Usable Privacy and Security Course Overview - PowerPoint PPT Presentation

About This Presentation
Title:

Usable Privacy and Security Course Overview

Description:

CMU Usable Privacy and Security Laboratory http://cups.cs.cmu.edu ... http://www.cylab.cmu.edu/default.aspx?id=2244. Secure, but usable? ... – PowerPoint PPT presentation

Number of Views:33
Avg rating:3.0/5.0
Slides: 45
Provided by: lorrie2
Learn more at: http://cups.cs.cmu.edu
Category:

less

Transcript and Presenter's Notes

Title: Usable Privacy and Security Course Overview


1
Usable Privacy and SecurityCourse Overview
  • January 14, 2008

2
Outline
  • Review syllabus and course policies
  • Introduction to usable privacy and security
  • CUPS research overview
  • Introduce students

3
(No Transcript)
4
Syllabus
  • http//cups.cs.cmu.edu/courses/ups-sp08/
  • Course numbers
  • Grading
  • Homework (25) - due at 130 pm on Mondays
  • Check-plus, check, check-minus, zero
  • After 145 pm homework is late
  • Late homework will get one grade lower
  • Homework will not be accepted after beginning of
    next class period
  • Lecture (25)
  • Project (50)
  • Textbook and readings
  • Schedule

5
Unusable security privacy
  • Unpatched Windows machines compromised in minutes
  • Phishing web sites increasing by 28 each month
  • Most PCs infected with spyware (avg. 25)
  • Users have more passwords than they can remember
    and practice poor password security
  • Enterprises store confidential information on
    laptops and mobile devices that are frequently
    lost or stolen

6
Grand Challenge
  • Give end-users security controls they can
    understandand privacy they can control forthe
    dynamic, pervasive computing environments of the
    future.
  • - Computing Research Association 2003

7
security/privacy researchers and system
developers
human computer interaction researchers and
usability professionals
8
Mark your calendarfor SOUPS 2008 - July 23-25 at
CMU
http//cups.cs.cmu.edu/soups/
9
The user experience
10
How do users stay safe online?
11
(No Transcript)
12
After installing all that security and privacy
software
13
Do you have any time left to get any work done?
14
Secondary tasks
15
  • Users do not want to be responsible for, nor
    concern themselves with, their own security.
  • - Blake Ross

16
Concerns may not be aligned
  • Security experts are concerned about the bad guys
    getting in
  • Users may be more concerned about locking
    themselves out

17
Grey Smartphone based access-control system
  • Deployed in CMU building with computer security
    faculty and students
  • Nobody questions that the security works
  • But lots of concerns about getting locked out
  • L. Bauer, L. F. Cranor, M. K. Reiter, and K.
    Vaniea. Lessons Learned from the Deployment of a
    Smartphone-Based Access-Control System. Technical
    Report CMU-CyLab-06-016, CyLab, Carnegie Mellon
    University, October 2006. http//www.cylab.cmu.edu
    /default.aspx?id2244

18
Secure, but usable?
19
Unusable security frustrates users
20
(No Transcript)
21
Typical password advice
  • Pick a hard to guess password
  • Dont use it anywhere else
  • Change it often
  • Dont write it down

22
What do users do when every web site wants a
password?
23
Bank b3aYZ Amazon aa66x! Phonebill
p2ta1
24
(No Transcript)
25
How can we make secure systems more usable?
  • Make it just work
  • Invisible security
  • Make security/privacy understandable
  • Make it visible
  • Make it intuitive
  • Use metaphors that users can relate to
  • Train the user

26
Make it just work
27
This makes users very happy
(but its not that easy)
28
One way to make it work make decisions
  • Developers should not expect users to make
    decisions they themselves cant make

29
Make security understandable
30
Also not so easy
Privacy policymatches usersprivacy preferences
Privacy policydoes not match users privacy
preferences
31
(No Transcript)
32
Present choices, not dilemmas
  • - Chris Nodder (in charge of user
    experience for Windows XP SP2)

33
(No Transcript)
34
Train the user
35
Training people not to fall for phish
  • Laboratory study of 28 non-expert computer users
  • Asked to evaluate 10 web sites, take 15 minute
    break, evaluate 10 more web sites
  • Experimental group read web-based training
    materials during break, control group played
    solitaire
  • Experimental group performed significantly better
    identifying phish after training
  • People can learn from web-based training
    materials, if only we could get them to read them!

36
How do we get people trained?
  • Most people dont proactively look for training
    materials on the web
  • Many companies send security notice emails to
    their employees and/or customers
  • But these tend to be ignored
  • Too much to read
  • People dont consider them relevant

37
Embedded training
  • Can we train people during their normal use of
    email to avoid phishing attacks?
  • Periodically, people get sent a training email
  • Training email looks like a phishing attack
  • If person falls for it, intervention warns and
    highlights what cues to look for in succinct and
    engaging format
  • P. Kumaraguru, Y. Rhee, A. Acquisti, L. Cranor,
    J. Hong, and E. Nunge. Protecting People from
    Phishing The Design and Evaluation of an
    Embedded Training Email System. CyLab Technical
    Report. CMU-CyLab-06-017, 2006.
    http//www.cylab.cmu.edu/default.aspx?id2253

38
(No Transcript)
39
Embedded training evaluation
  • Lab study compared two prototype interventions to
    standard security notice emails from Ebay and
    PayPal
  • Existing practice of security notices is
    ineffective
  • Diagram intervention somewhat better
  • Comic strip intervention worked best
  • Interventions most effective when based on real
    brands

40
(No Transcript)
41
(No Transcript)
42
CUPS research overview
  • http//cups.cs.cmu.edu

43
Student introductions
  • Name
  • Background/degree program
  • Why you are taking this course
  • Your favorite unusable security problem

44
CMU Usable Privacy and Security
Laboratoryhttp//cups.cs.cmu.edu/
Write a Comment
User Comments (0)
About PowerShow.com