05-899/17-500 Usable Privacy and Security Colleen Koranda February 7, 2006 Usable Privacy and Security I.

Slides:



Advertisements
Similar presentations
Scenarios for applying crosscutting concerns. Aspects should be visible throughout the full lifecycle of a software product. While most AOP-efforts currently.
Advertisements

Note: Lists provided by the Conference Board of Canada
Stepping StonesStepping Stones Programme Stepping Stones Stepping Stones Programme Next Step The Requirements Sylvia Tevlin Human Resources Manager.
New Supervisor: Skills for Success
Applying Psychology to Teaching
Student Academic Success Center Power Over Procrastination
Chapter 12 Getting Them to Talk. Creating Good Questions  Lower-level Questions Know Require children to recognize or understand basic concepts or facts.
Chapter 10 Schedule Your Schedule. Copyright 2004 by Pearson Education, Inc. Identifying And Scheduling Tasks The schedule from the Software Development.
Small Group Teaching. Outline Pros and Cons of SGT Pros and Cons of SGT learning environment in SGT learning environment in SGT skill involved in SGT.
Effective Communication of Cyber Security Risks: Addressing the Human Element in Security Jason R.C. Nurse (PhD, MSc, BSc) Cyber Security Centre, Department.
EFFECTIVE DELEGATION AND SUPERVISION
VM: Chapter 5 Guiding Principles for Software Security.
THE PROCESS OF INTERACTION DESIGN
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
Part 2c: Requirements Chapter 2: How to Gather Requirements: Some Techniques to Use Chapter 3: Finding Out about the Users and the Domain Chapter 4: Finding.
Users Are Not The Enemy A. Adams and M. A. Sasse Presenter: Jonathan McCune Security Reading Group February 6, 2004.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
Behaviorism Ed Tech Masters Program Summer What is behaviorism all about? Psychology is purely the study of external behavior Behavior is objective.
User-Centered Design Good design The user says “Yes, I see” or “Of course”. A simple explanation is sufficient. Bad design The user says “How am I going.
Meaningful Learning in an Information Age
Authentication for Humans Rachna Dhamija SIMS, UC Berkeley DIMACS Workshop on Usable Privacy and Security Software July 7, 2004.
Transactional & Transformational Leadership
Executive Dashboard Systems Secure CITI Adam Zagorecki April 30, 2004.
The University of California Strengthening Business Practices: The Language of Our Control Environment Dan Sampson Assistant Vice President Financial Services.
Teamwork Dr.Ihab Nada, DOE. MSKMC.
Coaching and Providing Feedback for Improved Performance
SESSION ONE PERFORMANCE MANAGEMENT & APPRAISALS.
Motivation II: Equity, Expectancy, and Goal Setting Chapter Seven.
Chapter #2: Motor Learning for Effective Coaching and Performance
References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken.
CSCD 487/587 Human Computer Interface Winter 2013 Lecture 3 HCI and Interactive Design.
Security & Usability Charles Frank. Convenience is the Antithesis to Security  Computer systems must employ mechanisms that are difficult to use!
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Evidence-Based Management Leading an EBMgt Culture Change Denise M. Rousseau H.J. Heinz II University Professor of Organizational Behavior Carnegie Mellon.
Managing Information System Security: Principles GP Dhillon Associate Professor Virginia Commonwealth University.
Cluster Management Scorecard FITT (Fostering Interregional Exchange in ICT Technology Transfer)
Social Psychology Chapter 16 Groups  What is a group? Two or more individuals Who interact with one another Are interdependent upon one another Aware.
Learning and Motivation Dr. K. A. Korb University of Jos.
Training & Development is a continuous process in an organization to achieve its organizational goals by improving the skills and knowledge of the employees.
1 Technical & Business Writing (ENG-715) Muhammad Bilal Bashir UIIT, Rawalpindi.
Mitch Parks, GSEC/GCWN ITS Desktop Security Analyst
User Friendly Passwords Nicole Longworth Michael Shoppell RJ Brown.
Management Practices Lecture 27.
Click the mouse button or press the space bar to display information. 1.Discuss ways parents and guardians teach family values. What You’ll Learn 2.Identify.
Session Objectives Analyze the key components and process of PBL Evaluate the potential benefits and limitations of using PBL Prepare a draft plan for.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Student Experience It’s your education Type the web site address into the browser given to you by your junior high or high school Select “I am a student”
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Downloaded from TEACHING “ ADM ” Produced by Larry Prentiss Safety Program Manager Dallas Flight Standards District Office James B. Brownfield,
Chapter 9* Managing Meetings. Chapter 10/Managing Meetings Hilgert & Leonard © Explain why meetings, committees, and being able to lead meetings.
STRATEGIES TO ENGAGE STUDENTS BELIZE LITERACY PROGRAM SUMMER 2011.
Writing to Teach - Tutorials Chapter 2. Writing to Teach - Tutorials The purpose of a tutorial is to accommodate information to the needs of the user.
Your Character in Action
Building Academic Language Sesson 2 10/29/15. Where have we been? On 10/1 we looked at: Data on an academic language gap Tiered Vocabulary Role of student.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
©2003 Prentice Hall, Inc.To accompany A Framework for Marketing Management, 2 nd Edition Slide 0 in Chapter 17 Chapter 17 Managing the Sales Force PowerPoint.
Strategic Control and Corporate Governance Chapter Nine McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Traditional Sales Training Just Doesn’t Work—So What’s the Answer? August 21, 2007 Presented by Jim Messina Vice President of Sales Maritz Learning.
KUMUTHA RAMAN P62352 Successful English Language Learning Inventory (SELL-In)
Understanding Security Policies Lesson 3. Objectives.
Activity Design Goal: work from problems and opportunities of problem domain to envision new activities.
EFFECTIVE DELEGATION AND SUPERVISION
Motivation A key to company success. Two cases what would you do (in teams) Case 1: Bread factory. Physical labor. Hot. Paying employees minimum wage.
Self-Awareness LET I. Natural Tendencies Everyone has preferences. How these are developed in each of us is a complex combination of things. Whether you.
Unit 4 Working With Communities
IS4680 Security Auditing for Compliance
Unit 5 Working With Communities
Making Information Security Manageable with GRC
How to Mitigate the Consequences What are the Countermeasures?
Anna Adams Martina Angela Sasse
Presentation transcript:

