In Search of Usable Security: Five Lessons from the Field Presentation by 王志誠.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #12-1 Chapter 12: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Systems Analysis and Design 9th Edition
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Case Tools Trisha Cummings. Our Definition of CASE  CASE is the use of computer-based support in the software development process.  A CASE tool is a.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
Page16/2/2015 Sirlan Usage and usability considerations for SIRLAN solution success.
1 Design Principles CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 13, 2004.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
Software Reuse Building software from reusable components Objectives
Design Principles Overview Principles Least Privilege Fail-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
The Process of Interaction Design. What is Interaction Design? It is a process: — a goal-directed problem solving activity informed by intended use, target.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Overview of Software Requirements
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
SSL From Your Smartphone Support for Android Smartphones /
Office Deployment – Notes from the Field Richard Smith Solution Architect – Services Client Solutions Microsoft Corporation OSP340.
Why Johnny Can’t Encrypt A Usability Evaluation of GPG 5.0 Presented by Yin Shi.
Windows 2003 and 802.1x Secure Wireless Deployments.
Chapter 1- Introduction
Web Based Applications
Test Organization and Management
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Study of Human factors in Software Engineering CSC 532 Sree Harsha Pothireddy.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Biometrics and Usability June 8, 2009 Usability and Key Management Information Access Division Visualization and Usability Group Mary Theofanos.
References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
SCSC 311 Information Systems: hardware and software.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Lecture 13 Page 1 CS 236 Online Secure Programming CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Prepared By Dr. Ahmet KABARCIK IE 101 – Indutrial Engineering Orientation Information Systems and Technology
Module 5: Configuring Internet Explorer and Supporting Applications.
1 Technical & Business Writing (ENG-715) Muhammad Bilal Bashir UIIT, Rawalpindi.
1 컴퓨터 교육 2 학기 김혜원 Teaching Networking and Operating System to Information Systems Majors D. Robert Adams and Carl Erickson Department of computer Science.
CS223: Software Engineering Lecture 2: Introduction to Software Engineering.
Writing to Teach - Tutorials Chapter 2. Writing to Teach - Tutorials The purpose of a tutorial is to accommodate information to the needs of the user.
Fall 2008CS 334: Computer SecuritySlide #1 Design Principles Thanks to Matt Bishop.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Writing a Science or Engineering Paper: It is just a story Frank Shipman Department of Computer Science Texas A&M University.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
Chapter 1- Introduction Lecture 1. Topics covered  Professional software development  What is meant by software engineering.  Software engineering.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 13 Usability 1.
Text INTERNAL February 11, 2011 Problem Solving. INTERNAL Tech Republic’s railway department wants a solution Tech Republic’s railway department.
Slide #13-1 Design Principles CS461/ECE422 Computer Security I Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and.
1 Design Principles CS461 / ECE422 Spring Overview Simplicity  Less to go wrong  Fewer possible inconsistencies  Easy to understand Restriction.
IBM Software Group © 2008 IBM Corporation Tivoli Provisioning Manager Beta Program Web Replay Intro and Lab September, 2008 Robert Uthe.
Infrastructure Deployment Services Dell Networking Deployment Services.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Virtual Private Networks
CompSci 280 S Introduction to Software Development
Chapter 1 Computer Technology: Your Need to Know
Introduction Characteristics Advantages Limitations
User Interface Design and Usability Course Introduction
Chapter 2 Introduction to Computer User Support
INFS 3500 Martin, Brad, and John
A mobile single sign-on system
Cloud Helps Company Scale to Demand for Growing Healthcare Provider Field MINI-CASE STUDY “Microsoft Azure gives us the opportunity to focus on the task.
CS385T Software Engineering Dr.Doaa Sami
Agenda The current Windows XP and Windows XP Desktop situation
Design Principles Thanks to Matt Bishop 2006 CS 395: Computer Security.
Presentation transcript:

In Search of Usable Security: Five Lessons from the Field Presentation by 王志誠

Outline Introduction Introduction A PKI-based (public key Infrastructure) secure wireless network A PKI-based (public key Infrastructure) secure wireless network Traditional PKI deployment Traditional PKI deployment Gesture-directed automatic configuration Gesture-directed automatic configuration Five lessons Five lessons Conclusions Conclusions

Introduction Psychological acceptability Psychological acceptability HCI design and evaluation techniques for usability HCI design and evaluation techniques for usability End users struggle to comprehend the security decisions with they are presented End users struggle to comprehend the security decisions with they are presented

Introduction Often deliberately disclose or ignore security to get their work done – a lack of usability Often deliberately disclose or ignore security to get their work done – a lack of usability Professionally managed infrastructures such as corporate firewall protect most of us while at work Professionally managed infrastructures such as corporate firewall protect most of us while at work Mobile devices into home or on the road? – On Your Own Mobile devices into home or on the road? – On Your Own

A PKI-based (public key Infrastructure) secure wireless network Environment Environment  Palo Alto Research Center (PARC)  200 users, X.509 certificates  Use 802.1x Transport Level Security Authentication of EAP-TLS

A PKI-based secure wireless network PKI deployment is incomprehensible, complex, and unusable. PKI deployment is incomprehensible, complex, and unusable. Offered to help the administrative staff roll out the PKI to avoid the pitfalls of PKI deployment Offered to help the administrative staff roll out the PKI to avoid the pitfalls of PKI deployment We were wrong We were wrong

Traditional PKI deployment First Version First Version  Manual Setup – 38 steps required

Traditional PKI deployment  38 steps  GUI-based 802.1x config software  Web-based enrollment sys  8 subjects (advanced degree in CS field)  140 min to enroll in system

Traditional PKI deployment With an elaborate set of instructions that detailed each step With an elaborate set of instructions that detailed each step Most difficult computer task Most difficult computer task Secured the subjects’ machine for wireless use, it simultaneously reduces their ability to configure and maintain their own machines Secured the subjects’ machine for wireless use, it simultaneously reduces their ability to configure and maintain their own machines

Traditional PKI deployment To compensate for its poor user interface, we used a combination of documentation and training to help users enroll in the wireless network. making it completely infeasible for smaller home or office networks.

Gesture-directed automatic configuration Lets an average end user join a device to a wireless network using the strongest, PKI-based security standards available, simply, easily, and intuitively

Gesture-directed automatic configuration Second Version Second Version

Gesture-directed automatic configuration A small setup application take care all of configuration settings A small setup application take care all of configuration settings Local-limited channels infrared devices Local-limited channels infrared devices 1 min and 39 sec 1 min and 39 sec

Gesture-directed automatic configuration 2 aspects of this design stand out 2 aspects of this design stand out  Gestural user interface  Intuitive trust model Got much higher marks in user satisfaction and confidence

Five lessons You can’t retrofit usable security Usability and security – design into system from the ground up Usability and security – design into system from the ground up Adding explanatory dialog boxes to a confusing system is not the solution Only by starting from completely different interaction principles did we manage to build a usable and secure system.

Five lessons Tools aren’t solutions Recognizing that available technologies are nothing more than tools is only part of this lesson the other part is appreciating that our current portfolio of available tools is rather incomplete.

Five lessons Mind the upper layers Security is not something to handle only in the lower layers of the networking stack or in the depths of the operating system. If we design security into all of an application’s layers (in particular, its upper layers),it becomes implicit and hence much more user-friendly. the security mechanisms an application implements must be compatible with what the user needs to accomplish.

Five lessons Keep your customers satisfied Expertise can blind even those most sensitive to user concerns Support questions usability failures sometimes hide behind apparent success stories

Five lessons Think locally, act locally Systems that follow the “think locally” principle are also often easier to deploy, because they don’t require administrators to coordinate with some larger infrastructure or organization As a result, they can offer greater opportunities for automatic configuration

Conclusions Information security often fails because of the lack of usability To rectify this situation, we must design systems that are simultaneously usable and secure.