44
Human/User-Centric Security Dr Shujun Li Deputy Director, Surrey Centre for Cyber Security (SCCS) Senior Lecturer, Department of Computer Science University of Surrey, Guildford http://www.hooklee.com/ @hooklee75

Human/User-Centric Security

Embed Size (px)

Citation preview

Page 1: Human/User-Centric Security

Human/User-Centric Security

Dr Shujun LiDeputy Director, Surrey Centre for Cyber Security (SCCS)

Senior Lecturer, Department of Computer ScienceUniversity of Surrey, Guildford

http://www.hooklee.com/@hooklee75

Page 2: Human/User-Centric Security

User-centric security

GCHQ new (2016) password guidance

Page 3: Human/User-Centric Security

3

GCHQ new password guidance

Page 4: Human/User-Centric Security

4

GCHQ new password guidance

Page 5: Human/User-Centric Security

5

Case study:Password expiry policy

Page 6: Human/User-Centric Security

6

Case study:Password expiry policy @ Surrey

Page 7: Human/User-Centric Security

User-centric security

Let us look at more about passwords!

Page 8: Human/User-Centric Security

8

How many passwords are there?

- 4 digits (PINs): 104=10 thousand≈213.3

- 6 digits (PINs): 106=1 million≈220

- Lowercase letters only, 7 characters: 267≈8 million≈233

- Lowercase letters + digits, 7 characters: 367≈78.4 million≈236

- Lowercase & uppercase letters + digits, 7 characters: 627≈10 trillion≈242

- Lowercase & uppercase letters + digits, 11 characters: 6211≈52 quintillion≈265.5

Page 9: Human/User-Centric Security

9

How fast are today’s supercomputers?

10EFlops=1019263

Page 10: Human/User-Centric Security

10

What passwords are being used?

- Dinei Florêncio and Cormac Herley, “A Large-Scale Study of Web Password Habits,” in Proc. WWW 2007, W3C/ACM- Real passwords collected from 544,960 web users in

three months in 2006.

Page 11: Human/User-Centric Security

11

What passwords are being used?

- DataGenetics, PIN analysis, 3rd September 2012- 3.4 million leaked passwords composed of 4 digits.

xy00

999900xy 19xy

mmdd

xyxy

Page 12: Human/User-Centric Security

12

Password cracking: 1979

- R. Morris and K. Thomson, “Password security: A case history,” Communications of the ACM, vol. 22, no.11, 1979- In a collection of 3,289 passwords…

- 15 were a single ASCII character- 72 were strings of two ASCII characters- 464 were strings of three ASCII characters- 477 were strings of four alphamerics- 706 were five letters, all upper-case or all lower-case- 605 were six letters, all lower-case- 492 appeared in dictionaries, name lists, and the like

2,831 passwords

Page 13: Human/User-Centric Security

13

Password cracking: 1990

- Daniel V. Klein, “Foiling the Cracker: A Survey of, and Improvements to, Password Security,” in Proc. USENIX Workshop on Security, 1990- In a set of 15,000 passwords

- 25% were cracked within 12 CPU months- 21% were cracked in the first week- 2.7% were cracked within the first 15 minutes

Page 14: Human/User-Centric Security

14

Password cracking: 2005

- Arvind Narayanan and Vitaly Shmatikov, “Fast dictionary attacks on passwords using time-space tradeoff,” in Proc. CCS’2005, ACM- In a collection of 142 real user passwords

- 67.6% (96) were cracked with a searching complexity 2.17×109≈231

14

Page 15: Human/User-Centric Security

15

Password cracking: 2013

- Dan Goodin, “Anatomy of a hack: How crackers ransack passwords like ‘qeadzcwrsfxv1331’,” ars technica, 28 May 2013- Three professional crackers were given 16,449 hashed

passwords and the best of them was able to crack 90% of the passwords.

- Remark 1: All the passwords are considered harder ones because they are what remained uncracked in a much larger database of leaked passwords.

- Remark 2: Nate Anderson, Ars deputy editor and a self-admitted newbie to password cracking, was able to crack around 50% of the passwords within a few hours.

Page 16: Human/User-Centric Security

16

What can we learn from reality?

- The security-usability dilemma- Stronger passwords are securer but harder to remember

by humans.- Weaker passwords are easier to remember by humans

but also easier to be cracked.- Strong passwords for humans Strong passwords for

automated password crackers- End users have a tendency of choosing usability

over security: using easy-to-remember passwords.- End users have not changed their ways of using

(weak) passwords very much since 1970s!

Page 18: Human/User-Centric Security

18

Solution: Password checkers?

- A password checker checks the strength of a given password and warns the user about its weakness.- Proactive password checkers work at the client side when the

user is entering his/her password.- Reactive password checkers work at the server side after the

user set his/her passwords (by scanning all passwords of all users).- All password checkers are based on one or more password

meters which estimate the strength of any passwords given, but there are also standalone password meters.

Page 19: Human/User-Centric Security

19

Solution: Password managers?

