References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Operating System Security
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Making Security Work M. Angela Sasse Dept of Computer Science University College London
1 Secure Interaction Design Kami Vaniea. 2 Overview Designing secure interfaces  Design principles Firefox extensions  Cookies  Phishing  Tracking.
Users Are Not Dependable How to make security indicators that protect them better Min Wu, Simson Garfinkel, Robert Miller MIT Computer Science and Artificial.
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Policies.
Information Security Policies and Standards
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
05-899/ Usable Privacy and Security Colleen Koranda February 7, 2006 Usable Privacy and Security I.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Lecture 2a: Foundations of human-computer interaction CSCI102 - Introduction to Information Technology B ITCS905 - Fundamentals of Information Technology.
1 Overview of User-Centred Design John T Burns School of Computing (chapter 1: McCracken and Wolfe – User Centred Web Development)
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
The University of California Strengthening Business Practices: The Language of Our Control Environment Dan Sampson Assistant Vice President Financial Services.
INTRODUCTION. Concepts HCI, CHI Usability User-centered Design (UCD) An approach to design (software, Web, other) that involves the user Interaction Design.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Joy Hamerman Matsumoto.  St Jude Medical Cardiac Rhythm Management Division manufactures implantable cardiac devices ◦ Pacemakers ◦ Implanted defibrillators.
Human Interface Engineering1 Main Title, 60 pt., U/L case LS=.8 lines Introduction to Human Interface Engineering NTU Seminar Amy Ma HIE Global Director.
People: Usability IS 101Y/CMSC 101Y November 5, 2013 Marie desJardins Amanda Mancuso University of Maryland Baltimore County.
1 Interface Design Easy to use? Easy to understand? Easy to learn?
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Principles of User Centred Design Howell Istance.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
What does “secure” mean? Protecting Valuables
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
CLIENT SERVER VS PEER TO PEER Networks. Lesson objectives Candidates should understand the advantages and disadvantages of: client server networks peer.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
User-Centered Development Methodology A user interface comprises “ those aspects of the system that the user comes in contact with.” ● Moran [1981]
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security & Usability Charles Frank. Convenience is the Antithesis to Security  Computer systems must employ mechanisms that are difficult to use!
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Event Management & ITIL V3
Biometrics and Usability March 21, 2008 Poor Usability: The Inherent Insider Threat Information Access Division Visualization and Usability Group Mary.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Heuristic evaluation Functionality: Visual Design: Efficiency:
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
CSE 219 Computer Science III Program Design Principles.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
In Search of Usable Security: Five Lessons from the Field Presentation by 王志誠.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Professional Ethics and Responsibilities
 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
2016 Cybersecurity Law If any one of these describes your company
PowerPoint® Slides to Accompany
Staying Austin College
Drew Hunt Network Security Analyst Valley Medical Center
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Introduction to the PACS Security
Anna Adams Martina Angela Sasse
Presentation transcript:

References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken & Wolfe, User Centered Website Development: a Human-Computer Interaction Approach, Prentice Hall.  Theofanos & Pfleeger, “Shouldn’t All Security be Usable”, IEEE Security & Privacy

People  People are the “weakest link in the chain” of system security.  Even a very usable security mechanism is likely to create extra work from the users’ point of view. It is human nature to look for shortcuts and workarounds, especially when they do not understand why their behavior compromises security.

Usability and Security  Usability and security are often seen as competing design goals.  Security mechanisms have to be usable to be effective.  Mechanisms that are not employed in practice or that are used incorrectly, provide little or no protection.

Human Computer Interaction  Many website, applications, and devices have complicated and confusing interfaces.  HCI goal is to improve usability.

Why HCI?  Competitive advantage.  Reduce maintenance cost.  Improve productivity.  Reduce support cost.

How?  User-centered design methodology.  User testing early and often.  Interdisciplinary  Psychology  Graphic Design  Technical Writing

Highly Iterative DESIGN PROTOTYPE EVALUATE READY TO IMPLEMENT MEET USER SPECIFICATIONS? NO YES

User Analysis  Type of users  Users are probably not like us. Not computer professionals.  Design the product with user in mind.  Determine who the users are may not be a trivial task.  Understand user goals  Design the product the user wants and will use.

Organization  Content Organization  User terminology  How users group information  Visual Organization  Proximity  Alignment  Consistency  Contrast

Organization  Navigation  How can users effectively find what they need or do their task.

User Testing  High fidelity  Low fidelity  Computer prototype  Paper prototype  Paper Prototyping: A How-To Video

User Testing with prototype  Give the user a task  Have them think out loud  Do not coach  Record whether the user was successful or got confuse  Redesign prototype and test on other users.

Usable Security  Do user testing of security mechanisms.  Look at the usability of security messages.  Incorporate usable design principles into security mechanisms.

Problem #5  Incorporating usability and security into the software design process.

Software Development  Often and security and usability are added at the end of the software development process.

Human Problem  Current security mechanisms are too complex for many users.  Users may not behave in a way for the security mechanisms to be effective.  Example:  Medical staff remained logged in throughout the day. Circumventing security controls allows efficient patient care.

Usability Design Goal  Reduce the mental workload to make a security decision.  Is this easier said than done?  Example:  Password policies  Long passwords  More complex passwords  Change passwords frequently

Mental Workload  We do not recall our passwords 100% of the time. We mistype our passwords.  Given a large number of attempts, most users log in successfully.  When the number of allowed attempts was increased from 3 to 9, the percentage of successful logins was increased from 53% t0 93%.

Awkward Behaviors  Policy  “User should lock their computers screens when they are away from their desks.”  Many users in shared offices do not comply with this policy.  Why?  Will my colleagues think that I do not trust them?  Most users prefer to have a trusting relationship with their colleagues.

Handheld fingerprint ID Device for Law Enforcement  Shouldn’t All Security Be Usable – page 12

Social Behavior  People that follow security policies to the letter are described as “paranoid” and “anal” by their peers.  If secure systems require users to behave in a manner that conflicts with their norms, values, or self-image, most users will not comply.  Where a positive culture is in place, compliance can be a shared value and a source of pride.

Users and security  Do users have to be security experts to use systems securely?  Users must believe that their assets are under threat and that the security mechanism provides effective protection against the threat.

Security is too challenging  Security makes unreasonable demands on users, system administrators and developers.  Users cannot always tell legitimate from phishing.  Security devices are difficult for system administrators to configure.  Building secure applications is difficult for developers

Problem #6  Fraud Hides Behind Friendly Face Fraud Hides Behind Friendly Face

Status of Security Today  The security perimeter has expanded  Mobile workforce  Laptops  Smart phones  We cannot depend upon technology to protect us  Firewalls & IPS are limited  Hackers are attacking users rather than network vulnerabilities

Users’ Goals  Security is not the primary goal of users.  Security must be designed to support production tasks.  Security regulations should not interfere with getting your job done.

Mental Models for Security  Psychological acceptability relies on mental models for computer constructs, such as a computer “file system” with files stored in folders.  We need similar effective mental models for the user perception of security, trust, and risk.

Complexity and Usability  As the security mechanisms grow more complex, they become harder to configure, to manage, to maintain, and to implement correctly.  Complexity has the greatest potential to weaken not only usability but also security.

Empowering the user  We need to make it easier for the user to do the right thing, hard to do the wrong thing, and easy to recover when the wrong thing happens anyway.

Problem #7  Netcraft Anti-Phishing Toolbar 

Security Messages  us/library/ms aspx us/library/ms aspx

Problem #8  Error messages