SlideShare a Scribd company logo
@darrenkall
Darren Kall   #secUX
Employment
 KALL Consulting
 Microsoft
  ◦ Windows Security User Experience team: founder
  ◦ Windows Security Assurance team: founder
  ◦ Windows Core Security: group program manager
  ◦ Microsoft Passport: group program manager
  ◦ Microsoft Passport User Experience team: manager
  ◦ MSN-client: security and privacy team founder
 AT&T Bell Laboratories, IBM, H.E.L.P., LexisNexis
Patents
 11 US patents, 6 international patents,104 patent citations
Education
 Dartmouth College, Rutgers College
User Experience
(UX)


       Insight              Innovation           Impact
       Research             Design               Evaluation


                   Product UX
                   Design & Improve Product UX


          Sec UX                         M&A UX
          Security                       Merger & Acquisition
          User Experience                User Experience

          PI UX                          Strategic UX
          Product Integration            Strategic UX
          User Experience                Management
   Problem: If a security system wasn’t designed to be
    usable by each person who touches it, then the
    people create vulnerabilities

   Solution: An end-to-end UX approach that merges
    technology possibilities, business imperatives, and a
    deep knowledge of users to improve security

   Next Steps: Practical steps to a UX approach
Usable security- It isn't secure if people can't use it. O-ISC conference 14mar2012
Limited
                      “Imperfect”                               Memory
                       cognitive                                                        Lazy
                        models
        Don’t
      respond
       quickly                                                      Limited number
      enough                                                           crunching


                                                  Don’t
Emotional                                       understand
responses                                        security
                                                                   Limited ability
                                                                     to visualize
                            Fear
Limited decision          negative
  making skill           outcomes

                                                         Too                          Not
                                                         busy                         tech
                   Limits to                                                         savvy
                   vigilance
                                                                  Cognitive
                                                                   biases
                                      Easily
                                     deceived
“The system would be
secure if we just got rid
of the people.”
      Every IT person who ever worked on security
 That   is not an option

 It
   is a lot easier to
 change the system than
 to change people
 If
   a system is not
 designed to be usable by
 the people who have to
 use it, the people are not
 to blame

 The   system is
   Dialog boxes and vigilance
       If an end-user sees a security dialog 100
        times, they agree without reading the 101st time
   Passwords and memory
       If a person has to have a 15 character password
        that must change every 30 days and must contain
        special characters, they write the password on a
        Post-it note
   Trojans and decision making
       If a user opens an Excel spreadsheet without
        questioning the source, they invite hidden
        exploits
 It
   is not just end-users
 but every human in the
 end-to-end system
   End-users              Installers
   Product Managers       Administrators
   Business Analysts      Hackers
   System Designers       Trainers
   Program Managers
                           Maintenance
   Project Managers
   Developers             Monitoring
   Testers                Forensics
   Marketing              Deprecation
   Sales                  etc.
   Developer
       If a developer does not have insight into the
        security skills of the user, they assume the user is
        like them
   Installer
       If it is too hard for an installer to figure out how
        to configure security, it goes in with a risky
        default
   Sales
       If a sales person can’t model a customer’s
        security needs sufficiently, they sell them the
        wrong system
 Am   I exaggerating?
 Comodo   Cert Auth
◦ Problem: tricked into issuing
  fraudulent certs
◦ UX: people are easily deceived
◦ Result: employees were socially
  engineered
   DigiNotar
    ◦ Problem: hacker access to cert issuing
    ◦ UX: people can’t perceive patterns
      over broad data
    ◦ Result: breach not in admin awareness
    ◦ UX: people susceptible to impact bias;
      a cognitive bias of estimation
    ◦ Result: did not prepare a user scenario
      for cert revocation
   Sony
    ◦ Problem: data breach 77 Million ID
      thefts
    ◦ UX: people susceptible to confirmation
      bias
    ◦ Result: did not perceive risk and made
      poor security choices, insufficient
      maintenance of patches
    ◦ UX: overconfidence in decision making
    ◦ Result: provoked the hacker
      community
 RSA
 ◦ Problem: token information hacked
 ◦ UX: limited ability to predict
   consequences
 ◦ Result: people post info in social
   media
 ◦ UX: people are easily deceived
 ◦ Result: fooled by phishing attack
   with Adobe-Excel exploit
   H.323 Protocol
    ◦ Problem: ~150,000 corporate video
      systems set to auto-answer allowing
      spying
    ◦ UX: status quo bias
    ◦ Result: system default configuration
      implications overlooked
    ◦ UX: risk assessment skills
    ◦ Result: not deployed within secure
      corporate networks
Usable security- It isn't secure if people can't use it. O-ISC conference 14mar2012
 Improveend-to-end
system security by
taking a UX approach to
design and
development
Insight            Innovation           Impact
Research           Design               Evaluation

