+ All Categories
Home > Documents > Glenn Fink [email protected] finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf ·...

Glenn Fink [email protected] finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf ·...

Date post: 10-Oct-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
22
1 Usability and Security Glenn Fink [email protected] http://csgrad.cs.vt.edu/~finkga/
Transcript
Page 1: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

1

Usability and Security

Glenn [email protected]://csgrad.cs.vt.edu/~finkga/

Page 2: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 2

Papers

♦ Reading List– Whitten & Tygar, Why Johnny Can't Encrypt: A

Usability Evaluation of PGP 5.0– Balfanz, et al., In Search of Usable Security: Five

Lessons from the Field– Zurko & Simon, User-Centered Security– Yee, Aligning Security and Usability

♦ Other Papers– Good & Krekelberg, Usability and Privacy: A Study of

Kazaa P2P File-Sharing– Adams & Sasse, Users are not the Enemy

Page 3: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 3

Why Johnny Can’t Encrypt

♦ Intelligent users couldn’t figure out how to encrypt their e-mail within 90 minutes

♦ Usable security cannot be achieved via normal usability approaches– Neat organization and display are insufficient– Must evaluate security as a secondary user goal– Need a new usability standard

♦ Inherent UI problems for security software– Users are unmotivated by security and overly optimistic– Security is intrinsically abstract– System must figure out user’s intent– Security is rife with irreversible actions– Security is only as strong as the weakest link

Page 4: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 4

In Search of Usable Security

♦ Usability is an essential element of secure systems♦ Decentralization: Users must be empowered to

make security decisions♦ Five Lessons Learned:

– You can’t retrofit usable security– Tools are building blocks, not solutions– Solve security problems at user-level in user terms– Conduct usability studies with normal users– Tailor the solution to the local problem

Page 5: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 5

User-Centered Security

♦ Goal: Make usability a primary goal of security ♦ Traditional problems with security usability

– Secure systems were notoriously unusable– Underlying mathematical models do not guarantee a

system that models user intentions well– Least privilege is hard to implement in a user-friendly

way♦ Three possible approaches to usable security:

– Apply usability to existing secure systems– Apply security to existing usable systems– User-centered security design (from the start)

Page 6: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 6

Aligning Security and Usability

♦ Develop usability and security goals together in an iterative design

♦ Infer program authorization from user’s actions by paying attention to indications of his intent

♦ Security by Admonition or Designation: – Admonition: Start with full user authority and require explicit user

authorization when a user requests a risky action– Designation: Start with minimal authority and take users actions

as indication that the software has his authorization♦ Security by designation may require finer-grained access

controls but is often achievable transparently

Page 7: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 7

Kazaa Usability and PrivacyGood, N.S. and Krekelberg, A. Usability and privacy: a study of Kazaa P2P file-sharing, HP Laboratories, Palo Alto, CA 94304, 2003, 1-9.

♦ Kazaa is a P2P file-sharing application♦ Problems noted:

– Not clear what files are being shared• More than just the “My Shared Folder” contents

– Not clear how to start and stop sharing• Misleading indications about sharing status

– Easy to unintentionally share private files– Lack of confidence in correct operation

♦ EULA Problems:– Unwittingly become part of a grid computer!

Page 8: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 8

Users are not the Enemy

♦ Security policy may be its own worst enemy– Myth: Users are always against security– Fact: Users sometimes subvert intrusive security

measures• Ex: Having multiple, different, complex passwords• Ex: Being forced to change passwords too often

♦ Communication with users is required– Users sometimes do not understand security

• But this is often the fault security personnel– Security personnel often have not taken the time to

understand the users’ work context

Adams, A. and Sasse, M.A. Users are not the Enemy. Communications of the ACM, 42 (12). 40-46.

