Phishing and Trust. Agenda Questions? Questions? Phishing Phishing Project feedback Project feedback Trust Trust.

Slides:



Advertisements
Similar presentations
An Overview of Internet Credibility
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Social Media for Business IFSA March Considering Your Options.
Creating Trust Online Farrokh Alemi, Ph.D September 12, 2004.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
C MU U sable P rivacy and S ecurity Laboratory Anti-Phishing Phil The Design and Evaluation of a Game That Teaches People Not to.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Trust and Privacy. Agenda Questions? Questions? Trust Trust More project time More project time Privacy Privacy.
Internet Phishing Not the kind of Fishing you are used to.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
10/20/2009 Loomi Liao.  The problems  Some anti-phishing solutions  The Web Wallet solutions  The Web Wallet User Interface  User study  Discussion.
Privacy and Security on the Web Part 1. Agenda Questions? Stories? Questions? Stories? IRB: I will review and hopefully send tomorrow. IRB: I will review.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
User Interface Testing. Hall of Fame or Hall of Shame?  java.sun.com.
Designing for security and privacy. Agenda Tests Tests Project questions? Project questions? Design lecture Design lecture Assignments Assignments.
Virtual techdays INDIA │ 9-11 February 2011 Safe Browsing Experience for your Home & Office M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation.
Inspection Methods. Inspection methods Heuristic evaluation Guidelines review Consistency inspections Standards inspections Features inspection Cognitive.
Phishing – Read Behind The Lines Veljko Pejović
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Review an existing website Usability in Design. to begin with.. Meeting Organization’s objectives and your Usability goals Meeting User’s Needs Complying.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Examining the Effectiveness and Techniques of the Anti-Phishing Technology in Leading Web Browsers and Security Toolbars. Wesley W. Owen
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Web Spoofing John D. Cook Andrew Linn. Web huh? Spoof: A hoax, trick, or deception Spoof: A hoax, trick, or deception Discussed among academics in the.
Visual-Similarity-Based Phishing Detection Eric Medvet, Engin Kirda, Christopher Kruegel SecureComm 2008 Sep.
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
Web Security Tips Li-Chiou Chen & Mary Long Pace University September 1 st, 2010.
Reliability & Desirability of Data
1. 2 OVERVIEW First Impressions Content Purpose Design Distinction Closing.
1 The Web & Professional Communication English 3104.
Design for Interaction Rui Filipe Antunes
Trust Jason Chalecki Usable Privacy and Security – Spring 2006.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
INTERLEGES AGM KIEV THE “ESSENTIALS” OF LAW FIRM WEBSITES.
Good Web Design. The Four A’s of Good Design Accessible Accurate Appropriate Appealing.
1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Lecture 6 Title: Web Planning, Designing, Developing for E-Marketing By: Mr Hashem Alaidaros MKT 445.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Cassidy Culligan Digital Citizenship Project ED 505.
Creating & Building the Web Site Week 8. Objectives Planning web site development Initiation of the project Analysis for web site development Designing.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 7: Focusing on Users and Their Tasks.
1.  Usability study of phishing attacks & browser anti-phishing defenses – extended validation certificate.  27 Users in 3 groups classified 12 web.
Designing with Persuasion Is good design always persuasive? Push persuasion Take my product (advice) Buy my product Solicitation Messages & Warnings Pull.
Is This Website A Useful Resource? Helpful Tips. A Useful Website Has... Quality, depth and usefulness of content clear statement of the content, including.
Goals Be able to identify the parts of a URL Determine the safeness of a link Know the best places to find the info you need Know how to deal with toolbars.
Maximize Your Hosting Business: Covering all your SSL requirements Tim Callan May 31, 2006 VeriSign / thawte Confidential.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
The Information School of the University of Washington Information System Design Info-440 Autumn 2002 Session #20.
ISYM 540 Current Topics in Information System Management
Phishing is a form of social engineering that attempts to steal sensitive information.
Risk of the Internet At Home
Bethesda Cybersecurity Club
How to Stay Safe Online Rollie Edwards.
What is Phishing? Pronounced “Fishing”
Becoming an Online Detective
Presentation transcript:

Phishing and Trust

Agenda Questions? Questions? Phishing Phishing Project feedback Project feedback Trust Trust

Phishing: the problem Statistics from June 2007 Anti-Phishing Working Group: Number of unique phishing reports received in June: Number of unique phishing sites received in June: Number of brands hijacked by phishing campaigns in June: 146 Number of brands comprising the top 80% of phishing campaigns in June: 14 Country hosting the most phishing websites in June: United States Average time online for site: 3.8 days Longest time online for site: 30 days 95.2% of attacks in Financial Services industry. Phishing sites now can also host keyloggers, trojans, and other malware

Not a lot of progress…

Phishing Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials.Questions: What are the user interface issues involved in people falling for phishing attacks? What are the user interface issues involved in people falling for phishing attacks? What are the social issues involved? What are the social issues involved?

Why Phishing Works Lack of knowledge Lack of knowledge –Computer systems and security Visual deception Visual deception –Deceptive text, masking images, etc. Bounded attention Bounded attention –Lack of attention to security indicators or their absence User strategies: User strategies: –23%: website content only –36%: content and domain name only (address bar) –9%: above + “ –23%: above + padlock icon –9%: above + certificates Dhamija, R., J.D. Tygar, and M. Hearst. Proc. CHI, 2006, pp

Solutions Improve browser to fix usability issues Improve browser to fix usability issues Toolbar / browser component to detect phishing sites Toolbar / browser component to detect phishing sites –Warn or prevent bad things from happening –IE7, Firefox 2.0, Netcraft, Google Safe Browsing, eBay toolbar, Earthlink, GeoTrust TrustWatch, Phishtank SiteChecker Train users Train users Modify website and strengthen authentication Modify website and strengthen authentication –List person by name –Use Sitekey Take care of spam? Take care of spam?