Customer Insight   Design               Usability testing
User Research      User-friendly        A/B testing
Ideation           Interaction design   Customer validation
Workflow           Information Arch     Beta testing
Task flow          Transformation       Analytics
Activity Cycles    Specification        Evaluation
Pain points        Design guidelines    Measurements
Touch points       Look and Feel        Iterations
Journey map        Development          Etc.
Etc.               Etc.
   Insight Research: Detailed attention to the
    needs, limitations, and behaviors of people in a
    system to gain insights

   Innovation Design: Apply this insight to
    intentional design in all stages of
    development, implementation, and use for
    specific user types

   Impact Evaluation: A multi-stage approach
    requiring analysis, design, and evaluation
    iterations to ensure successful improvement
   Deeply studying the people in the system
   Gathering insight into their
    skills, motivations, limitations, behaviors, etc.
   Using that information to drive innovative
    designs for security problems
   Keep all users in mind when designing
    systems
   Use the deep insights about users to match
    design to their limitations and behaviors
   Designing to address user pain points and
    limitations
   Test with people in the real world not
    theoretical ideal world conditions
   Iterate improvement, evaluate, insight, design
    cycles
    ◦ UX is an ongoing, incremental approach that
      depends on data
   Problem: A security IT tool was not being
    adopted
   UX Action: Ethnographic research and contextual
    inquiry on the variety of IT people using this
    security system to determine root cause
   Result: Identified 4-5 distinct IT persona types
    for each of four company IT segments:
    enterprise, large, medium, and small groups
   Separated roles from
    titles, skills, motivations, and activity/behaviors
   Solution: One-size fits all was not working for
    any group, segmented core product into
    company/role specific products
   Problem: Significant implementation and
    customization errors on install and
    administration
   UX Action: Usability study of system with
    representative users. Included a UX
    assessment of technical writing.
   Result: Root cause was both product interface
    and the training/documentation
   Solution: Improved interaction and improved
    documentation and training to reduce errors
   Problem: System configuration taking too
    long and requiring repeated revisions
   UX Action: UX evaluation of configuration
    process
   Result: Total over 3,000 configuration
    options, 6 that system developers could not
    tell apart, detachment between desired
    outcome and configurations
   Solution: Reduced configuration complexity,
    options based on real use, aligned outcomes
    with options, created profiles, offered service
   Problem: Client with ~900,000 users globally;
    vendors, employees, on variety of devices, no
    easy way to see network security status
   UX Action: Reviewed current system, modeled
    pattern of monitoring workflow, prioritized
    events into semantic map for this audience
   Result: Needed situational awareness drill down
    from simple to detailed, not event alerts
   Solution: Created visualizations for quick overall
    system status with 4 layers of drill down to
    improve awareness
   Problem: Users relying on password customer
    support on failed logins
    ◦ Wanted to minimize user frustration
    ◦ Wanted to separate real users from non-users
    ◦ Wanted to minimize customer support costs
   UX Action: Researched a variety of real user
    behaviors to determine optimum design to
    meet goals
PSWD           PSWD            PSWD           PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt        attempt         attempt        attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average Success Trial of Forgetters with no Lock Out, No CS, and no Self Help


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average Abandon Trial of Forgetters with no Lock Out, No CS, and no Self Help


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average Call if have CS Link


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average Self Help if have Self Help Link


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average CS Call if have CS Link and Self Help Link


