Kevin Killourhy Visualization & Usability Group Information Access Division Information Technology Laboratory Usability Research in Support Of Cyber-Security:

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Overview of Nursing Informatics
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
The Nature of Managerial Decision Making
Legal Duties to LEP Health and Social Services Clients Jill Moore Institute of Government December 2004.
Introduction to Structured Query Language (SQL)
Chapter 2: Algorithm Discovery and Design
Principles of High Quality Assessment
Programming Logic and Design, Introductory, Fourth Edition1 Understanding Computer Components and Operations (continued) A program must be free of syntax.
Copyright © Cengage Learning. All rights reserved. CHAPTER 11 ANALYSIS OF ALGORITHM EFFICIENCY ANALYSIS OF ALGORITHM EFFICIENCY.
Chapter 2: Algorithm Discovery and Design
Chapter 2: Algorithm Discovery and Design
Harnessing the Power of Microdata Standards, tools and best practices for microdata dissemination and management International Household Survey Network.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
SPECA Regional Workshop on Disability Statistics: Dec 13-15, 2006 Purposes of Disability Statistics Jennifer Madans and Barbara Altman National Center.
Microsoft Visual Basic 2012 CHAPTER ONE Introduction to Visual Basic 2012 Programming.
SESSION ONE PERFORMANCE MANAGEMENT & APPRAISALS.
(Terminology Summer School) TSS. Term Net Inforterm TSS Terminology Management Terminology.
Mary Theofanos Visualization & Usability Group Information Access Division Information Technology Laboratory Usability Research in Support Of Cyber-Security.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 13 Database Management Systems: Getting Data Together.
CIS 450 – Network Security Chapter 8 – Password Security.
Implementing and Auditing Ethics Programs
Chapter 2: Algorithm Discovery and Design Invitation to Computer Science, C++ Version, Third Edition.
Invitation to Computer Science, Java Version, Second Edition.
User Management: Passwords cs3353. Passwords Policy: “Choose a password you can’t remember and don’t write it down”
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Brute Force Password Cracking and its Role in Penetration Testing Andrew Keener and Uche Iheadindu.
Communication 2 Report Writing.
Database Design Principles – Lecture 3
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Environmental Management System Definitions
Fast Ethernet for Networks def-fastethernet.htm/ Link provided by yuhong Villanova university.
Introduction to Software Testing. Types of Software Testing Unit Testing Strategies – Equivalence Class Testing – Boundary Value Testing – Output Testing.
CSC 395 – Software Engineering Lecture 28: Classical Analysis -or- Do You Really Want to Do That?
Database Design – Lecture 3 Conceptual Database Design.
© 2007 The McGraw-Hill Companies, Inc. All rights reserved. Serving as Designated Leader © 2007 The McGraw-Hill Companies, Inc. All rights reserved. C.
Database Systems Design, Implementation, and Management Coronel | Morris 11e ©2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or.
Mary Theofanos Visualization & Usability Group Information Access Division Information Technology Laboratory PIV Pilot Usability Lessons Learned.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Chapter 09 Business Markets and Buying Behavior Part Four Customer Behavior.
Cmpe 471: Personnel and Legal Issues. Personnel Crime is a human issue not a technological one Hiring On-going management Unauthorised access Redundancy.
Satisfactory Academic Progress (SAP) 1. What we will cover… 2 Changes in Federal Regulations SAP Policy Requirements Maximum Credits/Timeframe SAP Reviews.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
Government-wide Performance Data Standards Discussion Document Performance and Personnel Management Dr. Jim Rolfes Program Director, Federal Performance.
Modernising Statistical Production: Modernising Statistical Production: Main recommendations from global assessments 7 th SPECA PWG on Statistics
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Proposal for the development of an Inter-American Cooperation Network for Migration Special Committee on Migration Issues November 22, 2010.
Introducing Java Chapter 3 Review. Why Program in Java? Java, is an object-oriented programming language. OOP languages evolved out of the need to better.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Chapter 2: Algorithm Discovery and Design Invitation to Computer Science.
Learners Support Publications www. lsp4you.com Database Users and Administrator.
Implementation Science: Finding Common Ground and Perspectives Laura Reichenbach, Evidence Project, Population Council International Conference on Family.
UNDERSTANDING THE FIM Functional Independent Measure Part 4.
Understanding Security Policies Lesson 3. Objectives.
THEMES OF AMERICAN GOVERNMENT
Understanding Security Policies
Promoting Evidence-Based Policymaking by Sharing State Administrative Data Dr. Marty Romitti January 25, 2017.
Business System Development
Department of Health Philippines Short Briefing.
Welcome! To the ETS – Create Client Account & Maintenance
Chapter 3 Organizational Environments and Cultures
Monitoring Satisfactory Academic Progress
Passwords.
Constraint management
Module 2 OBJECTIVE 14: Compare various security mechanisms.
General Date Protection Regulation
Put your agency information here
Research for advocacy.
Stakeholder Engagement: Webinar Part I: The Regulatory Development Process for the Government of Canada Part II: Making Technical Regulations Under.
Presentation transcript:

Kevin Killourhy Visualization & Usability Group Information Access Division Information Technology Laboratory Usability Research in Support Of Cyber-Security: A Password Policy Taxonomy

Comprehensive National Cyber-Security Initiative: Research and Development

Usability Research Goal: To enable policy makers to make better decisions

View of solution space of the security and usability equation Each point (solution) has a security level and a usability level Policy constrains solution space X Trivial usability solution x Trivial security solution x x x Ideally policy will permit the best solution X Optimum acceptable usability/security solution

Password Policy Quiz What are the minimum length and maximum lifetime? Are special characters required? Which special characters are allowed? Is white-space allowed? Are you allowed to write it down? Workplace password policies involve much more than length and lifetime.

Password policies cause confusion Users rarely understand them Users are governed by multiple policies at work, through financial institutions, and for other online activities. The number of policies, ambiguities in them, and discrepancies among them are a cognitive burden. So… Users are forced to choose weak passwords or write them down. Policy violations become routine Password policy security goals are not met 6

What constitutes a special character anyway? Is the following a legal password: password2%(letters, number, and specials) ? password%(letters and specials) ? Password%(upper-case and lower-case letters and specials) ? specials) ? Policy from a Federal Agency: Passwords contain a combination of letters, numbers, and at least one special character Can you follow this policy?

Password specifications as Policies Policies regulate behavior (or they try to). For instance: Users must not store passwords in writing anywhere. Users must create passwords with a character in the set of numbers. Users must not create passwords in the set of dictionary words. But they are not written in clear and unambiguous language. 8

Policies vary dramatically both in length and language

Develop a effective approach for studying password policies. Specifically, develop a password policy language that enables us to (1) evaluate and compare policies, and (2) assess how policy rules affect user behavior and security. Approach: – Develop a taxonomy of policy rules – Collect a corpus of representative policies – Analyze the corpus using its taxonomic structure 10 Goal

Develop a Taxonomy Reduce policies to an unambiguous language: Users must change passwords before 90 days. Users must change passwords immediately if compromised. Users must change passwords immediately if directed by management. Users must change passwords immediately if found non- compliant. Users must change passwords immediately if shared. Users must create passwords with a character in the set of numbers, special characters (unspecified). Users must create passwords with length greater than or equal to 8 characters. Users must not create passwords in the set of passwords to an outside system. Users must not create passwords in the set of strings with a character repeated 5 or more times. Users must not create passwords in the set of their last 2 years of passwords. Users must not create passwords in the set of their last 8 passwords. … Benefits of a formal (EBNF) grammar: Specific statements can be pinpointed for discussion. What is allowed, forbidden, and ambiguous is explicit. Language differences no longer prevent comparisons. (Clarity first)

Benefits of a formal (EBNF) grammar: What is allowed, forbidden, and ambiguous is explicit. Specific statements can be pinpointed for discussion. Language differences no longer prevent comparisons. (Clarity first) 12

Corporate and government policies of primary interest (22) Password-protected general websites policies included (19) 13 Apply Taxonomy to a Corpus

How many different rules? 41 policies 155 unique rules 449 total rules

A visual representation of the corpus

Policy exploration and visualization

Depiction of a password policy NIST

Comparing two policies NISTCensus Users must create passwords with length greater than or equal to 8 characters.

NISTCensus Users should not communicate passwords by local-area network without encryption. Comparing two policies

General statistics: Are any two policies the same? What rules appear frequently? How often are policies ambiguous or contradictory? Broader questions: Which rules constitute best practices? Which rules require user cooperation? What rules affect usability? What rules affect security? How? 21 A tool for password policy analysis

Some preliminary results Are any two policies the same? No (they are like snowflakes). NIST (28) and the Census Bureau (22) share 14. DoC (28) shares 12 with NIST and 8 with Census.

What rules appear frequently? Users must create passwords with length greater than or equal to 8 characters. (23) Users must not communicate passwords to anyone. (15) Users must change passwords immediately if compromised. (10) Users must not create passwords with a substring in the set of dictionary words. (10) 73 rules appear only once. Some preliminary results

How often are policies ambiguous or contradictory? Rules were flagged as ambiguous if they… Concerned special characters without defining them, Concerned “letters” without specifying case, Concerned vague prohibitions on “patterns” 34/41 policies (83%) contain an ambiguous rule. Some preliminary results

A typical policy imposes 8—10 rules on a user. Each policy introduces an average of 1—2 unique rules. Nearly every policy had ill-formed requirements. Users with multiple passwords will not be able to keep all the requirements straight. 25 Basic findings

Next Steps 26 Attach security rationales to rules and regions. Attach usability concerns and experimental results. Translate policies to find disagreement or misinterpretation. Explore current practices and establish best practices. Put policies into plain language. Thank you!