SlideShare a Scribd company logo
Usable Privacy and
Security              Engineering &
                      Public Policy
Lorrie Faith Cranor




                                 1
Usable privacy and security research
bridges privacy/security and usability/HCI
                                                        Usable Privacy&
Security/Privacy             Usability/HCI              Security
Humans are a secondary       Humans are the primary     Human factors and
constraint to                constraint,                security are both primary
security/privacy             security/privacy rarely    constraints
constraints                  considered
Humans considered            Concerned about human      Concerned about both
primarily in their role as   error but not human        normal users and
adversaries/attackers        attackers                  adversaries
Involves threat models       Involves task models,      Involves threat models
                             mental models, cognitive   AND task models,
                             models                     mental models, etc.
Focus on security            Focus on usability         Considers usability and
metrics                      metrics                    security metrics together
User studies rarely done     User studies common        User studies common,
                                                        often involve deception +
                                                                                    2
                                                        active adversary
User-selected graphical passwords

                                                    Usable Privacy&
Security/Privacy         Usability/HCI              Security
What is the space of     Howdifficult is it for a   All the security/privacy
possible passwords?      user to create,            and usability HCI
                         remember, and enter a      questions
How can we make the      graphical password?
password space larger to How long does it take?     How do usersselect
make the password                                   graphical passwords?
harder to guess?         How hard is it for users   How can we help them
                         to learn the system?       choose passwords
How are the stored                                  harder for attackers to
passwords secured?       Are users motivated to     predict?
                         put in effort to create
Can an attacker gain     good passwords?            As the password space
knowledge by observing                              increases, what are the
a user entering her      Is the system accessible   impacts on usability
password?                using a variety of         factors and predictability
                         devices, for users with    of human selection?
How can we make secure systems
more usable?
• Make it “just work”
   – Invisible security
   – Automation
• Make security/privacy
  understandable
   – Make it visible
   – Make it intuitive
   – Use metaphors that users
     can relate to
   – Human-centered design
• Train the user
                                 4
Better together
• Examining security/privacy and usability together is often critical for
  achieving either

• Examples
    – Passwords
        • Users cope with some measures to increase password security by behaving
          in predictable ways
        • Some efforts to make passwords easier also make it much easier for an
          attacker to guess a password
    – Access control
        • The way access control settings are visualized in a user interface and the
          underlying semantics of how rule conflicts are resolved both contribute to
          users’ ability to configure the system to accurately enforce the desired policy
    – Privacy tools
        • Users who misunderstand how to use privacy tools don’t configure them
          properly
        • Some simple privacy tools don’t provide much protection
                                                                                            5
References
• S. Komanduri, R. Shay, P.G. Kelley, M.L. Mazurek, L. Bauer, N.
  Christin, L.F. Cranor, and S. Egelman.Ofpasswords and people:
  Measuring the effect of password-composition policies.CHI 2011.

• R.W. Reeder, L. Bauer, L.F. Cranor, M.K. Reiter, and K. Vaniea.
  More than skin deep: Measuring effects of the underlying model on
  access-control system usability. CHI 2011.

• P.G. Leon, B. Ur, R. Balebako, L.F. Cranor, R. Shay, and Y. Wang.
  Why Johnny Can't Opt Out: A Usability Evaluation of Tools to Limit
  Online Behavioral Advertising. CHI 2012.



See also related papers listed at http://cups.cs.cmu.edu/

                                                                       6

More Related Content

PPTX
Peter Muhlberger - SaTC Cyber Cafe
PPTX
VCU INFO 644 Critical Thinking 1
PPTX
Introduction to ethics
PDF
Resiliency-Part One -11-3-2015
DOCX
PDF
Computer ethics
PPTX
An ABC of cyberethics
PPTX
Social & professional issues in IT
Peter Muhlberger - SaTC Cyber Cafe
VCU INFO 644 Critical Thinking 1
Introduction to ethics
Resiliency-Part One -11-3-2015
Computer ethics
An ABC of cyberethics
Social & professional issues in IT