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average Self Help if have Self Help Link and Lock Out @ 3


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Purple add Self Help Link, Blue add CS link, Yellow you know you’ve got a hacker
   Problem: Client with some divisions having
    repeated auth setup issues while others didn’t
   UX Action: Compared SOP, reports of use, with
    actual use patterns
   Result: Some divisions had activity cycles of use
    and complete non-use based on business cycle.
    Start of each cycle users forgot and created
    issues
   Solution: Redesign system for infrequent use to
    make more intuitive, require users to have
    refresher when return
   UX approach is not a substitute for good
    security technology engineering, it is an
    addition
   You have to do both
   Keep advancing security technologies
Usable security- It isn't secure if people can't use it. O-ISC conference 14mar2012
   Add a UX approach to your security
    improvement plans

   If you have a specific UX-based security
    problem
    ◦ Develop a tailored UX initiative


   If you DO NOT have a specific UX-based
    security problem
    ◦ Introduce a UX approach in steps
   Start your UX approach today
    1. Implement: Start with the UX basics
    2. Design: Adopt and tailor known UX solutions to fit
       your situation
    3. Evaluation: Specifically evaluate your UX problems,
       your users, your environment of use, etc. and
       implement specific solutions
    4. Research: Invest in long-term research into the
       people in your system to drive deep UX
       understanding
 If
   we all take a UX
 approach to security
 system design and
 improvement, their
 real-world security
 value will increase
   Darren Kall
   darrenkall@kallconsulting.com
   http://www.linkedin.com/in/darrenkall
   @darrenkall
   +1 (937) 648-4966

SecUX: We’re glad to help your company
have more usable security.

More Related Content

PPTX
Usable security it isn't secure if people can't use it mwux 2 jun2012
PPSX
Usable Security: When Security Meets Usability
PPSX
Observer-Resistant Password Systems: How hard to make them both usable and se...
PPSX
From Digital Watermarking to Multimedia Forensics: How can they help to dete...
PDF
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
PDF
Istance Designing Gaze Gestures For Gaming An Investigation Of Performance
PDF
Performance Comparison of Digital Image Watermarking Techniques: A Survey
PDF
Knowledge Based Systems -Artificial Intelligence by Priti Srinivas Sajja S P...
Usable security it isn't secure if people can't use it mwux 2 jun2012
Usable Security: When Security Meets Usability
Observer-Resistant Password Systems: How hard to make them both usable and se...
From Digital Watermarking to Multimedia Forensics: How can they help to dete...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge ...
Istance Designing Gaze Gestures For Gaming An Investigation Of Performance
Performance Comparison of Digital Image Watermarking Techniques: A Survey
Knowledge Based Systems -Artificial Intelligence by Priti Srinivas Sajja S P...

What's hot (19)

PDF
PDF
Interaction Design - Lecture 2 - Next Generation User Interfaces (4018166FNR)
PDF
1709 1715
PPT
Expanded password system - Reliable Identity Assurance
PDF
The Difference Between the Reality and Feeling of Security by Thomas Kurian
PPTX
The difference between the Reality and Feeling of Security
PDF
louise and lauren paper presentations development of guide assistive technology
PPTX
Raise of deep learning
PPT
Cases
PDF
Varch use06
PDF
Artificial intelligence priti sajja spuniversity
PDF
Ka3118541860
PPTX
Human Computer Interaction
PDF
Intelligent web applications
PDF
Mind the gap : Is Norway Security Enough in Cyber Space
PDF
Van der kamp.2011.gaze and voice controlled drawing
PPT
Context Aware Computing
PPT
Context Awareness in Mobile Computing
PDF
Paper id 312201518
Interaction Design - Lecture 2 - Next Generation User Interfaces (4018166FNR)
1709 1715
Expanded password system - Reliable Identity Assurance
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The difference between the Reality and Feeling of Security
louise and lauren paper presentations development of guide assistive technology
Raise of deep learning
Cases
Varch use06
Artificial intelligence priti sajja spuniversity
Ka3118541860
Human Computer Interaction
Intelligent web applications
Mind the gap : Is Norway Security Enough in Cyber Space
Van der kamp.2011.gaze and voice controlled drawing
Context Aware Computing
Context Awareness in Mobile Computing
Paper id 312201518
Ad