Page 9: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 9

Goals of Usable Security

♦Ultimate Goal: Safe, functional systems– Usability: an essential element of secure

systems– Security: contributes to safety, predictability,

and thus Usability♦ Intermediate Goal: Raise the awareness of

future designers about:– The difficulty of the problem– The criticality of finding solutions

Page 10: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 10

Problems with Security Usability

♦ Usability itself is hard– HCI is really mediated HHI

• Human interactions present intractable problems– Computers must support users’ intentions

♦ Secure usability is harder than normal HCI– There is an active, intelligent enemy– The threat is often invisible to users– Underlying security mechanisms are often obscure– Usability and Security can appear to be at odds

• Security seen as a way to watch and restrict users rather than to help them with their tasks

Page 11: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 11

An Active, Intelligent Enemy

♦Rate of new attacks continues to increase– Worms, virii, phishing, etc.

♦Number of attackers growing rapidly– Hacking tools built for reuse

♦Most every security tool can be used offensively as well as defensively

♦Builders’ crisis of imagination w.r.t. security

Page 12: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 12

An Invisible Threat

♦ Users cannot see suspicious activity of their machines unless it interferes with usability– Surreptitious network connections– Accesses to system address book– Suspicious kernel routine calls– New software installed in system areas

♦ Users prefer to believe that the system security is working and protecting them

♦ Users do not believe they will be attacked until it is too late

Page 13: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 13

An Obscure Protection

♦ Protection mechanisms are based on mathematical models– Access calculus, Bell and Lapadula model– Inaccessible to average users– Often designed for military use– Often not designed for user’s needs or intentions

♦ Security by Admonition– Too many false alarms– Makes users repeat their intentions– Misdiagnoses user intentions

Page 14: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 14

A Conflict of Interests?

SecuritySecurityUsabilityUsability

♦ Legacy security systems are unusable♦ Legacy user applications are insecure♦ Hackers pay more attention to the human side

than the machine side♦ Users will try to circumvent onerous security

Page 15: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 15

Costs of Unusable Security

♦Danger of serious user error– Loss of privacy– Potential for fraud– Lost revenue– Lost productivity

♦Danger of serious program error– Unexpected program behavior– Irreversible actions

Page 16: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 16

Approaches to Usable Security

♦Respect the complexity of the problem♦Build security and usability in from the start

– Conduct formative usability evaluations♦Build them together in an iterative design♦Build security around the users’ needs

– Solve the problem in the users’ terms and at their levels of abstraction

Page 17: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 17

Respect the Complexity

♦Realize that users have complex needs♦Software is seldom used as designed♦Successful software will be used in

unpredictable ways♦Attackers will use the software in perverse

ways

Page 18: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 18

Right from the Start

♦Realize that the user is not the enemy– Keep the user informed– Avoid an authoritarian mindset– Tap into the user’s desire to be secure

♦Tailor security to work practices– Study the user: Contextual Design– Avoid cookbook approaches to security– Challenge textbook security thinking

Page 19: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 19

Usability Evaluations

♦Conduct “Discount” Usability Evaluations– User testing with low-fidelity prototypes– Heuristic Evaluation– Cognitive Walkthrough

♦Conduct Full Laboratory Evaluations– Use tasks that are representative of common

user activities♦Conduct Contextual Inquiry

Page 20: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 20

Hand in Hand

UsabilityUsability Security

Security

♦ Build usability and security together– Not as separate, competing features

• Requires communication on the software team• Implies iterative design

♦ Consider both as part of the software engineering process

Page 21: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 21

User-Centered

♦Design security to meet users’ needs– But first you must find out what these are

♦Employ lessons learned from the literature– Common security pitfalls– Typical usability failures

♦Use Security by Designation where possible

Page 22: Glenn Fink finkga@vt.edu finkga/people.cs.vt.edu/~kafura/cs6204/Presentations/Usability.pdf · ♦Rate of new attacks continues to increase – Worms, virii, phishing, etc. ♦Number

Presenter: Glenn FinkCS 6204 – Spring 2005 22

Conclusions

♦Security is not intrinsically antithetical to usability

♦Usability and security are both required– By users’ desires and needs– By good engineering practice

♦Security and usability are both hard problems to solve– To reap the benefits, be prepared to pay the

costs


Recommended