Tool: Earthlink toolbar

Compare: Firefox warning

User training What should you tell users? What should you tell users? Example: Anti-Phishing Phil Example: Anti-Phishing Phil –Study: compared using existing tutorials, new tutorial based on game, and playing game –All improved overall correctness, game was the best –All training decreased false negatives –Only game decreased false positives –Game better at teaching techniques to use, not just increasing attention Example:

Improving authentication SiteKey: Bank of America’s approach SiteKey: Bank of America’s approach –A unique image + title you choose –Challenge questions if you don’t log in from a recognized computer –Still potentially susceptible to real-time, man-in-the-middle attacks ( Others? Others?

Social phishing Or spear fishing Or spear fishing –Appears to be legitimate from employer, HR, friend, etc. –Data mined from social networking sites, employer information, etc. –Worse than plain phishing? Indiana study: 72% fell for Indiana study: 72% fell for –Similar to 80% from West Point Military Academy –Ethical considerations of studying social phishing?

Trust is fundamental to security Lack of trust results in systems being ill-used or used not at all Lack of trust results in systems being ill-used or used not at all Lack of understanding of trust results in wrong decisions or no decisions Lack of understanding of trust results in wrong decisions or no decisions Too much trust can be more dangerous than too little Too much trust can be more dangerous than too little –E.g. I can open any file attachment because I run anti-virus software

What are your strategies? Scenario: you are buying a product from a new site, what leads you to trust the site and buy from them? Scenario: you are buying a product from a new site, what leads you to trust the site and buy from them? Scenario: you are looking up medical information on a new site, what leads you to trust the site? Scenario: you are looking up medical information on a new site, what leads you to trust the site? Scenario: you consider downloading a new browser plug-in, what leads you to trust the plug-in and download? Scenario: you consider downloading a new browser plug-in, what leads you to trust the plug-in and download?

Definitions Book: “Trust concerns a positive expectation regarding the behavior of somebody or something in a situation that entails risk to the trusting party” Book: “Trust concerns a positive expectation regarding the behavior of somebody or something in a situation that entails risk to the trusting party” Miriam-Webster: “assured reliance on the integrity, ability, or character of a person or thing” Miriam-Webster: “assured reliance on the integrity, ability, or character of a person or thing”

Layers Dispositional trust Dispositional trust –Psychological disposition or personality trait to be trusting or not Learned trust Learned trust –A person’s general tendency to trust, or not to trust, as a result of experience Situational trust Situational trust –Basic tendencies are adjusted in response to situational cues

Processing strategies Heuristic approach making quick judgments from the obvious information Heuristic approach making quick judgments from the obvious information Systematic approach involving detailed analysis of information Systematic approach involving detailed analysis of information

Models summarization Increases trust Increases trust –Familiarity –Benevolence –Integrity –Comprehensive info –Shared value –Credibility –Good feedback –Reliability –Usability Decreases trust Decreases trust –Risk –Transaction cost –Uncertainty

Losing trust What are ways to damage trust? What are ways to damage trust? How can you repair damaged trust? How can you repair damaged trust?

Trust Design Guidelines 1. Ensure good ease of use. 2. Use attractive design. 3. Create a professional image – avoid spelling mistakes and other simple errors. 4. Don’t mix advertising and content – avoid sales pitches and banner advertisements. 5. Convey a “real-world” look and feel – for example, with use of high- quality photographs of real places and people. 6. Maximize the consistency, familiarity, or predictability of an interaction both in terms of process and visually. 7. Include seals of approval such as TRUSTe. 8. Provide explanations, justifying the advice or information given. 9. Include independent peer evaluation such as references from past and current users and independent message boards. 10. Provide clearly stated security and privacy statements, and also rights to compensation and returns. 11. Include alternative views, including good links to independent sites with the same business area. 12. Include background information such as indicators of expertise and patterns of past performance. 13. Clearly assign responsibilities (to the vendor and the customer). 14. Ensure that communication remains open and responsive, and offer order tracking or an alternative means of getting in touch. 15. Offer a personalized service that takes account of each client’s needs and preferences and reflects its social identity.

Credibility How is this different than trust? How is this different than trust? Four Types of Credibility Four Types of Credibility –Presumed credibility. –Reputed credibility. –Surface credibility. –Experienced credibility.

Stanford Guidelines for Web Credibility 1. Make it easy to verify the accuracy of the information on your site. 2. Show that there's a real organization behind your site. 3. Highlight the expertise in your organization and in the content and services you provide. 4. Show that honest and trustworthy people stand behind your site. 5. Make it easy to contact you. 6. Design your site so it looks professional (or is appropriate for your purpose). 7. Make your site easy to use – and useful. 8. Update your site's content often (at least show it's been reviewed recently). 9. Use restraint with any promotional content (e.g., ads, offers). 10. Avoid errors of all types, no matter how small they seem. Stanford Persuasive Technology Lab

Food for thought What have you noticed websites doing to increase your trust? What have you noticed websites doing to increase your trust? Have you grown more or less trustworthy over time? General public? Have you grown more or less trustworthy over time? General public? Should computers (application designers) trust users? Should computers (application designers) trust users? –Should the system take over and prevent bad things from happening? When?