What's hot (20)

DOCX
Chap2 lab1
PPTX
Cyber Security for Teenagers/Students
PPT
Alloy Cybersecurity
PPTX
IT Ethics
DOC
Computer Forensics Specialist Lab 1 From Word Chapter 2
PPT
Computer ethics
PPT
Cybercrime: Understanding the Offender, Victim and Managers
PPTX
Computer ethics & copyright
PPTX
Computer ethics
PPTX
Social and Professional Issues in Computing - Ethics
PDF
Comparative review dele
DOCX
Maranan chap.2 lab 1
PPTX
Ethical and legal issues
DOCX
Mary hankins fernando br ua
DOCX
Cataluña mary hapkins
DOCX
Brua computer forensics specialist
PPT
Ethics in IT and System Usage
PPTX
3.0 computer ethic
PPT
Computer Ethics
PDF
Hacking the Helpdesk, Craig Clark
Chap2 lab1
Cyber Security for Teenagers/Students
Alloy Cybersecurity
IT Ethics
Computer Forensics Specialist Lab 1 From Word Chapter 2
Computer ethics
Cybercrime: Understanding the Offender, Victim and Managers
Computer ethics & copyright
Computer ethics
Social and Professional Issues in Computing - Ethics
Comparative review dele
Maranan chap.2 lab 1
Ethical and legal issues
Mary hankins fernando br ua
Cataluña mary hapkins
Brua computer forensics specialist
Ethics in IT and System Usage
3.0 computer ethic
Computer Ethics
Hacking the Helpdesk, Craig Clark
Ad

Viewers also liked (10)

PPTX
Stefan Savage Cyber Cafe
PPTX
Dan Boneh - SaTC Cyber Cafe
PPTX
SaTC Cyber Cafe Jeremy Epstein
PPTX
Asal and Rethemeyer - Cyber Cafe
PPTX
Workshop: Gathering User Insight
PPTX
Usable security it isn't secure if people can't use it mwux 2 jun2012
PDF
(Un)usable Security
PDF
Usable security
PPT
Introduction To Ethical Hacking
PDF
Cloud Security & Real World Threats
Stefan Savage Cyber Cafe
Dan Boneh - SaTC Cyber Cafe
SaTC Cyber Cafe Jeremy Epstein
Asal and Rethemeyer - Cyber Cafe
Workshop: Gathering User Insight
Usable security it isn't secure if people can't use it mwux 2 jun2012
(Un)usable Security
Usable security
Introduction To Ethical Hacking
Cloud Security & Real World Threats
Ad

Similar to Lorrie Cranor - Usable Privacy & Security (20)

PPSX
Usable Security: When Security Meets Usability
PDF
Human Factors in Cyber Security: User authentication as a use case
PPTX
Human_Factors_KA_webinar_-_slides.pptx
PDF
Security And Usability Designing Secure Systems That People Can Use Lorrie Fa...
PDF
Ce36484489
PDF
Designing for Usable Security and Privacy
PPTX
Human/User-Centric Security
PPTX
3d password ppt
PPTX
Access Control authentication and authorization .pptx
PDF
Accessible Privacy and Security
PPT
Introduction To Usability
PDF
Designing Login Interfaces for Mobiles
PPT
Chapter1
PPTX
Human computer interaction 3 4(revised)
PPT
3D-Password: A More Secure Authentication
PDF
Human Error in Cyber Security
PDF
SEMINAR REPORT ON 3D PASSWORD
PPTX
05-Authentication.pptx Software Security
DOCX
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
PDF
Secure Arcade: A Gamified Defense Against Cyber Attacks
Usable Security: When Security Meets Usability
Human Factors in Cyber Security: User authentication as a use case
Human_Factors_KA_webinar_-_slides.pptx
Security And Usability Designing Secure Systems That People Can Use Lorrie Fa...
Ce36484489
Designing for Usable Security and Privacy
Human/User-Centric Security
3d password ppt
Access Control authentication and authorization .pptx
Accessible Privacy and Security
Introduction To Usability
Designing Login Interfaces for Mobiles
Chapter1
Human computer interaction 3 4(revised)
3D-Password: A More Secure Authentication
Human Error in Cyber Security
SEMINAR REPORT ON 3D PASSWORD
05-Authentication.pptx Software Security
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
Secure Arcade: A Gamified Defense Against Cyber Attacks

