USABILITY Ben Aaron.

Slides:



Advertisements
Similar presentations
1 Secure Interaction Design Kami Vaniea. 2 Overview Designing secure interfaces  Design principles Firefox extensions  Cookies  Phishing  Tracking.
Advertisements

Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
People: Usability IS 101Y/CMSC 101Y November 5, 2013 Marie desJardins Amanda Mancuso University of Maryland Baltimore County.
Usability. Definition of Usability Usability is a quality attribute that assesses how easy user interfaces are to use. The word "usability" also refers.
Customer Service and Support Sutherland Global Services Consultant Learning Services Microsoft Store.
SWE205 Review Spring Why is software unusable? Users are no longer trained. Why? Feature creep Inherently hard: a problem of communication Designed.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
Security & Usability Charles Frank. Convenience is the Antithesis to Security  Computer systems must employ mechanisms that are difficult to use!
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Web Site Design. Overview Why? Internet and Intranet Common Mistakes. Elements of a Web Site. Structure. Navigation.
Security Windows 2000 Richard Goldman © December 4, 2001.
Module: Software Engineering of Web Applications Chapter 3 (Cont.): user-input-validation testing of web applications 1.
Usability Olaa Motwalli CIS764, DR Bill – KSU. Overview Usability factors. Usability guidelines.  Software application.  Website. Common mistakes. Good.
Slide #13-1 Design Principles CS461/ECE422 Computer Security I Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and.
1 Saltzer [1974] and later Saltzer and Schroeder [1975] list the following principles of the design of secure protection systems, which are still valid:
1 Design Principles CS461 / ECE422 Spring Overview Simplicity  Less to go wrong  Fewer possible inconsistencies  Easy to understand Restriction.
How to fix Missing Windows Sockets Registry Entries required for Network Connectivity in Windows 10 /pages/Reimage- Repair- Tool/ /u/6/b/
Windows Vista Configuration MCTS : Internet Explorer 7.0.
SCHOLARSHIPS You wont get scholarships if you don’t apply for them…
Srinivas Balivada USC CSCE548 07/22/2016.  Cookies are generally set server-side using the ‘Set-Cookie’ HTTP header and sent to the client  In PHP to.
How to download the latest version of AVAST Antivirus for free?
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Unvalidated Redirects & Forwards
Chapter 40 Internet Security.
C++ Catastrophes “if C allows you to shoot yourself in the foot, then C++ is giving you a machine gun!” James Prince.
Installing and Learning Software
Module: Software Engineering of Web Applications
Technology Skills for Life, Career, and Academic Success
What Do We Mean by Usability?
Introduction to Web Safety
Execution with Unnecessary Privileges
Udaya Shyama Pallathadka Ganapathi Bhat CSCE 548 Student Presentation
Creating an Account on Wikieducator
Failure to protect stored data
Evaluation: Analyzing results
mysql and mysql workbench
Introduction to Operating System (OS)
Introduction To Networking
Answer the questions to reveal the blocks and guess the picture.
Introduction to Networking
FastFacts Feature Presentation
Cross Sight scripting: Type-2
Fix BT Mail Error Code Call Toll-free
Bomgar Remote support software
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Fix Windows Live Mail Error ID 0x800ccc0e
Fix Windows 10 Activation Error 0x80072ee2
Ways to Tackle Norton Antivirus Errors Arising in Windows 10.
Human–computer interfaces
Content Best Practices
Outlook is the American service providers used by a number of people all over the world as it provides free and instant services to user of all age.
HOW TO DOWNLOAD THE LATEST VERSION OF AVAST ANTIVIRUS FOR FREE?
Introduction to Usability Engineering
Setting up an online account
Introduction to Systems Security
(Required for DTCs, Recommended for STCs)
MIS2502: Data Analytics MySQL and SQL Workbench
Norman Chapter 2 Psychology of Everyday Actions
Human Computer Interaction
Topic 5: Communication and the Internet
ONLINE SECURE DATA SERVICE
OAKS Online Last updated: 08/20/09.
What Are Our Security Goals?
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Maple T.A. 7 Online Testing and Assessment with computational algebra ... Powered by Maple Surak Perera David Ingham Chris Denly 22nd February 2011.
Shawn Dorward – InterDyn Artis
Anna Adams Martina Angela Sasse
Presentation transcript:

USABILITY Ben Aaron

The Relationship Between Usability and Security We have to have both.

