as you expect." – Garfinkel & Spafford Humans are often the weak link in the security chain.

POP!

A Key Usable Security Problem Security is a secondary task  Nobody buys a computer so they can spend time securing it.  Time we spend configuring security and privacy tools is time we are not spending doing what we really want to be doing with our computers

Other Key Usability Problems Security systems and solutions are often complex  If the user cannot understand it, costly errors will occur Diverse users with diverse skills and diverse knowledge need to incorporate security in their daily lives

Grand Challenge “Give end-users security controls they can understand and privacy they can control for the dynamic, pervasive computing environments of the future.” - Computing Research Association 2003

Approaches to usable security Make it “just work”  Invisible security Make security/privacy understandable  Make it visible  Make it intuitive  Use metaphors that users can relate to Train the user

Help Users Make Decisions Developers should not expect users to make decisions they themselves can’t make Present choices, not dilemmas

Users Don’t Check Certificates

Making concepts understandable

Making security and privacy visible Users could better manage online privacy and security if cues were more visible Cues must be understandable

Netscape SSL icons Cookie flag IE6 cookie flag Firefox SSL icon Symbols & Metaphors

Privacy policy matches user’s privacy preferences Privacy policy does not match user’s privacy preferences Privacy Bird Icons Web site privacy policies Many posted, few read

How do we know if a security or privacy cue is usable? Evaluate it  Why is it there?  Do users notice it?  Do they know what it means?  Do they know what they are supposed to do when they see it?  Will they actually do it?  Will they keep doing it?

Designing and Developing Usable and Secure Systems Requirements gathering Iterative design and development process Prototype evaluation Design walkthroughs Heuristic evaluation Usability tests  Lab or field studies

Heuristic Evaluations Discount usability technique Experts adopt the role of target users Review the prototype and identify issues  Complete core scenarios developed from requirements gathering  Identify usability issues through the application of design guidelines

General Usability Heuristics Heuristics as guidelines  Simple and natural dialogue  Speak the users' language  Minimize user memory load  Be consistent  Provide feedback  Provide clearly marked exits  Provide shortcuts  Deal with errors in positive and helpful manner  Provide help and documentation

Specialized Usability Heuristics Several specialized guidelines may apply  Web:

Principles for Secure Systems (2002) Path of Least Resistance  Match the most comfortable way to do tasks with the least granting of authority. Active Authorization  Grant authority to others in accordance with user actions indicating consent. Revocability  Offer the user ways to reduce others' authority to access the user's resources. Visibility  Maintain accurate awareness of others' authority as relevant to user decisions. Self-Awareness  Maintain accurate awareness of the user's own authority to access resources. Trusted Path  Protect the user's channels to agents that manipulate authority on the user's behalf. Expressiveness  Enable the user to express safe security policies in terms that fit the user's task. Relevant Boundaries  Draw distinctions among objects and actions along boundaries relevant to the task. Identifiability  Present objects and actions using distinguishable, truthful appearances. Foresight  Indicate clearly the consequences of decisions that the user is expected to make.

Guidelines for Security Interfaces (2007) Users should:  Be reliably made aware of the security tasks they must perform  Be able to figure out how to successfully perform those tasks  Not make dangerous errors  Be sufficiently comfortable with the interface to continue using it  Be able to tell when their task has been completed  Have sufficient feedback to accurately determine the current state of the system