23
Introduction Security-usability threat model Security and usability evaluation Summary Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing Laboratory Availability, Reliability and Security (ARES) Conference Krakow, Poland 18 February, 2010

Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Security and Usability: Analysis and Evaluation

Ronald Kainda, Ivan Flechais, and A.W. Roscoe

Oxford University Computing Laboratory

Availability, Reliability and Security (ARES) ConferenceKrakow, Poland

18 February, 2010

Page 2: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Outline

1 Introduction

2 Security-usability threat model

3 Security and usability evaluation

4 Summary

Page 3: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction (HCI)

Human-Computer Interaction (HCI)

...discipline concerned with the design, evaluation andimplementation of interactive computing systems for humanuse and with the study of major phenomena surrounding them(Source: SIGCHI, 1992)

Usability

The extent to which a product can be used by specified usersto achieve specified goals with effectiveness, efficiency andsatisfaction in a specified context of use (ISO 9241-11)

Page 4: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction (HCI)

Human-Computer Interaction (HCI)

...discipline concerned with the design, evaluation andimplementation of interactive computing systems for humanuse and with the study of major phenomena surrounding them(Source: SIGCHI, 1992)

Usability

The extent to which a product can be used by specified usersto achieve specified goals with effectiveness, efficiency andsatisfaction in a specified context of use (ISO 9241-11)

Page 5: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction (HCI)

Effectiveness

Efficiency

Satisfaction

Learnability

Memorability

HCI

Page 6: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Technical security

Formal proofs

Focus on malicious attacks

Technical solutions typical

Effective security

Secure systems are socio-technical (Sasse et al.)

Humans forget, make mistakes

Human failures are not covered by formal proofs

Human-Computer Interaction Security (HCISec)

Focusses on the design, evaluation, and implementation ofinteractive secure systems.

Page 7: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Technical security

Formal proofs

Focus on malicious attacks

Technical solutions typical

Effective security

Secure systems are socio-technical (Sasse et al.)

Humans forget, make mistakes

Human failures are not covered by formal proofs

Human-Computer Interaction Security (HCISec)

Focusses on the design, evaluation, and implementation ofinteractive secure systems.

Page 8: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Technical security

Formal proofs

Focus on malicious attacks

Technical solutions typical

Effective security

Secure systems are socio-technical (Sasse et al.)

Humans forget, make mistakes

Human failures are not covered by formal proofs

Human-Computer Interaction Security (HCISec)

Focusses on the design, evaluation, and implementation ofinteractive secure systems.

Page 9: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Security software properties (Whitten, ’99)

Secondary goal property

Hidden failure property

Barn door property

Weakest link property

Abstraction property

Page 10: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Security software properties (Whitten, ’99)

Secondary goal property

Hidden failure property

Barn door property

Weakest link property

Abstraction property

Page 11: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Security software properties (Whitten, ’99)

Secondary goal property

Hidden failure property

Barn door property

Weakest link property

Abstraction property

Page 12: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Security software properties (Whitten, ’99)

Secondary goal property

Hidden failure property

Barn door property

Weakest link property

Abstraction property

Page 13: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human-Computer Interaction Security (HCISec)

Security software properties (Whitten, ’99)

Secondary goal property

Hidden failure property

Barn door property

Weakest link property

Abstraction property

Page 14: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Human Computer Interaction Security (HCISec)

Effectiveness

Efficiency

Satisfaction

Learnability

Memorability

HCI

Secondary goal

Hidden failureBarn door

Weakest linkAbstraction

Secure software

Human Computer Interaction Security

(HCISec)

Page 15: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Analysis and evaluation of secure software

What factors are crucial to usability analysis?

What factors are crucial to security analysis?

How do we use these factors for evaluating security andusability of secure systems?

Page 16: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Security-usability threat model

MemorabilityKnowledge/Skill

Usability Security

User

EffectivenessSatisfactionAccuracyEfficiency

AttentionVigilance

ConditioningMotivation

Social context

Page 17: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Security measurable metrics

Factor MetricsAttention Failures

Vigilance Failures

Conditioning Failures

Motivation Perceived benefits, susceptibility, barriers, severity

Memorability Recall

Knowledge/skill Failures, mental models

Context Impact of context

Page 18: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Process for security and usability evaluation

Identify threat

scenarios

Identify usage

scenarios

Assess ease-of-use

Identify system motivators

Identify external motivators

Assess difficulty-of-use

Identify system de-motivators

Identify external de-motivators

Make recommendations

Security Usability

Page 19: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Make recommendations

Usability factors

Security factors

Conflicting factors

NIST Risk-Level Matrix

ImpactLikelihood Low Medium High

High Low Medium High

Medium Low Medium Medium

Low Low Low Low

Page 20: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Make recommendations

Usability factors

Security factors

Conflicting factors

NIST Risk-Level Matrix

ImpactLikelihood Low Medium High

High Low Medium High

Medium Low Medium Medium

Low Low Low Low

Page 21: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Summary and future work

Conclusion

Secure systems have properties that differentiate them fromother systems

We propose a security-usability threat model

A process for evaluating security and usability is also proposed

Threat scenariosUsage scenarios

Both internal and external factors may cause users to engagein insecure behaviours

Future work

Empirical validation

Extend to malicious users

Developing metrics for comparing different elements of asystem

Page 22: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

Summary and future work

Conclusion

Secure systems have properties that differentiate them fromother systems

We propose a security-usability threat model

A process for evaluating security and usability is also proposed

Threat scenariosUsage scenarios

Both internal and external factors may cause users to engagein insecure behaviours

Future work

Empirical validation

Extend to malicious users

Developing metrics for comparing different elements of asystem

Page 23: Security and Usability: Analysis and Evaluation · 2015-10-05 · Security and Usability: Analysis and Evaluation Ronald Kainda, Ivan Flechais, and A.W. Roscoe Oxford University Computing

Introduction Security-usability threat model Security and usability evaluation Summary

THANK YOU

ANY QUESTIONS?