Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
P RIVACY, T RUST, AND R EPUTATION Jose Miguel Such July 27th, 2011.
CHAPTER 4 E-ENVIRONMENT
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009.
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Privacy: Accountability and Enforceability Jamie Yoo April 11, 2006 CPSC 457: Sensitive Information in a Wired World.
Real world application  Protocols  Paul Simmonds ICI Plc. & Jericho Forum Board.
A Model for Technology Acceptance in Law Enforcement A Case Study involving Lawful Intercept Technology at a Prosecutor's Office By Vincent Gisonti May.
Users Are Not The Enemy A. Adams and M. A. Sasse Presenter: Jonathan McCune Security Reading Group February 6, 2004.
Principles of Good Tax Policy Annette Nellen San José State University.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
P3P: Platform for Privacy Preferences Charlin Lu Sensitive Information in a Wired World November 11, 2003.
05-899/ Usable Privacy and Security Colleen Koranda February 7, 2006 Usable Privacy and Security I.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Thursday, July 8, 2004DIMACS Workshop, NJ Instant Messaging and Privacy Sameer Patil University of California, Irvine (& IBM T. J. Watson Research Center)
HRM-755 PERFORMANCE MANAGEMENT
Software Quality Matters Ronan Fitzpatrick School of Computing Dublin Institute of Technology.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
1 User Interface Design CIS 375 Bruce R. Maxim UM-Dearborn.
User Centered Design Lecture # 5 Gabriel Spitz.
Information Systems Controls for System Reliability -Information Security-
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Medical Applications Tejinder Judge Usable Security – CS 6204 – Fall, 2009 – Dennis.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy Preferences Edgardo Vega Usable Security – CS 6204 – Fall, 2009 – Dennis.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Team 2 Andrew Boyd Kaven Williams.  Privacy, Security and Compliance Issues  Current State of Research  Implications  Areas of Research Opportunity.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style COPS Community Studies Presented by Sherley Codio Community-Oriented.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Usability Studies Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Why Johnnys' Network got Owned by Evil Hackers Bent on World Domination and Johnny.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
References  Cranor & Garfinkel, Security and Usability, O’Reilly  Sasse & Flechais, “Usable Security: Why Do We Need It? How Do We Get It?”  McCracken.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
© Synergetics Portfolio Security Aspecten.
Top 10 Privacy Risks in Web Applications Method, results and some countermeasures 29 May 2015 Florian Stahl (Project Leader) Sponsored by.
Biometrics and Usability March 21, 2008 Poor Usability: The Inherent Insider Threat Information Access Division Visualization and Usability Group Mary.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
PPA 502 – Program Evaluation Lecture 2c – Process Evaluation.
Engineering Essential Characteristics Security Engineering Process Overview.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Malcolm Crompton APEC Information Privacy Framework: review, impact, & progress APEC Symposium on Information Privacy Protection in E Government & E Commerce.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
United Nations Economic Commission for Europe Statistical Division WHAT MAKES AN EFFECTIVE AND EFFICIENT STATISTICAL SYSTEM Lidia Bratanova, Statistical.
Data protection—training materials [Name and details of speaker]
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Director, Internet, Science, and Technology Research
Identity and Access Management
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Web Applications: Get a Grip on Privacy
Introduction to Health Privacy
Internet of Things (IoT) for Industrial Development and Automation
HIPAA Privacy and Security Update - 5 Years After Implementation
Anna Adams Martina Angela Sasse
Presentation transcript:

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Privacy Non-electronic situations  A “boundary regulation process” of accessibility depending on “context” (Altman)  A “personal adjustment process” (Westin) balancing the desire for privacy against the desire to interact in the context of social norms and their environment Electronic systems  A distinction (Solove) between access control (regulating access to information about oneself) and risk management (reducing likelihood of unintended/undesired usage) Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Personal attitudes Behavior does not always coincide with expressed attitudes  Economic perspective (“privacy economics”) efficiency of transactions aided by disclosure or value of short-term disclosure weighed more heavily than long-term effects)  Psychological perspective the temptation to reveal more concerned about disclosing information perceived to be varying from the norm Highly variable from person to person  “Unconcerned” or “marginally concerned” (20-25% of the population)  “fundamentalists”  “pragmatists” “identity aware” (concerned with specific personally identifiable information) “profile aware” (concerned with characterizing information)