Similar to Usable security- It isn't secure if people can't use it. O-ISC conference 14mar2012 (20)

PPTX
ai-ruba.pptx presentation artificial intelligence
PDF
LxD - Learner Experience Design
PDF
Humane assessment on cards
PPTX
For Business's Sake, Let's focus on AppSec
PPTX
UX Workshop: How to design a product with great user experience
PDF
Usability Presentation - IIS Brownbag 2013
PDF
Jump Start Your Application Security Knowledge
PDF
Data security in practice
PPTX
Security engineering 101 when good design & security work together
PDF
The Essentials of Great Search Design (ECIR 2010)
PDF
Hardware is hard(er)
PPT
3.Secure Design Principles And Process
PDF
MCC Technology Class (April 2012)
PDF
Hakin9 interview w Prof Sood
PDF
Decision support n system management
PDF
Decision support n system management
PPT
Chapter 8 Mis Decision Support System
PPT
User Experience Design - Designing for others
PPT
Lecture4 requirement engineering
PPT
LIS3353 SP12 Week 10
ai-ruba.pptx presentation artificial intelligence
LxD - Learner Experience Design
Humane assessment on cards
For Business's Sake, Let's focus on AppSec
UX Workshop: How to design a product with great user experience
Usability Presentation - IIS Brownbag 2013
Jump Start Your Application Security Knowledge
Data security in practice
Security engineering 101 when good design & security work together
The Essentials of Great Search Design (ECIR 2010)
Hardware is hard(er)
3.Secure Design Principles And Process
MCC Technology Class (April 2012)
Hakin9 interview w Prof Sood
Decision support n system management
Decision support n system management
Chapter 8 Mis Decision Support System
User Experience Design - Designing for others
Lecture4 requirement engineering
LIS3353 SP12 Week 10
Ad

More from Darren Kall (10)

PDF
Harvesting user insights revolve conf v09
PPTX
Workshop: Gathering User Insight
PPTX
You learn more from talking with angry customers
PPTX
Flowcharting: The UX Socket Wrench
PPTX
Unbiased customer interviews v022 for slideshare kall consulting
PPT
"This Product Sucks!" Better Experiences, Better Business, Better World
PPT
"This Product Sucks!" Better Experiences, Better Business, Better World
PPT
This Product Sucks: The Business Impacts of User Experience Breakdowns
PPT
You Learn More from Talking with Angry Customers: Transforming Customer Anger...
PPT
This Product Sucks! for Midwest UX Conference
Harvesting user insights revolve conf v09
Workshop: Gathering User Insight
You learn more from talking with angry customers
Flowcharting: The UX Socket Wrench
Unbiased customer interviews v022 for slideshare kall consulting
"This Product Sucks!" Better Experiences, Better Business, Better World
"This Product Sucks!" Better Experiences, Better Business, Better World
This Product Sucks: The Business Impacts of User Experience Breakdowns
You Learn More from Talking with Angry Customers: Transforming Customer Anger...
This Product Sucks! for Midwest UX Conference

Recently uploaded (20)

PPTX
Machine Learning_overview_presentation.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
A Presentation on Artificial Intelligence
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25-Week II
Machine Learning_overview_presentation.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Chapter 3 Spatial Domain Image Processing.pdf
A comparative analysis of optical character recognition models for extracting...
Empathic Computing: Creating Shared Understanding
Assigned Numbers - 2025 - Bluetooth® Document
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
“AI and Expert System Decision Support & Business Intelligence Systems”
A Presentation on Artificial Intelligence
Machine learning based COVID-19 study performance prediction
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25-Week II

Usable security- It isn't secure if people can't use it. O-ISC conference 14mar2012

