design for security
play

Design for Security Serena Chen | @Sereeena | OReilly Velocity 2018 - PowerPoint PPT Presentation

Design for Security Serena Chen | @Sereeena | OReilly Velocity 2018 Usability Security Good user experience design and good security cannot exist without each other Everyone deserves to be secure without being experts We need to


  1. Design for Security Serena Chen | @Sereeena | O’Reilly Velocity 2018

  2. Usability Security

  3. Good user experience design and good security cannot exist without each other

  4. Everyone deserves to be secure without being experts

  5. We need to stop expecting people to become security experts

  6. “I don’t care about security.” –Everyone not watching Mr Robot right now

  7. “Given a choice between dancing pigs and security, the user will pick dancing pigs every time.” –MCGRAW, G., FELTEN, E., AND MACMICHAEL, R. 
 Securing Java: getting down to business with mobile code. Wiley Computer Pub., 1999

  8. CATS “Given a choice between dancing pigs and security, the user will pick dancing CATS pigs every time.” –Serena Chen, not allowed pets in her apartment

  9. Shaming people is lazy

  10. Obligatory xkcd: https://xkcd.com/149/

  11. “I don’t care about security.” –Everyone not watching Mr Robot right now

  12. “I care!!!” –Serena Chen, lone nerd screaming into the void

  13. Design thinking is another tool in the problem solving tool belt

  14. For your consideration: 1. 2. 3. 4.

  15. For your consideration: 1. Paths of Least Resistance 2. 3. 4.

  16. Paths of Least Resistance

  17. To stop internet, press firmly

  18. Consider the 
 “secure by default” principle

  19. Normalise security

  20. Group similar tasks

  21. People are lazy efficient

  22. Align your goals with the end user’s goals

  23. “I KNOW HOW TO INTERNET”

  24. “I KNOW HOW TO INTERNET” —Serena Chen, 
 a Real Human Adult ™

  25. “I KNOW HOW TO INTERNET” —Serena Chen, 
 a Real Human Adult ™

  26. Path of (Perceived) Least Resistance

  27. “Each false alarm reduces the credibility of a warning system.” –S. Breznitz and C. Wolf. The psychology of false alarms. 
 Lawrence Erbaum Associates, NJ, 1984

  28. Anderson et al. How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study. In Proceedings of CHI , 2015

  29. Shadow IT is a massive vulnerability

  30. Illustration by Megan Pendergrass

  31. Fixing bad paths • Use security tools for security concerns , not management concerns • If you block enough non-threats, people will get really good at subverting your security

  32. Building good paths • Don’t make me think! • Make the secure path the easiest path • e.g. BeyondCorp model at Google

  33. “We designed our tools so that the user- facing components are clear and easy to use. […] For the vast majority of users, BeyondCorp is completely invisible. –V. M. Escobedo, F. Zyzniewski, B. (A. E.) Beyer, M. Saltonstall, “BeyondCorp: The User Experience”, Login, 2017

  34. Align your goals with the end user’s goals

  35. For your consideration: 1. Paths of Least Resistance 2. 3. 4.

  36. For your consideration: 1. Paths of Least Resistance 2. Intent 3. 4.

  37. Intent

  38. Tension between usability and security happens when we cannot accurately determine intent.

  39. “make it easy” “lock it down”

  40. It is not our job to make everything easy

  41. It is not our job to make everything locked down

  42. Our job is to make a specific action • that a specific user wants to take • at that specific time • in that specific place …easy Everything else we can lock down.

  43. Knowing intent = usability and security without compromise

  44. For your consideration: 1. Paths of Least Resistance 2. Intent 3. 4.

  45. For your consideration: 1. Paths of Least Resistance 2. Intent 3. (Mis)communication 4.

  46. (Mis)communication

  47. Wherever there is a miscommunication, there exists a human security vulnerability.

  48. What are you unintentionally miscommunicating?

  49. Wherever there is a miscommunication, there exists a human security vulnerability.

  50. (I didn’t actually do this)

  51. https://security.googleblog.com/2018/02/a-secure-web-is-here-to-stay.html

  52. Do your end users know 
 what you’re trying to communicate?

  53. What is their mental model of what’s happening, compared to yours?

  54. For your consideration: 1. Intent 2. Path of Least Resistance 3. (Mis)communication 4.

  55. For your consideration: 1. Intent 2. Path of Least Resistance 3. (Mis)communication 4. Mental model matching

  56. Mental models

  57. It’s the user’s expectations that define whether a system is secure or not.

  58. “A system is secure from a given user’s perspective if the set of actions that each actor can do are bounded by what the user believes it can do .” –Ka-Ping Yee, “User Interaction Design for Secure Systems”, 
 Proc. 4th Int’l Conf. Information and Communications Security, Springer-Verlag, 2002

  59. Find their model, match to that + Influence their model, match to system

  60. Find their model • Go to customer sessions! • Observe end users • Infer intent through context

  61. Influence their model • When we make, we teach • Whenever someone interacts with us / 
 a thing we made, they learn. • Path of least resistance becomes the default “way to do things”.

  62. How are we already influencing users’ models?

  63. iOS Phish https://krausefx.com/blog/ios-privacy-stealpassword-easily-get-the-users-apple-id-password-just-by-asking

  64. What are we teaching?

  65. “I KNOW HOW TO INTERNET” —Serena Chen, 
 a Real Human Adult ™

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend