Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Course Overview January.

Slides:



Advertisements
Similar presentations
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Advertisements

1 Secure Interaction Design Kami Vaniea. 2 Overview Designing secure interfaces  Design principles Firefox extensions  Cookies  Phishing  Tracking.
Digital Citizenship L’école élémentaire Beachy Cove Elementary School January 2013.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
1 The End Of The Privacy Policy As We Know It Fran Maier President TRUSTe.
Location Based Social Networking For All Presenter: Danny Swisher.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
CyLab Usable Privacy and Security Laboratory 1 C yLab U sable P rivacy and S ecurity Laboratory Introduction.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 User Studies Motivation January.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Authentication and access control.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Understanding the Human in.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Designing user studies February.
Usable Privacy and Security Course Overview Lorrie Cranor, Jason Hong, Mike Reiter Grad students and juniors and seniors –Tended to be HCI, CS, Public.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
C MU U sable P rivacy and S ecurity Laboratory Making privacy visible Lorrie Faith Cranor October 19, 2007.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Design for Privacy February.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Course Overview January 16, 2007.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
How It Applies In A Virtual World
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy Preferences Edgardo Vega Usable Security – CS 6204 – Fall, 2009 – Dennis.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet safety By Lydia Snowden.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
What is Skype and how do you use it? Before we start, it is a REQUIREMENT of this lesson to have a valid address. If you don’t have one, please.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CSSE 492 Advanced Computer Networks Dr. Yingwu Zhu Spring 2008.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 Authentication and access control overview. 2 Outline Definitions Authentication Factors Evaluation Examples  Focus on password problems and alternatives.
Staying Safe Online Keep your Information Secure.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 P3P I Week 6 - October.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February 2002
Welcome to CS 101! Introduction to Computers Spring 2015 This slide is based on Dr. Keen slides for CS101 day sections, with some modifications.
Use of a P3P User Agent by Early Adopters Lorrie Faith Cranor Manjula Arjula Praven Guduru AT&T Labs November 2002.
Information Assurance Policy Tim Shimeall
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
Basic Skills Foundation Computing The early bird may get the worm, but the second mouse gets the cheese.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
KTAC Security Task Force Superintendents Update April 23, 2015.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Authentication and access control.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Usable Privacy and Security.
ION Structure Learning Exchange Campus Management Solutions Communities – Vertical approach- E.g. House, PTA, Bus, Mind spark communities Courses – Horizontal.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Computer Security Keeping you and your computer safe in the digital world.
Privacy and Security Challenge Just Browsing Keep out - Private! Pushing IT You sound like a broken record Legal Beagles
IT Security Awareness Day October 19, 2016
Visualizing Privacy I March 7, 2006.
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February
Things To Avoid: 1-Never your password to anyone.
STOP. THINK. CONNECT. Online Safety Quiz.
Information Technology Services Education and Awareness Team
Security and Usability
Tom Chothia Computer Security
Connecting Remotely Winter 2014.
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Course Overview January 16, 2007.
Internet Safety – Social Media
Presentation transcript:

Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 1 Course Overview January 17, 2006

Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 2 Outline Introduction to usable privacy and security Review syllabus and course policies Distribute survey Faculty research overview Introduce students

3 Unusable security & privacy -Unpatched Windows machines compromised in minutes -Phishing web sites increasing by 28% each month -Most PCs infected with spyware (avg. = 25) -Users have more passwords than they can remember and practice poor password security -Enterprises store confidential information on laptops and mobile devices that are frequently lost or stolen

4 Grand Challenge “Give end-users security controls they can understand and privacy they can control for the dynamic, pervasive computing environments of the future.” - Computing Research Association 2003

Just work

6 security/privacy researchers and system developers human computer interaction researchers and usability professionals

7 Symposium On Usable Privacy and Security (SOUPS) July 6-8, 2005 Pittsburgh, PA USA Mark your calendar for SOUPS July at CMU

8 A preview of some topics we’ll cover in this course 1.Problems and approaches 2.Passwords 3.Symbols & metaphors 4.Rethinking cookies 5.Making Web privacy visible

Problems and approaches 1.

10 How do you stay safe online?

Experts recommend…

12 POP!

13 After installing all that security and privacy software

14 Do you have any time left to get any work done?

Secondary tasks

16 Approaches to usable security -Make it “just work” -Invisible security -Make security/privacy understandable -Make it visible -Make it intuitive -Use metaphors that users can relate to -Train the user

17 Make decisions -Developers should not expect users to make decisions they themselves can’t make

Present choices, not dilemmas - Chris Nodder (in charge of user experience for XP SP2)

19

20

Passwords 2.

22 Typical advice -Pick a hard to guess password -Don’t use it anywhere else -Change it often -Don’t write it down

What do users do when every web site wants a password?

24 Bank = b3aYZ Amazon = aa66x! Phonebill = p$2$ta1

25

Symbols & Metaphors 3.

27 Netscape SSL icons Cookie flag IE6 cookie flag Firefox SSL icon

28 Privacy Bird icons Privacy policy matches user’s privacy preferences Privacy policy does not match user’s privacy preferences

Rethinking cookies 4.

30

31

Making Web privacy visible 5.

33 Web site privacy policies -Many posted -Few read

What if your browser could read privacy policies for you?

35 Platform for Privacy Preferences (P3P) W3C Recommendation -XML format for Web privacy policies -Protocol enables clients to locate and fetch policies from servers

36 Privacy Bird -P3P user agent -Free download -Compares user preferences with P3P policies

Chirping bird is privacy indicator

Red bird indicates mismatch

Privacy settings

Example: Sending flowers

43 Wireless privacy -Many users unaware that communications over wireless computer networks are not private

Wall of sheep

Photo credit: techfreakz.org Defcon 2001

Photo credit: Defcon 2004

47 Peripheral display -Help users form more accurate expectations of privacy -Without making the problem worse

48

49 Experimental trial -11 subjects in student workspace -Data collected by survey and traffic analysis -Did they refine their expectations of privacy?

50 Results -No change in behavior -Peripheral display raised privacy awareness in student workspace -But they didn’t really get it

51 Privacy awareness increased “I feel like my information /activity / privacy are not being protected …. seems like someone can monitor or get my information from my computer, or even publish them.”

52 But only while the display was on “Now that words [projected on the wall] are gone, I'll go back to the same.”

53 Questions to ask about a security or privacy cue - Do users notice it? -Do they know what it means? -Do they know what they are supposed to do when they see it? -Will they actually do it? -Will they keep doing it?

Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 54 Syllabus Homework (25%) Lecture (25%) Project (50%) Textbook and readings Schedule

Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 55 Survey Please fill out course survey and bring it with you to class on Thursday

Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 56 Faculty research overview Lorrie Cranor Michael Reiter Jason Hong

Usable Privacy and Security Carnegie Mellon University Spring 2006 Cranor/Hong/Reiter 57 Student introductions Introduce yourself to your neighbor and tell them your background. Tell them why you’re taking the course and what you want to get out of the course Form a group of ~4 and repeat Form a group of ~8 and repeat Pick someone to stand up in front of the class, introduce your group members, and summarize the reasons people in your group are taking the course and what you want to get out of the course