  • 2. Employment  KALL Consulting  Microsoft ◦ Windows Security User Experience team: founder ◦ Windows Security Assurance team: founder ◦ Windows Core Security: group program manager ◦ Microsoft Passport: group program manager ◦ Microsoft Passport User Experience team: manager ◦ MSN-client: security and privacy team founder  AT&T Bell Laboratories, IBM, H.E.L.P., LexisNexis Patents  11 US patents, 6 international patents,104 patent citations Education  Dartmouth College, Rutgers College
  • 3. User Experience (UX) Insight Innovation Impact Research Design Evaluation Product UX Design & Improve Product UX Sec UX M&A UX Security Merger & Acquisition User Experience User Experience PI UX Strategic UX Product Integration Strategic UX User Experience Management
  • 4. Problem: If a security system wasn’t designed to be usable by each person who touches it, then the people create vulnerabilities  Solution: An end-to-end UX approach that merges technology possibilities, business imperatives, and a deep knowledge of users to improve security  Next Steps: Practical steps to a UX approach
  • 6. Limited “Imperfect” Memory cognitive Lazy models Don’t respond quickly Limited number enough crunching Don’t Emotional understand responses security Limited ability to visualize Fear Limited decision negative making skill outcomes Too Not busy tech Limits to savvy vigilance Cognitive biases Easily deceived
  • 7. “The system would be secure if we just got rid of the people.” Every IT person who ever worked on security
  • 8.  That is not an option  It is a lot easier to change the system than to change people
  • 9.  If a system is not designed to be usable by the people who have to use it, the people are not to blame  The system is
  • 10. Dialog boxes and vigilance  If an end-user sees a security dialog 100 times, they agree without reading the 101st time  Passwords and memory  If a person has to have a 15 character password that must change every 30 days and must contain special characters, they write the password on a Post-it note  Trojans and decision making  If a user opens an Excel spreadsheet without questioning the source, they invite hidden exploits
  • 11.  It is not just end-users but every human in the end-to-end system
  • 12. End-users  Installers  Product Managers  Administrators  Business Analysts  Hackers  System Designers  Trainers  Program Managers  Maintenance  Project Managers  Developers  Monitoring  Testers  Forensics  Marketing  Deprecation  Sales  etc.
  • 13. Developer  If a developer does not have insight into the security skills of the user, they assume the user is like them  Installer  If it is too hard for an installer to figure out how to configure security, it goes in with a risky default  Sales  If a sales person can’t model a customer’s security needs sufficiently, they sell them the wrong system
  • 14.  Am I exaggerating?
  • 15.  Comodo Cert Auth ◦ Problem: tricked into issuing fraudulent certs ◦ UX: people are easily deceived ◦ Result: employees were socially engineered
  • 16. DigiNotar ◦ Problem: hacker access to cert issuing ◦ UX: people can’t perceive patterns over broad data ◦ Result: breach not in admin awareness ◦ UX: people susceptible to impact bias; a cognitive bias of estimation ◦ Result: did not prepare a user scenario for cert revocation
  • 17. Sony ◦ Problem: data breach 77 Million ID thefts ◦ UX: people susceptible to confirmation bias ◦ Result: did not perceive risk and made poor security choices, insufficient maintenance of patches ◦ UX: overconfidence in decision making ◦ Result: provoked the hacker community
  • 18.  RSA ◦ Problem: token information hacked ◦ UX: limited ability to predict consequences ◦ Result: people post info in social media ◦ UX: people are easily deceived ◦ Result: fooled by phishing attack with Adobe-Excel exploit
  • 19. H.323 Protocol ◦ Problem: ~150,000 corporate video systems set to auto-answer allowing spying ◦ UX: status quo bias ◦ Result: system default configuration implications overlooked ◦ UX: risk assessment skills ◦ Result: not deployed within secure corporate networks
  • 21.  Improveend-to-end system security by taking a UX approach to design and development
  • 22. Insight Innovation Impact Research Design Evaluation Customer Insight Design Usability testing User Research User-friendly A/B testing Ideation Interaction design Customer validation Workflow Information Arch Beta testing Task flow Transformation Analytics Activity Cycles Specification Evaluation Pain points Design guidelines Measurements Touch points Look and Feel Iterations Journey map Development Etc. Etc. Etc.
  • 23. Insight Research: Detailed attention to the needs, limitations, and behaviors of people in a system to gain insights  Innovation Design: Apply this insight to intentional design in all stages of development, implementation, and use for specific user types  Impact Evaluation: A multi-stage approach requiring analysis, design, and evaluation iterations to ensure successful improvement