05-899/ Usable Privacy and Security Colleen Koranda February 7, 2006 Usable Privacy and Security I

KorandaCarnegie Mellon University2  Chapter 1: Psychological Acceptability Revisited  Chapter 2: The Case for Usable Security  Chapter 3: Design for Usability  Chapter 32: Users are not the Enemy Usable Privacy and Security I

KorandaCarnegie Mellon University3 Usable Security  The user side…  A secure system has to be complicated and complex; thus, difficult to use  The Need to Know Principle  The more that is known about security the easier it is to attack  Users know little about security  Lack of knowledge makes it less secure  Humans are the weakest link in the security chain  Hackers pay attention to human element in security to exploit it

KorandaCarnegie Mellon University4 Usable Security  Why are security products ineffective?  Users do not understand the importance of data, software, and systems  Users do not see that assets are at risk  Users do not understand that their behavior is at risk

KorandaCarnegie Mellon University5 Usable Security  Why are security products ineffective?  Users do not understand the importance of data, software, and systems  Users do not see that assets are at risk  Users do not understand that their behavior is at risk

KorandaCarnegie Mellon University6 Approach #1  Educate the user  Today’s educational topic: passwords

KorandaCarnegie Mellon University7 What makes a Good Password?

KorandaCarnegie Mellon University8 Suggestions for Creating Passwords  Interject random characters within a word  confine = cOn&fiNe  Deliberately misspell a word  helium = healeum  Make an acronym  I’ve fallen, and I can’t get up = If,alcgu  Use numbers and sounds of letters to make words  I am the one for you = imd14u  Combine letters from multiple words  Laser and implosion = liamspel

KorandaCarnegie Mellon University9

KorandaCarnegie Mellon University10

KorandaCarnegie Mellon University11 How Long does it take to Crack a Password?  Brute force attack  Assuming 100,000 encryption operations per second  FIPS Password Usage  Passwords shall have maximum lifetime of 1 year Password Length

KorandaCarnegie Mellon University12 Education Results  Educating users does not automatically mean they will change their behavior  Why?  users do not believe they are at risk  users do not think they will be accountable for not following security regulations  security mechanisms can conflict with social norms  security behavior conflicts with self-image

KorandaCarnegie Mellon University13 Motivation  Users are motivated if care about what is being protected -and-  Users understand how their behavior can put assets at risk

KorandaCarnegie Mellon University14 Motivation  How can motivation be accomplished?  Security should not be a ‘firefighting’ response  Organizations must become active in security  Approach #2 – Design a Usable System

KorandaCarnegie Mellon University15 Design a Usable System  User centered design is critical in system security  Password mechanisms should be compatible with work practices  Change regime and spiraling effect:  I cannot remember my password. I have to write it down. Everyone knows it’s on a Post-it in my drawer, so I might as well stick it on the screen and tell everyone who wants to know  Passwords that are memorable are not secure

KorandaCarnegie Mellon University16 How to Design a Usable & Secure System?  Current problem  Lack of communication between users and security departments  Solution  Product: actual security mechanisms  Process: how decisions are made  Panorama: the context of security

KorandaCarnegie Mellon University17 Product  Password Considerations  Meaning increases memorability  Are often less secure  How do you make a password easy to remember but hard to guess?  Passwords that change over time  Can decrease memorability  Can increase security?  System generated passwords  Can be more inherently secure  Are less memorable  Passwords are often used infrequently  How can they be remembered?

KorandaCarnegie Mellon University18 Process  Security tasks must be designed to support production tasks  AEGIS process  gathering participants  identifying assets  modeling assets in context of operation  security requirements on assets  risk analysis  designing security of the system  Benefits of involving stakeholders  increased awareness of security  security aspects become much more accessible and personal  provide a simple model through security properties of the system

KorandaCarnegie Mellon University19 Panorama  Security tasks must take into account the environment  Education  Teaching concepts and skills  Training  Change behavior through drills, monitoring, feedback, reinforcement  Focus should be on correct usage of security mechanisms  Should encompass all staff, not only those with immediate access to systems deemed at risk  Attitudes  Role models

KorandaCarnegie Mellon University20 Activity  Groups will explore how to solve a problem related to passwords with a given scenario  The goal is to make suggestions for a secure system that users will comply with  Simply saying ‘educate and train users’ is not enough to make a convincing argument  Weigh the pros and cons of decisions you make  Refer to the design checklist (p42)

KorandaCarnegie Mellon University21 Summary  Users need to be informed about security issues  Majority of users are security conscious if they see the need for the behavior  The key to all security efforts is a balance between security and usability

KorandaCarnegie Mellon University22 Bibliography  Security and Usability  Chapter 1: Psychological Acceptability Revisited  Chapter 2: The Case for Usable Security  Chapter 3: Design for Usability  Chapter 32: Users are not the Enemy      