Top Banner
USABLE SECURITY RACHEL SIMPSON (@RILAN) & GUY PODJARNY (@GUYPOD)
82

Usable security

Feb 19, 2017

Download

Design

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Usable security

USABLE SECURITYRACHEL SIMPSON (@RILAN) & GUY PODJARNY (@GUYPOD)

Page 2: Usable security

DO YOU REMEMBER…

Page 3: Usable security
Page 4: Usable security

0 0 0 3 4 1HIT COUNTER

Page 5: Usable security
Page 6: Usable security
Page 7: Usable security
Page 8: Usable security
Page 9: Usable security

FOR DIGITAL SECURITY, THE STAKES HAVE NEVER BEEN HIGHER.

Page 10: Usable security
Page 11: Usable security

ARE USERS REALLY THE WEAKEST LINK?

Page 12: Usable security

RACHEL SIMPSON @RILAN

Page 13: Usable security

RACHEL SIMPSON @RILAN

GUY PODJARNY @GUYPOD

Page 14: Usable security

USABLE SECURITY

WHAT’S ON THE AGENDA?

▸ Why do people do what they do?

▸ Passwords

▸ HTTPS errors

▸ SSL Interstitials

▸ Phishing

▸ Takeways

Page 15: Usable security

ARE USERS REALLY THE WEAKEST LINK?

Page 16: Usable security

WE’RE ONLY HUMAN.

Page 17: Usable security

USABLE SECURITY

HUMAN FACTORS

▸ Memory

Page 18: Usable security

USABLE SECURITY

HUMAN FACTORS

▸ Memory

▸ Attention

Page 19: Usable security

USABLE SECURITY

HUMAN FACTORS

▸ Memory

▸ Attention

▸ Cognitive load

Page 20: Usable security

USABLE SECURITY

HUMAN FACTORS

▸ Memory

▸ Attention

▸ Cognitive load

▸ Previous context

Page 21: Usable security

PASSWORDS

Page 22: Usable security

WHY ARE PASSWORDS HARD?

Page 23: Usable security
Page 24: Usable security
Page 25: Usable security
Page 26: Usable security
Page 27: Usable security

130 ACCOUNTS PER AMERICAN USER

BLOG.DASHLANE.COM

Page 28: Usable security
Page 29: Usable security

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

….

Page 30: Usable security

MEMORY IS A LIMITED RESOURCE

Page 31: Usable security

WE USE PASSWORDS THAT ARE HARD FOR HUMANS TO REMEMBER, BUT EASY FOR COMPUTERS TO GUESS

XKCD

WWW.XKCD.COM/936

Page 32: Usable security

P@$$w0rd

Page 33: Usable security

FROM SPLASH DATA’S WORST PASSWORDS OF 2015

ATTACKERS ENUMERATE USERNAMES WITH COMMON PASSWORDS

▸ 123456

▸ password

▸ 12345

▸ 12345678

▸ qwerty

▸ 123456789

▸ 1234

▸ baseball

▸ dragon

▸ football

Page 34: Usable security
Page 35: Usable security

WHAT CAN WE DO?

Page 36: Usable security
Page 37: Usable security
Page 39: Usable security
Page 40: Usable security

BE MORE FLEXIBLETAKEAWAY #1

Page 41: Usable security

(BUT NOT TOO FLEXIBLE)TAKEAWAY #1

Page 42: Usable security

SPOT THE SECURITY INFO

Page 43: Usable security
Page 44: Usable security
Page 45: Usable security
Page 46: Usable security
Page 47: Usable security

ATTENTION IS FOCUSED ON THE TASK AT HAND

Page 48: Usable security
Page 49: Usable security
Page 50: Usable security

BE TIMELY & MEANINGFULTAKEAWAY #2

Page 51: Usable security

INTERSTITIALS

Page 52: Usable security
Page 53: Usable security

63% CONTINUED THROUGH THE WARNING

EXPERIMENTING AT SCALE WITH GOOGLE CHROME’S SSL WARNING

Page 54: Usable security
Page 55: Usable security
Page 56: Usable security
Page 57: Usable security

38% CONTINUED THROUGH THE WARNING

EXPERIMENTING AT SCALE WITH GOOGLE CHROME’S SSL WARNING

Page 58: Usable security

MAKING DECISIONS HAS A COST

Page 59: Usable security

OFFER AN OPINIONTAKEAWAY #3

Page 60: Usable security

PHISHING

Page 61: Usable security

HELENONLINE

Page 62: Usable security

HELENONLINE

Page 63: Usable security

THERE’S NO PATCH FOR HUMAN STUPIDITY

Trolls

GENERAL INTERNET WISDOM

Page 64: Usable security

23% AVERAGE OPEN RATE

THREATSIM STATE OF THE PHISH STUDY

Page 65: Usable security

11% AVERAGE CLICK THROUGH RATE

THREATSIM STATE OF THE PHISH STUDY

Page 66: Usable security

YOU DON’T KNOW WHAT YOU DON’T KNOW.

Page 67: Usable security

USERS DO NOT GENERALLY PERCEIVE THE ABSENCE OF A WARNING SIGN.

Chrome Security Team

MARKING HTTP AS NON-SECURE

Page 69: Usable security

HOW BAD IS PHISHING REALLY?

Page 70: Usable security

LABS.FT.COM/2013/05/A-SOBERING-DAY/

Page 71: Usable security

LABS.FT.COM/2013/05/A-SOBERING-DAY/

Page 72: Usable security

LABS.FT.COM/2013/05/A-SOBERING-DAY/

Page 73: Usable security

OUR LAST PHISHING EXAMPLE

GUY GETS PHISHED

Page 74: Usable security

WHAT CAN WE DO?

Page 75: Usable security

INFO.BANKOFAMERICA.COM/NEW-SIGN-IN/

Page 76: Usable security
Page 77: Usable security

KNOW YOUR AUDIENCE

Page 78: Usable security

BE MORE FLEXIBLE BE TIMELY & MEANINGFUL OFFER AN OPINION

USABLE SECURITY

Page 79: Usable security

BE MORE FLEXIBLE BE TIMELY & MEANINGFUL

USABLE SECURITY

Page 80: Usable security

BE MORE FLEXIBLE BE TIMELY & MEANINGFUL OFFER AN OPINION

USABLE SECURITY

Page 81: Usable security

WE’RE HIRING!

RACHEL SIMPSON @RILAN

GUY PODJARNY @GUYPOD

Page 82: Usable security

USABLE SECURITY

RESOURCES

▸ Transforming the ‘weakest link’ – a human/computer interaction approach to usable and effective security (M A Sasse, S Brushoff, D Weirich)

▸ Learning from “Shadow Security” (Iacovos Kirlappos, Simon Parkin, M. Angela Sasse)

▸ Users are not the enemy (Anne Adams, Martina Angela Sasse)

▸ Experimenting at scale with Google Chrome’s SSL Warning (Adrienne Porter Felt, Hazim Almuhimedi, Sunny Consolvo)

▸ Improving SSL Warnings: Comprehension & Adherence (Adrienne Porter Felt, Alex Ainslie, Robert W. Reeder, Sunny Consolvo, Somas Thyagaraja, Alan Bettes, Helen Harris, Jeff Grimes)

▸ The Emperor’s New Security Indicators (Stuart E. Schechter, Rachna Dhamija, Andy Ozment, Ian Fischer)