More from Amy Lenzo (9)

PDF
Graphics session 6
PDF
Visual Capture: Reflecting Collective Intelligence
PPT
Transforming Social Fields
PPT
Wisdom emerging
PPT
Level 1 Learnign Program- SlideShow2
PPTX
Participant list
PPT
Level One Online - SlideShow1
PPS
Just Water
PPT
The World Café Conversation
Graphics session 6
Visual Capture: Reflecting Collective Intelligence
Transforming Social Fields
Wisdom emerging
Level 1 Learnign Program- SlideShow2
Participant list
Level One Online - SlideShow1
Just Water
The World Café Conversation

Lorrie Cranor - Usable Privacy & Security

  • 1. Usable Privacy and Security Engineering & Public Policy Lorrie Faith Cranor 1
  • 2. Usable privacy and security research bridges privacy/security and usability/HCI Usable Privacy& Security/Privacy Usability/HCI Security Humans are a secondary Humans are the primary Human factors and constraint to constraint, security are both primary security/privacy security/privacy rarely constraints constraints considered Humans considered Concerned about human Concerned about both primarily in their role as error but not human normal users and adversaries/attackers attackers adversaries Involves threat models Involves task models, Involves threat models mental models, cognitive AND task models, models mental models, etc. Focus on security Focus on usability Considers usability and metrics metrics security metrics together User studies rarely done User studies common User studies common, often involve deception + 2 active adversary
  • 3. User-selected graphical passwords Usable Privacy& Security/Privacy Usability/HCI Security What is the space of Howdifficult is it for a All the security/privacy possible passwords? user to create, and usability HCI remember, and enter a questions How can we make the graphical password? password space larger to How long does it take? How do usersselect make the password graphical passwords? harder to guess? How hard is it for users How can we help them to learn the system? choose passwords How are the stored harder for attackers to passwords secured? Are users motivated to predict? put in effort to create Can an attacker gain good passwords? As the password space knowledge by observing increases, what are the a user entering her Is the system accessible impacts on usability password? using a variety of factors and predictability devices, for users with of human selection?
  • 4. How can we make secure systems more usable? • Make it “just work” – Invisible security – Automation • Make security/privacy understandable – Make it visible – Make it intuitive – Use metaphors that users can relate to – Human-centered design • Train the user 4
  • 5. Better together • Examining security/privacy and usability together is often critical for achieving either • Examples – Passwords • Users cope with some measures to increase password security by behaving in predictable ways • Some efforts to make passwords easier also make it much easier for an attacker to guess a password – Access control • The way access control settings are visualized in a user interface and the underlying semantics of how rule conflicts are resolved both contribute to users’ ability to configure the system to accurately enforce the desired policy – Privacy tools • Users who misunderstand how to use privacy tools don’t configure them properly • Some simple privacy tools don’t provide much protection 5
  • 6. References • S. Komanduri, R. Shay, P.G. Kelley, M.L. Mazurek, L. Bauer, N. Christin, L.F. Cranor, and S. Egelman.Ofpasswords and people: Measuring the effect of password-composition policies.CHI 2011. • R.W. Reeder, L. Bauer, L.F. Cranor, M.K. Reiter, and K. Vaniea. More than skin deep: Measuring effects of the underlying model on access-control system usability. CHI 2011. • P.G. Leon, B. Ur, R. Balebako, L.F. Cranor, R. Shay, and Y. Wang. Why Johnny Can't Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising. CHI 2012. See also related papers listed at http://cups.cs.cmu.edu/ 6