- A password manager is a software/hardware tool managing credentials of multiple accounts of the user.- A master password is normally required to manage all passwords.- Local password managers run from a local computer (could be a

smart phone) and store the data locally.- Web-based password managers run from the Web or the cloud

and store the data remotely in a remote web site.- Cloud-based password managers run from local computer or the

Web and store the data remotely in a cloud.- Data across devices could be synchronized.

Page 20: Human/User-Centric Security

20

More solutions?

- Passphrases- Graphical passwords- Strong password policies- Frequently changed passwords- One-time passwords (such as iTANs)- Hardware-based solutions

- One-time password generators (such as RSA® SecurID)

- Physical tokens (such as smart cards)- Biometrics (finger/face/iris/palm/…

recognition, …)- Multi-factor authentication- Single-sign-on (SSO)

Page 21: Human/User-Centric Security

21

- A new technology developed by cyber security researchers (my PhD student and me) at the University of Surrey

- It allows user-centric combinations of diverse authentication actions (across different factors), while keeping backward compatibility with current passwords.

Pass∞ (PassInfinity)

Page 22: Human/User-Centric Security

22

- Access control policies- Data protection policies- Bring your own device (BYOD) policies- USB usage policies- Email policies- Confidential documents management policies- Computer incident reporting and investigation

policies- …

Going beyond passwords

Page 23: Human/User-Centric Security

User-centric security

Why do we need cyber security policies?

Page 26: Human/User-Centric Security

26

A real hacker’s testimony

Testifying before Congress not long ago, I explained that I could often get passwords and other pieces of sensitive information from companies by pretending to be someone else and just asking for it.

Kevin D. Mitnick and William L. SimonThe Art of Deception: Controlling the Human Element of Security

, John Wiley & Sons Inc., 2003

Page 27: Human/User-Centric Security

27

Social engineering everywhere: Phishing, SMiShing, vishing, …

- Getting your password from you.

Page 28: Human/User-Centric Security

28

A recent book on social engineering

- Christopher Hadnagy, Social Engineering: The Art of Human Hacking, John Wiley & Sons, Inc., 2010

Page 30: Human/User-Centric Security

User-centric security

Are you a weak link of your organisation(s)?

Page 31: Human/User-Centric Security

31

Are you a weak link of your organisation(s)?

- Have you installed any encryption software (such as GPG) for your email client or your web browser (for web mail)?

Page 32: Human/User-Centric Security

32

Are you a weak link of your organisation(s)?

- For those who said YES in previous question: How often do you use the above encryption software to protect your personal emails?

Page 33: Human/User-Centric Security

33

Are you a weak link of your organisation(s)?

- Have you written one or more of your passwords down (on paper, on mobile phone, …) at least once to avoid forgetting them?

Page 35: Human/User-Centric Security

35

Are you a weak link of your organisation(s)?

- Do you know how digital certificates are used with secure web sites such as online banking sites?

Page 36: Human/User-Centric Security

36

Are you a weak link of your organisation(s)?

- If YES to the last question: How often do you check digital certificate’s contents against the claimed owner?

Page 37: Human/User-Centric Security

37

Are you a weak link of your organisation(s)?

- Have you seen a web browser warning about a digital certificate used by a website (untrusted issuer, expired or self-signed certificate, etc.)?

Page 38: Human/User-Centric Security

38

Are you a weak link of your organisation(s)?

- If YES to the previous question: Did you choose to ignore the web browser warning(s) because you felt you could trust the website(s) you were visiting?

?

Page 39: Human/User-Centric Security

User-centric security

The solution and take-home message:Human/User-centric security

Page 40: Human/User-Centric Security

40

Help users, not blame them!

Page 41: Human/User-Centric Security

41

- Better tools for all humans involved- Better user interfaces- More useful data- More user control- Visualisation & gamification- Personalisation & contextualization- Human-in-the-loop- …

- Better guidance for all humans involved- Awareness campaigns, education, training, serious

games, more user-friendly and consistent guidelines and policies, …

How to help users?

Page 42: Human/User-Centric Security

42

- Consultancy- Technical reports- Bespoke solutions (tools / data)- Joint (research) projects

- Cyber Aware (formerly known as Cyber Streetwise)- Cyber Security Body of Knowledge (CySec-BoK)- Individual research projects

- Communities- RISCS (Research Institute in Science of Cyber Security)

- Living labs for cyber security- Meet-ups and networking events- …

We can work together!

Page 43: Human/User-Centric Security

43

- Pass∞ (PassInfinity)- A new user authentication framework

- H-DLP- Human-assisted machine learning for bootstrapping DLP (data

loss/leakage prevention) systems- ACCEPT

- Addressing Cybersecurity and Cybercrime via a co-Evolutionary approach to reducing human-related risks

- COMMANDO-HUMANS- COMputational Modelling and Automatic Non-intrusive Detection Of

HUMan behAviour based iNSecurity- POLARBEAR

- Pattern Of Life ANPR Behaviour Extraction Analysis and Recognition

Opportunities for collaboration

Page 44: Human/User-Centric Security

User-centric security

Thanks! Questions?