TECHNICAL OVERVIEW (But not so technical)

What Is Usability? ■“Usability is a quality attribute that assesses how easy user interfaces are to use.” (Nielson 2012) ■Incorporates elements of Learnability, Efficiency, Memorability, Errors and Satisfaction (Nielson 2012)

Psychological Acceptability ■“It is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly. Also, to the extent that the user’s mental image of his protection goals matches the mechanisms he must use, mistakes will be minimized. If he must translate his image of his protection needs into a radically different specification language, he will make errors” – Saltzer & Schroeder, 1974 (24 Deadly Sins pg 218) ■“Security only works if the secure way also happens to be the easy way” – Culp, 2000 (24 Deadly Sins pg 218)

How Does It Occur ■Tunnel vision of designers/software engineers – “It’s easy for me to use!” ■Not understanding your audience: –Administrators ■Deal with lots of information ■Optimization over security –End users ■Generally not technically literate ■Will find ways to circumvent security if it gets in their way

Where Does It Occur? ■Security messages to users –Too little information – bad for administrators –Too much information – bad for users –Too many messages – users won’t read or will disable them –Inaccurate or generic information – may keep out attackers, but won’t help users –Errors with only error codes – users won’t understand ■Authentication –Password restrictions may be too hard for users

EXAMPLES

Authentication ■Password Trouble at Lowes: –Password must be 8 characters long –Password must contain 1 letter and one number –Can’t be both? ■Security Questions for Online Insurance: –Generic questions –Non-specific answers –Case sensitive

Error Messages BadGood

DETECTION AND AVOIDANCE

Detection Methods ■Code Review –UI code for security options ■Is security on by default? –Look at authentication system ■Option to accept an unauthenticated external connection? ■Obvious way to reset password? Can this be exploited for denial-of-service attack? ■Use/Misuse/Abuse Cases –Essential element of usability testing ■Field Testing

Avoidance of Errors ■Invisibly Strengthen Security (OWASP & 24 Deadly Sins) –Set tighter security features automatically so that user’s are not responsible –Hide security features so that users won’t disable them ■Typical users won’t expend more than three clicks to select an option (24 Deadly Sins pg 226) ■Make Security Understandable (OWASP & 24 Deadly Sins) –Easier to read messages –Positive Reinforcement ■Green browser bar for secure websites ■Train Users (OWASP) –Phishing s as learning tools

Avoidance of Errors ■Make Selective Relaxing of Security Easier, but Inform Users of Consequenses (24 Deadly Sins) –Information bars in browsers –Don’t be too technical! Rule of thumb: go for 8 th grade reading level. ■Make It Actionable (24 Deadly Sins) –Users like to have control over their computing environment, and can sometimes be able to fix a problem on their own if guided to do so ■Provide Central Management (24 Deadly Sins) –Active Directory Group Policy in Windows – everything in one window

CONCLUSION

Conclusion ■Applications must be both secure and usable in order to be either. ■Security engineers and software developers need to work with usability engineers. ■Users aren’t Lusers! ■Don’t lose the forest for the trees.

References ■"Building Usable Security." OWASP. OWASP, 15 Dec Web. 25 July ■Howard, Michael, David LeBlanc, and John Viega. 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them. New York: McGraw-Hill, Print. ■Nielson, Jakob. "Usability 101: Introduction to Usability." Nielson Norman Group: Evidence-Based User Experience Research, Training, and Consulting. Nielson Norman Group, 4 Jan Web. 25 July 2016.