49
Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University www.cs.cmu.edu/~sadeh Smart Phone Security & Privacy: Smart Phone Security & Privacy: What Should We Teach Our Users? What Should We Teach Our Users?

Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Embed Size (px)

Citation preview

Page 1: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Norman M. SadehProfessor, School of Computer Science

Director, Mobile Commerce Lab.

Carnegie Mellon University

www.cs.cmu.edu/~sadeh

Smart Phone Security & Privacy: Smart Phone Security & Privacy: What Should We Teach Our Users?What Should We Teach Our Users?

Page 2: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 2

Outline

Smart phone security and privacy awareness: unique challenges

Phishing: much worse with smart phone users

What can we do?

Mobile Apps and Social Networking

What we can we teach users?

Concluding remarks

Q&A

Page 3: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 3

SMART PHONE SECURITY and PRIVACY AWARENESS:UNIQUE CHALLENGES

Page 4: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 4

Cyber Security Training Awareness

…Has been compared to trying to nail Jell-O to a wall

Page 5: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Yet…

Filters, firewalls, IDS etc. have their limitations

Users are the last line of defense

Universities: A Dual Objective

Protect the university’s infrastructure and sensitive data

Educational mission

EDUCAUSE Webinar – April 2011 - Slide 5

Page 6: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Universities

Diversity of users Faculty, staff, students

Diversity of cultures and environments Fragmented administration

Diversity of needs Research vs. education vs. admin

Diversity of devices Some managed & some not

...Yet the price of security breaches can be dire…

EDUCAUSE Webinar – April 2011 - Slide 6

Page 7: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Smart Phones: The New Frontier

EDUCAUSE Webinar – April 2011 - Slide 7

Smart Phone Adoption to

Approach 50% in the US

in 2011

Page 8: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 8

Our cell phones are now coming with the same vulnerabilities we have on our computers…

…Along the Way…

…and more…

Page 9: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Universities at High Risk

EDUCAUSE Webinar – April 2011 - Slide 9

University

Students…

Page 10: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Mobile Email & Social Networking are Big

EDUCAUSE Webinar – April 2011 - Slide 10

Page 11: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Diversity of Devices & OS’s

EDUCAUSE Webinar – April 2011 - Slide 11

Best practices are harder to articulate

Page 12: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 12

The Biggest Security Risk?

Millions of cell phones lost or stolen each year

Page 13: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 13

Lost or Stolen Phone….

Private data & sensitive apps

e.g. contacts list, pictures, phone calls, messages, email, calendar, apps, etc

Risk of someone using your phone

Impersonating you – SMS, voice, email, social networks, etc.

Placing expensive international calls

Reselling your phone

etc.

Page 14: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 14

What Can We Teach?

Don’t leave your phone unattended

Goes beyond theft and loss: malware is easy to install

Use a PIN to protect your cell phone

Different options (e.g. iPhone)

Write down your IMEI number as well as phone make and model and cell phone number

Quickly report lost/stolen phone

Page 15: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Quickly Tips Become Device-Specific

EDUCAUSE Webinar – April 2011 - Slide 15

Requires MobileMe Loud noise + contact info + map

Page 16: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 16

Remote Erase

A number of solutions…

…Hopefully you’ve backed up your data

…Some products combine both back up and “remote wipe”

Watch out for malware - read reviews and select reputable solutions…

Page 17: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 17

Dangers of Multi-Tasking

Phone call, SMS, email, etc.

While driving, crossing the street..

•Illegal in some places

•Not wise elsewhere

Page 18: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 18

Understanding the risks…

Even more challenging than on a computer

Cell phones are highly personal devices with access to lots of sensitive information

…yet fewer people understand the risks

Lots of different cell phone models

Not all with the same functionality or settings…

Users need to invest time in understanding and tweaking their security settings

Page 19: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Different Activities Lead to Different Risks

Voice

Email

SMS

Bluetooth

Browsing

WiFi

Location

App Downloads

Social networks

…and more

EDUCAUSE Webinar – April 2011 - Slide 19

…A rather daunting

task…

Page 20: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 20

PHISHING: MUCH WORSE ON SMART PHONES

Page 21: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

E-Mail Phishing: Worse on Mobile Phones

Trusteer – Jan 2011:

Mobile users are first to arrive at phishing websites

Mobile users 3x more likely to submit credentials than desktop users

EDUCAUSE Webinar – April 2011 - Slide 21

Page 22: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Beyond e-mail Phishing

SMS-ishing

Vishing

IM phishing

Phishing via social networks

Phishing apps

EDUCAUSE Webinar – April 2011 - Slide 22

Page 23: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

What To Do?