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Human factors Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Importance of human factors (“Since security mechanisms are designed, implemented, applied and breached by people, human factors should be considered in their design.”) Studies show that users do not employ recommended practices in password management (e.g., short passwords kept for long periods) A study:  Web survey (139 responses) Half of respondents from Company A Remainder from global community  In depth interview (30 subjects) Equal numbers from Company A and B Semi-structured, allowed open-ended suggestion of new issues  Findings in four areas Theme: user-centered design and user training are central to good security

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Finding 1: Multiple Passwords Multiple passwords  required by different applications/systems  Mandatory expiration often enforced These factors encourage users to employ unsafe practices  write down the passwords (50% of survey respondents)  poor password design Repeated use of same password Short/easily cracked passwords password linking (name1, name2, name3,…) (50% of respondents) The dilemma: users “perceive their behavior to be caused by a mechanism designed to increase security.”

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Finding 2: Password Content In selecting passwords  Users have inadequate knowledge of how to select passwords (dictionary words and names were often used)  Users did not understand how cracking works Dilemma:  “restrictions introduced to create more secure password content may produce less memorable passwords, leading to increased password disclosure”  “having to circumvent security procedures lowers users’ regard for the overall security arrangements in the organization, which, in turn, increases password disclosure.”

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Finding 3: Work Practices Passwords must (be perceived to) be compatible with work practices  Users in Organization A found individual passwords for group work to be undesirable (individual passwords were seen by Organization A as allowing better accountability/audits)  Users rejected Organization B’s practice of having group passwords for individual personal information ( )

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Finding 4: User’s perceptions Lack of information on security threats and security goals lead users to develop their own (“often wildly inaccurate”) models that guide their behavior  Users considered personnel files and as sensitive but customer information was seen as less sensitive (was this in line with the organization’s interests?)  Users considered their password safety less important because their role in the organization was not important.  Users had confusion about authentication (believing that user IDs were similar to passwords and had to be constructed and secured in the same manner).

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech The downward spiral Security departments, motivated by the need-to-know principle, insufficient inform users of treats and security procedures Security mechanism/policies are developed that are not based on user-centered design and, therefore, have lower usability Users perceive that the security mechanisms/policies interfere with work practice and, lacking better information, develop behaviors based on incorrect models of threats and information sensitivities Security departments perceive users’ behavior as “inherently insecure,” which reinforces their reluctance to share information with users

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Recommendations Inform users  Good practices on password design; provide feedback during password construction process.  Existing and potential threats  Which systems/information is sensitive and why. Security should be visible  Detect and challenge in a constructive manner insecure user behaviors Employ a user-centered design philosophy to ensure that security mechanisms align with user practice.

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Engineering for privacy Three technical “spheres”  User (person’s device)  Recipient (organization to which user’s information is disclosed)  Joint (data hosting and related service, aka the “cloud) Privacy concerns  (see table)

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Fair Information Practices Focuses on “notice” and “choice” Tailored to e-commerce

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Design factors Network centricity (e.g., a location aware system in which the user does not have to disclose their location to a central server vs. one where the central server knows (and can possibly share with others) their location) Identifiability (a (pseudo) anonymous identity or providing attributes (role, right) rather than identity to accomplish a transaction

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Architecture types Privacy-by-architecture (the way the system is built) Privacy-by-policy (the rules which control the system)

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Degrees of Identifiability

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Implementing Privacy-by-policy A site can instill trust by revealing:  type of information collected  use of information  conditions for sharing this information with others and restriction upon or policies of such third parties  security of the information  how users access information about themselves access to full individual profile should be accessible  how to provide/withhold consent Notification of collection/consent  judicious interruption of user  user Preference policies can minimize interruptions Enforcing compliance  Compliance engines (validates access against privacy policy)  Auditing mechanisms (reveals possible breaches leading to sanctions)