  • 24. Deeply studying the people in the system  Gathering insight into their skills, motivations, limitations, behaviors, etc.  Using that information to drive innovative designs for security problems
  • 25. Keep all users in mind when designing systems  Use the deep insights about users to match design to their limitations and behaviors  Designing to address user pain points and limitations
  • 26. Test with people in the real world not theoretical ideal world conditions  Iterate improvement, evaluate, insight, design cycles ◦ UX is an ongoing, incremental approach that depends on data
  • 27. Problem: A security IT tool was not being adopted  UX Action: Ethnographic research and contextual inquiry on the variety of IT people using this security system to determine root cause  Result: Identified 4-5 distinct IT persona types for each of four company IT segments: enterprise, large, medium, and small groups  Separated roles from titles, skills, motivations, and activity/behaviors  Solution: One-size fits all was not working for any group, segmented core product into company/role specific products
  • 28. Problem: Significant implementation and customization errors on install and administration  UX Action: Usability study of system with representative users. Included a UX assessment of technical writing.  Result: Root cause was both product interface and the training/documentation  Solution: Improved interaction and improved documentation and training to reduce errors
  • 29. Problem: System configuration taking too long and requiring repeated revisions  UX Action: UX evaluation of configuration process  Result: Total over 3,000 configuration options, 6 that system developers could not tell apart, detachment between desired outcome and configurations  Solution: Reduced configuration complexity, options based on real use, aligned outcomes with options, created profiles, offered service
  • 30. Problem: Client with ~900,000 users globally; vendors, employees, on variety of devices, no easy way to see network security status  UX Action: Reviewed current system, modeled pattern of monitoring workflow, prioritized events into semantic map for this audience  Result: Needed situational awareness drill down from simple to detailed, not event alerts  Solution: Created visualizations for quick overall system status with 4 layers of drill down to improve awareness
  • 31. Problem: Users relying on password customer support on failed logins ◦ Wanted to minimize user frustration ◦ Wanted to separate real users from non-users ◦ Wanted to minimize customer support costs  UX Action: Researched a variety of real user behaviors to determine optimum design to meet goals
  • 32. PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average Success Trial of Forgetters with no Lock Out, No CS, and no Self Help PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average Abandon Trial of Forgetters with no Lock Out, No CS, and no Self Help PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average Call if have CS Link PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average Self Help if have Self Help Link PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average CS Call if have CS Link and Self Help Link PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average Self Help if have Self Help Link and Lock Out @ 3 PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Purple add Self Help Link, Blue add CS link, Yellow you know you’ve got a hacker
  • 33. Problem: Client with some divisions having repeated auth setup issues while others didn’t  UX Action: Compared SOP, reports of use, with actual use patterns  Result: Some divisions had activity cycles of use and complete non-use based on business cycle. Start of each cycle users forgot and created issues  Solution: Redesign system for infrequent use to make more intuitive, require users to have refresher when return
  • 34. UX approach is not a substitute for good security technology engineering, it is an addition  You have to do both  Keep advancing security technologies
  • 36. Add a UX approach to your security improvement plans  If you have a specific UX-based security problem ◦ Develop a tailored UX initiative  If you DO NOT have a specific UX-based security problem ◦ Introduce a UX approach in steps
  • 37. Start your UX approach today 1. Implement: Start with the UX basics 2. Design: Adopt and tailor known UX solutions to fit your situation 3. Evaluation: Specifically evaluate your UX problems, your users, your environment of use, etc. and implement specific solutions 4. Research: Invest in long-term research into the people in your system to drive deep UX understanding
  • 38.  If we all take a UX approach to security system design and improvement, their real-world security value will increase
  • 39. Darren Kall  darrenkall@kallconsulting.com  http://www.linkedin.com/in/darrenkall  @darrenkall  +1 (937) 648-4966 SecUX: We’re glad to help your company have more usable security.