PROBLEM STATEMENT: Our research seeks to understand the current usability situation of files and email encryption software. Particularly we focus in Gnupg4win.

Slides:



Advertisements
Similar presentations
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Advertisements

Lindsey Main 1, 2 Lindsey Main 1, 2 Kathleen McGraw 2 Kathleen McGraw 2 User Services Department at UNC Chapel Hill Health Sciences Library  supports.
With your instructor, Jeremy Hyland
Digital Signatures and Hash Functions. Digital Signatures.
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Analyzing language : MEANING 1. What does a particular sentence mean ? 1. How can I state the meaning as simply as I can, as clearly as I can, and if possible,
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
1 Team Skill 2 Chapter 8: The Challenge of Requirements Elicitation Due to The "Yes, But" Syndrome The "Undiscovered Ruins" Syndrome The "User and the.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Zero effort security for the home PC users? By Terje Risa.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
SM3121 Software Technology Mark Green School of Creative Media.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Why Johnny Can’t Encrypt A Usability Evaluation of GPG 5.0 Presented by Yin Shi.
Semantic Web Technologies Lecture # 2 Faculty of Computer Science, IBA.
To what extent do people move to Shanghai for the same reasons?
Subject Name: Introduction to Computing Assignment : Advantages And Disadvantages Of Open Source Software Submitted by: Raja Kamran Maroof Khan (FA10-BBA-135)
PACINA Online A Mini-Tutorial on Reading and Interpreting a Published Information Needs Analysis facilitated by Andrew Booth, ScHARR, University of Sheffield.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
LOGIC AND CRITICAL THINKING Jonathan Dolhenty, Ph.D. Logic and Critical Thinking. Available at
Dr. Alireza Isfandyari-Moghaddam Department of Library and Information Studies, Islamic Azad University, Hamedan Branch
Chapter - 2 What is “GIT” VERSION CONTROL AND GIT BASICS.
How well do we communicate? Internal communications review February 2013.
Web-based Legal Research Instruction: Does It Work? Rita Kaiser Reference Services Librarian King County Law Library.
E-commerce Law Electronic signatures and security.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Evaluation of digital collections' user interfaces Radovan Vrana Faculty of Humanities and Social Sciences Zagreb, Croatia
1 Use of electronic information resources among the Croatian scientists in the field of social sciences in a pre-digital library environment: obstacles.
Technology as a Tool in Elementary Guidance Counseling Meghan Moran Click on my picture to see a video greeting! Meghan’s Website:
by Marc Comeau. About A Webmaster Developing a website goes far beyond understanding underlying technologies Determine your requirements.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Class 20 Usability CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Signed, Sealed and Delivered How the emphasis on “encrypting” mail has hurt the cause of security, and what to do about it. Simson L. Garfinkel MIT.
Challenges in Using IT for Learning and Teaching in Saudi Arabian Universities Present by : Fahad Alturise Supervisor : Dr. Paul Caldor.
Learners’ Attitudes and Perceptions of Online Instruction Presented by: Dr. Karen S. Ivers Dr. JoAnn Carter-Wells Dr. Joyce Lee California State University.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Public Key Encryption CS432 – Security in Computing Copyright © 2005, 2008 by Scott Orr and the Trustees of Indiana University.
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
1 Mail Saurus Reference:“Usable Encryption Enabled by AJAX” J.F. Ryan; B.L. Reid; Networking and Services, ICNS '06. Digital Object Identifier /ICNS
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Confused Johnny WHEN AUTOMATIC ENCRYPTION LEADS TO CONFUSION AND MISTAKES Scott Ruoti, Nathan Kim, Ben Burgon, Tim van der Horst, Kent Seamons Internet.
What’s the Big Deal About R? Tom Tiedeman, OCIO July 21, 2015.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Copyright 1999 S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 41b Cryptography and Its Applications.
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
8 October 2015 Preliminary Results from a Survey of State DOT Website Infrastructure A.J. Million, Ph.D. candidate, School of Information Science & Learning.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Planning and Designing Effective Web Pages. When planning a new site Determine site goals 2. Identify the target audience 3. Conduct market research.
Dan Boneh Introduction Course Overview Online Cryptography Course Dan Boneh.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
School of Education * Dept of Education Malone University Final Project B – Online Edu362 Engaging & Interactive Class Activity Diane Daugherty.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Top Benefits of Joomla in E- Learning. Flexibility - Because of Several Reasons Open Source Nature Create Custom Modules Custom Functionality To Your.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0
How to use By Zainab Muman
Sarah Lucchesi Learning Services Librarian
Kharkiv National Pedagogical University
Presentation transcript:

PROBLEM STATEMENT: Our research seeks to understand the current usability situation of files and encryption software. Particularly we focus in Gnupg4win encryption software and Thunderbird application and the integration of them. The study was to find current problems in the following areas: 1)Downloading the software and setting it up. 2)Creating a key pair. 3)Getting public keys published,. 4) Encrypting/decrypting files. 5) Encrypting/decrypting s. We conducted user testing to find out whether people can easily use those software applications to encrypt files and s. RESULTS: SIGNIFICANCE: In this research, we wanted to know whether average people know the concept of encryption and why the majority of people don't encrypt their s. We tried to determine if the reason is that people don't really need to use encryption or if it is because encryption is too complex. Previous researches claimed that the main reason behind this is the complexity of the encryption software. RESEARCH QUESTIONS:  Do majority of average people understand the concept of cryptography?  Why cryptography is not used with s?  Are free cryptography products really too complicated for average people to use?  Can we make these products more usable by providing good instructions? The Usability of File and Encryption Student: Tamam Alayed, Faculty Sponsor: Prof. Charles Frank, Computer Science METHODS: In this research we used standard user testing techniques. We conduct a survey to discover the reasons behind why people don’t use encryption tools. We also did some user testing to know whether people can benefit from using a simple good instruction for encryption tools. CONCLUSION:  Cryptographically protected s has been considered to be difficult to use for vast majority of people, not only because of the difficulty of the encryption tools itself but also due to people don’t see any need to use them for their s because it’s just not necessary for the kind of s that they send.  55.24% of 148 persons in our survey answered “Yes” when they answered the question “Would you use an encryption tool to encrypt your s if you have known simple instructions to do that”.  25.45% of 148 persons reported that they don’t send encrypted s because they don’t know how to use the encryption tools either due to the idea of the difficulty of encryption tools or the lack of good instruction to use it. FUTURE WORK: WORK CITED:  Alma Whitten and J.D. Tygar, “Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0” Proceedings of the 8 th USENIX Security Symposium (Washington, D.C., Aug , 1999),  Steve Sheng, Levi Broderick, Colleen Alison Koranda and Jeremy J. Hyland, “Why Johnny Still Can’t Encrypt: Evaluation the Usability of Encryption Software” Chart3: “Would you try to use an encryption tool to encrypt your s if you know that it has a simple good instruction to do that?” Chart1: “Do you sent encrypted s that can only be read by the recipient?” Chart2: “Why do you think people are not using encryption tools to encrypt their s?”  The survey was published academically and over the online social network Twitter.  Filled by 148 persons with different age, nationality and backgrounds. Is it really important to encrypt our s when we already know that almost all providers uses SSL? The usability of file encryption, focusing in TrueCrypt, open-source disk encryption tool.