Presentation is loading. Please wait.

Presentation is loading. Please wait.

Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Usable Privacy and Security.

Similar presentations


Presentation on theme: "Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Usable Privacy and Security."— Presentation transcript:

1 Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor http://cups.cs.cmu.edu/courses/ups.html/ 1 Usable Privacy and Security Course Overview January 14, 2008

2 Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor http://cups.cs.cmu.edu/courses/ups.html/ 2 Outline Review syllabus and course policies Introduction to usable privacy and security CUPS research overview Introduce students

3 3

4 Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor http://cups.cs.cmu.edu/courses/ups.html/ 4 Syllabus http://cups.cs.cmu.edu/courses/ups-sp08/ Course numbers Grading Homework (25%) - due at 1:30 pm on Mondays  Check-plus, check, check-minus, zero  After 1:45 pm homework is late  Late homework will get one grade lower  Homework will not be accepted after beginning of next class period Lecture (25%) Project (50%) Textbook and readings Schedule

5 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 5 Unusable security & privacy Unpatched Windows machines compromised in minutes Phishing web sites increasing by 28% each month Most PCs infected with spyware (avg. = 25) Users have more passwords than they can remember and practice poor password security Enterprises store confidential information on laptops and mobile devices that are frequently lost or stolen

6 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 6 Grand Challenge “Give end-users security controls they can understand and privacy they can control for the dynamic, pervasive computing environments of the future.” - Computing Research Association 2003

7 7 security/privacy researchers and system developers human computer interaction researchers and usability professionals

8 8 http://cups.cs.cmu.edu/soups/ Mark your calendar for SOUPS 2008 - July 23-25 at CMU

9 The user experience

10 10 How do users stay safe online?

11 11 POP!

12 12 After installing all that security and privacy software

13 13 Do you have any time left to get any work done?

14 Secondary tasks

15 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 15 “Users do not want to be responsible for, nor concern themselves with, their own security.” - Blake Ross

16 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 16 Concerns may not be aligned Security experts are concerned about the bad guys getting in Users may be more concerned about locking themselves out

17 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 17 Grey: Smartphone based access-control system Deployed in CMU building with computer security faculty and students Nobody questions that the security works But lots of concerns about getting locked out L. Bauer, L. F. Cranor, M. K. Reiter, and K. Vaniea. Lessons Learned from the Deployment of a Smartphone-Based Access-Control System. Technical Report CMU-CyLab-06-016, CyLab, Carnegie Mellon University, October 2006. http://www.cylab.cmu.edu/default.aspx?id=2244

18 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 18 Secure, but usable?

19 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 19 Unusable security frustrates users

20 20

21 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 21 Typical password advice Pick a hard to guess password Don’t use it anywhere else Change it often Don’t write it down

22 What do users do when every web site wants a password?

23 23 Bank = b3aYZ Amazon = aa66x! Phonebill = p$2$ta1

24 24

25 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 25 How can we make secure systems more usable? Make it “just work” Invisible security Make security/privacy understandable Make it visible Make it intuitive Use metaphors that users can relate to Train the user

26 Make it “just work”

27 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 27 This makes users very happy (but it’s not that easy)

28 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 28 One way to make it work: make decisions Developers should not expect users to make decisions they themselves can’t make

29 Make security understandable

30 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 30 Also not so easy Privacy policy matches user’s privacy preferences Privacy policy does not match user’s privacy preferences

31

32 “Present choices, not dilemmas” - Chris Nodder (in charge of user experience for Windows XP SP2)

33

34 Train the user

35 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 35 Training people not to fall for phish Laboratory study of 28 non-expert computer users Asked to evaluate 10 web sites, take 15 minute break, evaluate 10 more web sites Experimental group read web-based training materials during break, control group played solitaire Experimental group performed significantly better identifying phish after training People can learn from web-based training materials, if only we could get them to read them!

36 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 36 How do we get people trained? Most people don’t proactively look for training materials on the web Many companies send “security notice” emails to their employees and/or customers But these tend to be ignored Too much to read People don’t consider them relevant

37 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 37 Embedded training Can we “train” people during their normal use of email to avoid phishing attacks? Periodically, people get sent a training email Training email looks like a phishing attack If person falls for it, intervention warns and highlights what cues to look for in succinct and engaging format P. Kumaraguru, Y. Rhee, A. Acquisti, L. Cranor, J. Hong, and E. Nunge. Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System. CyLab Technical Report. CMU- CyLab-06-017, 2006. http://www.cylab.cmu.edu/default.aspx?id=2253

38

39 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ You can add your name and/or URL to the footer if you want. If your figures overlap the CUPS logo, then suppress the background images 39 Embedded training evaluation Lab study compared two prototype interventions to standard security notice emails from Ebay and PayPal Existing practice of security notices is ineffective Diagram intervention somewhat better Comic strip intervention worked best Interventions most effective when based on real brands

40

41

42 Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor http://cups.cs.cmu.edu/courses/ups.html/ 42 CUPS research overview http://cups.cs.cmu.edu

43 Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor http://cups.cs.cmu.edu/courses/ups.html/ 43 Student introductions Name Background/degree program Why you are taking this course Your “favorite” unusable security problem

44 C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/


Download ppt "Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Usable Privacy and Security."

Similar presentations


Ads by Google