Better filters can help

Most spam filters rely on manually maintained blacklists that are several hours behind

Example: Wombat’s PhishPatrol

Teach people to recognize traps in phishing emails

EDUCAUSE Webinar – April 2011 - Slide 23

Page 24: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 24

Teach people in the context they would be attacked

If a person falls for simulated phish, then show intervention as to what just happened

Unique “teachable moment”

Training via Mock Attacks: PhishGuru

Page 25: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 25EDUCAUSE Webinar – April 2011 - Slide 25

Select

Target

Employees

Customize

Fake

Phishing

Email

Page 26: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 26EDUCAUSE Webinar – April 2011 - Slide 26

Select

Target

Employees

Customize

Fake

Phishing

Email

Select

Training

Page 27: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 27EDUCAUSE Webinar – April 2011 - Slide 27

Select

Target

Employees

Customize

Fake

Phishing

Email

Select

Training

Internal

Test and

Approval

Process

Hit

Send

Page 28: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 28EDUCAUSE Webinar – April 2011 - Slide 28

Select

Target

Employees

Customize

Fake

Phishing

Email

Select

Training

Internal

Test and

Approval

Process

Hit

Send

Monitor

& Analyze

Employee

Response

Page 29: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 29

0 10 20 30 40

Campaign 3

Campaign 2

Campaign 1

Viewed Email and Clicked Link

Viewed Email Only

It works!

Reduces the chance of falling for an attack by more than 50% !

(Actual Results)

percentage

Page 30: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Reinforce with Training Modules – Incl. Games

EDUCAUSE Webinar – April 2011 - Slide 30

• Traditional training doesn’t work - but people like games

• Games teach users about phishing

• People more willing to play games than read training

• Shows higher long-term retention

Page 31: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 31

Teaches people to identify “red flags”

in fraudulent emails

Page 32: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Phishing is a Generic Threat

It is possible to identify device-independent tips and strategies

It is possible to teach these tips and strategies in a matter of minutes

Universities like CMU are using PhishGuru and training games (Phil and Phyllis training games) to train staff, faculty and students

A dedicated anti-phishing email filter can also make a difference (e.g. PhishPatrol)

EDUCAUSE Webinar – April 2011 - Slide 32

Page 33: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 33

MOBILE APPS & SOCIAL NETWORKING: WHAT CAN WE TEACH USERS?

Page 34: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 34

Social Networking – Facebook, Twitter & Co.

Sharing is wonderful…

…until you regret you did it

Think and ask yourself whether: You really know who you are sharing with

A week or a year from now, you’ll still be happy you did

Colleagues, friends, new acquaintances…

Beware of pictures and links that seem to come from friends….

Page 35: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 35

All Those Great Apps

Page 36: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 36

Malicious Apps

In January of 2010, the first malicious mobile banking app was detected

Stole your banking credentials

Android doesn’t review applications

Apple does, but that’s no guarantee

Many apps collect a lot more information than they need to – e.g. location

Page 37: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 37

Some Recommendations

Research apps before you download them

Best to wait until enough other people have tried them

Check ratings – but do not rely entirely on them

If you are courageous, take time to review privacy provisions

Possibly create a Google alert for apps you download

Page 38: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 38

Location Sharing Apps.

Page 39: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 39

Also referred to by some as…

Page 40: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 40

If you are going to share

your location, at least do it under conditions you

control

Page 41: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 41

Promoting Our Own Location Sharing Platform

More expressive privacy settings “My colleagues can only see

my location when I’m on campus and only weekdays 9am-5pm”

Invisible button Auditing functionality Available on Android Market,

iPhone client, Ovi, laptop clients Tens of thousands of downloads

over the past year

www.locaccino.org

Page 42: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 42

Page 43: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 43

Page 44: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 44

Page 45: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 45

Page 46: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 46

CONCLUDING REMARKS

Page 47: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

Concluding Remarks

EDUCAUSE Webinar – April 2011 - Slide 47

Cell phones are wonderful devices …

Most of us can’t even remember how we could operate without them

…Yet they come with many risks

…General guidelines are difficult to articulate

Diversity of cell phones and usage scenarios

Yet in some areas such as phishing, results indicate that training can make a difference

We are extending this approach to mobile security at large

Page 48: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh EDUCAUSE Webinar – April 2011 - Slide 48

http://wombatsecurity.com

http://mcom.cs.cmu.edu

Q&A

Page 49: Norman M. Sadeh Professor, School of Computer Science Director, Mobile Commerce Lab. Carnegie Mellon University sadeh Smart Phone Security

Copyright © 2007-2011 Norman M. Sadeh

References Scientific References

How to Foil “Phishing Scams”, Scientific American, L. Cranor

Teaching Johnny Not to Fall for PhishP. Kumaraguru, S. Sheng, A. Acquisti, L. Cranor, and J. Hong. ACM Transactions on Internet Technology, Vol. V, No. N, September 2009, Pages 1–31.

Learning to Detect Phishing EmailsI. Fette, N. Sadeh, and A. Tomasic. In Proceedings of the 16th International Conference on World Wide Web, Banff, Alberta,  Canada, May 8-12, 2007.

Locaccino scientific publications: www.locaccino.org/science

Case Studies & White Papers

“A Multi-Pronged Approach to Combat Phishing (Carnegie Mellon University case study)”

“Empirical Evaluation of PhishGuru Embedded Training”,

“Cyber Security Training Game Teaches People to Avoid Phishing Attacks”

EDUCAUSE Webinar – April 2011 - Slide 49