Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan - - PowerPoint PPT Presentation

security and usability analysis and evaluation
SMART_READER_LITE
LIVE PREVIEW

Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan - - PowerPoint PPT Presentation

Introduction Security-usability threat model Security and usability evaluation Summary Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing Laboratory Availability,


slide-1
SLIDE 1

Introduction Security-usability threat model Security and usability evaluation Summary

Security and Usability: Analysis and Evaluation

Ronald Kainda, Ivan Flechais, and A.W. Roscoe

Oxford University Computing Laboratory Availability, Reliability and Security (ARES) Conference Krakow, Poland

18 February, 2010

slide-2
SLIDE 2

Introduction Security-usability threat model Security and usability evaluation Summary

Outline

1

Introduction

2

Security-usability threat model

3

Security and usability evaluation

4

Summary

slide-3
SLIDE 3

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction (HCI)

Human-Computer Interaction (HCI) ...discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them (Source: SIGCHI, 1992)

slide-4
SLIDE 4

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction (HCI)

Human-Computer Interaction (HCI) ...discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them (Source: SIGCHI, 1992) Usability The extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use (ISO 9241-11)

slide-5
SLIDE 5

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction (HCI)

Effectiveness Efficiency Satisfaction Learnability Memorability HCI

slide-6
SLIDE 6

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Technical security Formal proofs Focus on malicious attacks Technical solutions typical

slide-7
SLIDE 7

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Technical security Formal proofs Focus on malicious attacks Technical solutions typical Effective security Secure systems are socio-technical (Sasse et al.) Humans forget, make mistakes Human failures are not covered by formal proofs

slide-8
SLIDE 8

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Technical security Formal proofs Focus on malicious attacks Technical solutions typical Effective security Secure systems are socio-technical (Sasse et al.) Humans forget, make mistakes Human failures are not covered by formal proofs Human-Computer Interaction Security (HCISec) Focusses on the design, evaluation, and implementation of interactive secure systems.

slide-9
SLIDE 9

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Security software properties (Whitten, ’99) Secondary goal property

slide-10
SLIDE 10

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Security software properties (Whitten, ’99) Secondary goal property Hidden failure property

slide-11
SLIDE 11

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Security software properties (Whitten, ’99) Secondary goal property Hidden failure property Barn door property

slide-12
SLIDE 12

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Security software properties (Whitten, ’99) Secondary goal property Hidden failure property Barn door property Weakest link property

slide-13
SLIDE 13

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Security software properties (Whitten, ’99) Secondary goal property Hidden failure property Barn door property Weakest link property Abstraction property

slide-14
SLIDE 14

Introduction Security-usability threat model Security and usability evaluation Summary

Human Computer Interaction Security (HCISec)

Effectiveness Efficiency Satisfaction Learnability Memorability HCI Secondary goal Hidden failure Barn door Weakest link Abstraction Secure software Human Computer Interaction Security (HCISec)

slide-15
SLIDE 15

Introduction Security-usability threat model Security and usability evaluation Summary

Analysis and evaluation of secure software

What factors are crucial to usability analysis? What factors are crucial to security analysis? How do we use these factors for evaluating security and usability of secure systems?

slide-16
SLIDE 16

Introduction Security-usability threat model Security and usability evaluation Summary

Security-usability threat model

Memorability Knowledge/Skill Usability Security User Effectiveness Satisfaction Accuracy Efficiency Attention Vigilance Conditioning Motivation Social context

slide-17
SLIDE 17

Introduction Security-usability threat model Security and usability evaluation Summary

Security measurable metrics

Factor Metrics Attention Failures Vigilance Failures Conditioning Failures Motivation Perceived benefits, susceptibility, barriers, severity Memorability Recall Knowledge/skill Failures, mental models Context Impact of context

slide-18
SLIDE 18

Introduction Security-usability threat model Security and usability evaluation Summary

Process for security and usability evaluation

Identify threat scenarios Identify usage scenarios Assess ease-of-use Identify system motivators Identify external motivators Assess difficulty-of-use Identify system de-motivators Identify external de-motivators Make recommendations Security Usability

slide-19
SLIDE 19

Introduction Security-usability threat model Security and usability evaluation Summary

Make recommendations

Usability factors Security factors Conflicting factors

slide-20
SLIDE 20

Introduction Security-usability threat model Security and usability evaluation Summary

Make recommendations

Usability factors Security factors Conflicting factors NIST Risk-Level Matrix Impact Likelihood Low Medium High High Low Medium High Medium Low Medium Medium Low Low Low Low

slide-21
SLIDE 21

Introduction Security-usability threat model Security and usability evaluation Summary

Summary and future work

Conclusion Secure systems have properties that differentiate them from

  • ther systems

We propose a security-usability threat model A process for evaluating security and usability is also proposed

Threat scenarios Usage scenarios

Both internal and external factors may cause users to engage in insecure behaviours

slide-22
SLIDE 22

Introduction Security-usability threat model Security and usability evaluation Summary

Summary and future work

Conclusion Secure systems have properties that differentiate them from

  • ther systems

We propose a security-usability threat model A process for evaluating security and usability is also proposed

Threat scenarios Usage scenarios

Both internal and external factors may cause users to engage in insecure behaviours Future work Empirical validation Extend to malicious users Developing metrics for comparing different elements of a system

slide-23
SLIDE 23

Introduction Security-usability threat model Security and usability evaluation Summary

THANK YOU

ANY QUESTIONS?