SLIDE 1 Design for Security
Serena Chen | @Sereeena | O’Reilly Velocity 2018
SLIDE 2
SLIDE 3
Usability Security
SLIDE 4 Good user experience design and good security cannot exist without each
SLIDE 5
Everyone deserves to be secure without being experts
SLIDE 6
We need to stop expecting people to become security experts
SLIDE 7 –Everyone not watching Mr Robot right now
“I don’t care about security.”
SLIDE 8 –MCGRAW, G., FELTEN, E., AND MACMICHAEL, R.
Securing Java: getting down to business with mobile code. Wiley Computer Pub., 1999
“Given a choice between dancing pigs and security, the user will pick dancing pigs every time.”
SLIDE 9 –Serena Chen, not allowed pets in her apartment
“Given a choice between dancing pigs and security, the user will pick dancing pigs every time.”
CATS CATS
SLIDE 10
SLIDE 11
SLIDE 12
SLIDE 13
SLIDE 14
SLIDE 15
臘
SLIDE 16
Shaming people is lazy
SLIDE 17 Obligatory xkcd: https://xkcd.com/149/
SLIDE 18 –Everyone not watching Mr Robot right now
“I don’t care about security.”
SLIDE 19 –Serena Chen, lone nerd screaming into the void
“I care!!!”
SLIDE 20
SLIDE 21
SLIDE 22
SLIDE 23
SLIDE 24
Design thinking is another tool in the problem solving tool belt
SLIDE 25
For your consideration:
1. 2. 3. 4.
SLIDE 26 For your consideration:
- 1. Paths of Least Resistance
2. 3. 4.
SLIDE 27
Paths of Least Resistance
SLIDE 28
SLIDE 29
SLIDE 30
SLIDE 31
To stop internet, press firmly
SLIDE 32
SLIDE 33
Consider the
“secure by default” principle
SLIDE 34
SLIDE 35
SLIDE 36
Normalise security
SLIDE 37
SLIDE 38
Group similar tasks
SLIDE 39
People are lazy efficient
SLIDE 40
Align your goals with the end user’s goals
SLIDE 41
SLIDE 42
“I KNOW HOW TO INTERNET”
SLIDE 43 “I KNOW HOW TO INTERNET”
—Serena Chen,
a Real Human Adult™
SLIDE 44 “I KNOW HOW TO INTERNET”
—Serena Chen,
a Real Human Adult™
SLIDE 45
Path of (Perceived) Least Resistance
SLIDE 46 –S. Breznitz and C. Wolf. The psychology of false alarms.
Lawrence Erbaum Associates, NJ, 1984
“Each false alarm reduces the credibility
SLIDE 47 Anderson et al. How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study. In Proceedings of CHI, 2015
SLIDE 48
Shadow IT is a massive vulnerability
SLIDE 49
SLIDE 50
SLIDE 51
SLIDE 52 Illustration by Megan Pendergrass
SLIDE 53 Fixing bad paths
- Use security tools for security concerns, not
management concerns
- If you block enough non-threats, people
will get really good at subverting your security
SLIDE 54 Building good paths
- Don’t make me think!
- Make the secure path the easiest path
- e.g. BeyondCorp model at Google
SLIDE 55 “We designed our tools so that the user- facing components are clear and easy to
- use. […] For the vast majority of users,
BeyondCorp is completely invisible.
–V. M. Escobedo, F. Zyzniewski, B. (A. E.) Beyer, M. Saltonstall,
“BeyondCorp: The User Experience”, Login, 2017
SLIDE 56
SLIDE 57
Align your goals with the end user’s goals
SLIDE 58 For your consideration:
- 1. Paths of Least Resistance
2. 3. 4.
SLIDE 59 For your consideration:
- 1. Paths of Least Resistance
- 2. Intent
3. 4.
SLIDE 60
Intent
SLIDE 61
Tension between usability and security happens when we cannot accurately determine intent.
SLIDE 62
“make it easy” “lock it down”
SLIDE 63
It is not our job to make everything easy
SLIDE 64
It is not our job to make everything locked down
SLIDE 65 Our job is to make a specific action
- that a specific user wants to take
- at that specific time
- in that specific place
…easy Everything else we can lock down.
SLIDE 66
Knowing intent = usability and security without compromise
SLIDE 67
SLIDE 68
SLIDE 69
SLIDE 70
SLIDE 71 For your consideration:
- 1. Paths of Least Resistance
- 2. Intent
3. 4.
SLIDE 72 For your consideration:
- 1. Paths of Least Resistance
- 2. Intent
- 3. (Mis)communication
4.
SLIDE 73
(Mis)communication
SLIDE 74
Wherever there is a miscommunication, there exists a human security vulnerability.
SLIDE 75
What are you unintentionally miscommunicating?
SLIDE 76
SLIDE 77
Wherever there is a miscommunication, there exists a human security vulnerability.
SLIDE 78
SLIDE 79
SLIDE 80
SLIDE 81
SLIDE 82
(I didn’t actually do this)
SLIDE 83 https://security.googleblog.com/2018/02/a-secure-web-is-here-to-stay.html
SLIDE 84
Do your end users know
what you’re trying to communicate?
SLIDE 85 What is their mental model
compared to yours?
SLIDE 86 For your consideration:
- 1. Intent
- 2. Path of Least Resistance
- 3. (Mis)communication
4.
SLIDE 87 For your consideration:
- 1. Intent
- 2. Path of Least Resistance
- 3. (Mis)communication
- 4. Mental model matching
SLIDE 88
Mental models
SLIDE 89
It’s the user’s expectations that define whether a system is secure or not.
SLIDE 90
SLIDE 91
SLIDE 92 –Ka-Ping Yee, “User Interaction Design for Secure Systems”,
- Proc. 4th Int’l Conf. Information and Communications Security, Springer-Verlag, 2002
“A system is secure from a given user’s perspective if the set of actions that each actor can do are bounded by what the user believes it can do.”
SLIDE 93
Find their model, match to that Influence their model, match to system
+
SLIDE 94 Find their model
- Go to customer sessions!
- Observe end users
- Infer intent through context
SLIDE 95 Influence their model
- When we make, we teach
- Whenever someone interacts with us /
a thing we made, they learn.
- Path of least resistance becomes the default
“way to do things”.
SLIDE 96
How are we already influencing users’ models?
SLIDE 97 https://krausefx.com/blog/ios-privacy-stealpassword-easily-get-the-users-apple-id-password-just-by-asking
iOS Phish
SLIDE 98
What are we teaching?
SLIDE 99 “I KNOW HOW TO INTERNET”
—Serena Chen,
a Real Human Adult™
SLIDE 100
SLIDE 101
Understand end user mental models
SLIDE 102
SLIDE 103
What are your users’ mental models?
SLIDE 104
Review
SLIDE 105
SLIDE 106 Takeaways
- Cross pollination is rare. This is a missed
- pportunity!
- Our jobs are about outcomes based on our
specific goals
- Align the user’s goals to your security goals
SLIDE 107 Takeaways
- Aim to know their intent
- Collaborate with design to craft secure
paths of least resistance
- Understand their mental model vs yours
- Communicate to that model
SLIDE 108
One final anecdote…
SLIDE 109
SLIDE 110
SLIDE 111
SLIDE 112 Thanks!
Fight me @Sereeena