SlideShare une entreprise Scribd logo
1  sur  68
©2009CarnegieMellonUniversity:1
Leveraging Human Factors
for Effective Security Training
FISSEA 2012
Jason Hong
jasonh@cs.cmu.edu
©2012CarnegieMellonUniversity:2
About the Speaker
• Associate Prof, Carnegie Mellon
University, School of Comp Science
• Research and teaching interests:
– Usable privacy and security
– Mobile computing
• Co-author
• Startup
©2012CarnegieMellonUniversity:3
About this Talk
• Useful for people interested in:
– How to effectively train people?
– How to effectively design better
user interfaces for privacy and security?
• Two case studies from my research
Embedded Training Evaluating Warnings
©2012CarnegieMellonUniversity:4
Human Element of Security
• People are key part of computer
security for every organization
– Keeping passwords strong and secure
– Avoiding social engineering
– Avoiding malware
– Appropriate use of social networking
– Keeping mobile devices secure
• Overlooking human element is most
common mistake in computer security
©2012CarnegieMellonUniversity:5
What is Human-Computer
Interaction?
• Field that seeks to understand the
relationship between people & computers
– Designing useful, usable, desirable artifacts
– Understanding how people use systems
– Expanding the ways we can use computers
• Combines behavioral sciences,
interaction design, and computer science
©2012CarnegieMellonUniversity:6
Interactions Can Be Successful
©2012CarnegieMellonUniversity:7
Interactions Can Also Fail
©2012CarnegieMellonUniversity:8
Design Principles in 5 Minutes
• How do people believe
how things work?
• Mental models describe
how a person thinks
something works
• Incorrect mental models
can make things very hard
to understand and use
©2012CarnegieMellonUniversity:9
Mental Models Example:
Refrigerator
Freezer
(temperature too cold)
Fresh food
(temperature just right)
©2012CarnegieMellonUniversity:10
Refrigerator Controls
What is a typical conceptual model?
Normal Settings C and 5
Colder Fresh Food C and 6-7
Coldest Fresh Food B and 8-9
Colder Freezer D and 7-8
Warmer Fresh Food C and 4-1
OFF (both) 0
A B C D E 7 6 5 4 3
©2012CarnegieMellonUniversity:11
7 6 5 4 3
A B C D E
Most people think of
independent controls
Cooling
Unit
Cooling
Unit
A Common Conceptual Model
©2012CarnegieMellonUniversity:12
• Now can you fix the problem?
• Two general solutions:
– make controls map to user’s mental model
– foster a more accurate mental model
7 6 5 4 3
A B C D E
Cooling
Unit
Actual Conceptual Model
Controls amount of cold air
Controls amount air vectored up and down
©2012CarnegieMellonUniversity:13
Nissan Maxima Gear Shift
©2012CarnegieMellonUniversity:14
• Users create a model from what they hear
from others, past experiences, and usage
– interactions with system image
Three Different Models
Design Model
(How you intend the
system to work)
Design Model
(How you intend the
system to work)
User Model
(How users think the
system works)
User Model
(How users think the
system works)
System Image
(Your implementation)
System Image
(Your implementation)
User Interactions
System feedback
©2012CarnegieMellonUniversity:15
Mental Models
• People inevitably build models of how
things work
– Ex. children and computers
– Ex. you and your car
– Ex. how hackers work (and why)
– Ex. visibility in social networking sites
– Ex. app stores (all apps vetted by Google?)
• Two options:
– Make the system match people’s models
– Foster a better mental model
©2012CarnegieMellonUniversity:16
Example: Phishing Attacks
• Interviewed 40 people as part of an
“email study” (Downs et al, SOUPS 2006)
• Only 55% of participants said they had
ever noticed an unexpected or strange-
looking URL
– Most did not consider them to be suspicious
©2012CarnegieMellonUniversity:17
Example: Phishing Attacks
• 55% of participants reported being
cautious when email asks for sensitive
financial info
– But very few reported being suspicious of
email asking for passwords
• Knowledge of financial phish reduced
likelihood of falling for these scams
– But did not transfer to other scams, such
as an amazon.com password phish
©2012CarnegieMellonUniversity:18
Can We Educate End-Users?
• Users not motivated to learn
• Security is a secondary task
• Difficult to teach people right decisions
without increasing false positives
• Basically, educating users is
as hard as herding cats
©2012CarnegieMellonUniversity:19
Yes, End-Users Are Trainable
• Our research demonstrates users can
learn how to protect themselves… if you
can get them to pay attention to training
• Problem is that today’s training often
boring, time consuming, and ineffective
– All day lecture, no chance to practice skills
– Or passively watching videos
– Or posters and mugs and calendars
– Raise awareness, but little on what
to actually do
©2012CarnegieMellonUniversity:20
How Do We Get People Trained?
• Create “teachable moments”
• Micro-games for training (fun)
• Use learning science principles throughout
Embedded Training Micro-Game on Phishing
©2012CarnegieMellonUniversity:21
PhishGuru Embedded Training
• Send simulated phishing emails
• If recipient falls for it, show intervention
that teaches what cues to look for in
succinct and engaging format
– Useful for people who don’t know
that they don’t know
• Multiple user studies have demonstrated
that PhishGuru is effective
• Delivering training via direct email
not effective
©2012CarnegieMellonUniversity:22
Subject: Revision to Your Amazon.com InformationSubject: Revision to Your Amazon.com Information
©2012CarnegieMellonUniversity:23
Subject: Revision to Your Amazon.com InformationSubject: Revision to Your Amazon.com Information
Please login and enter your informationPlease login and enter your information
©2012CarnegieMellonUniversity:24
©2012CarnegieMellonUniversity:25
Learning Science
• Area of research examining learning,
retention, and transfer of skills
• Example principles
– Learning by doing
– Immediate feedback
– Conceptual-procedural
– Reflection
– … many others
©2012CarnegieMellonUniversity:26
Evaluation of PhishGuru
• Is embedded training effective?
– We’ve conducted 4 peer-reviewed studies
showing embedded training works well
– Studies showed significant decrease in
falling for phish and ability to retain what
they learned
P. Kumaraguru et al. Protecting People from Phishing:
The Design and Evaluation of an Embedded Training
Email System. CHI 2007.
P. Kumaraguru et al. School of Phish: A Real-Word
Evaluation of Anti-Phishing Training. SOUPS 2009.
©2012CarnegieMellonUniversity:27
Results of One Study
• Tested 500+ people in one month
– 1 simulated phish at beginning of month,
testing done at end of month
• ~50% reduction in falling for phish
– 68 out of 85 surveyed said they recommend
continuing doing this sort of training in the
future
– “I really liked the idea of sending
[organization] fake phishing emails and then
saying to them, essentially, HEY! You
could've just gotten scammed! You should
be more careful – here's how...”
©2012CarnegieMellonUniversity:28
Can Browser Interfaces Help?
• Modern web browsers come with
blacklists and special interfaces for
identifying phish
– Our evaluation of several blacklists show
they catch ~80% of phish after 24 hours,
not very good in first few hours
• Are these browser interfaces effective?
– And, what can we learn from them?
– Science of Warnings from human factors
©2012CarnegieMellonUniversity:29
Screenshots
Internet Explorer 7 – Passive Warning
©2012CarnegieMellonUniversity:30
Screenshots
Internet Explorer 7 – Active Block
©2012CarnegieMellonUniversity:31
Screenshots
Mozilla Firefox – Active Block
©2012CarnegieMellonUniversity:32
How Effective are these
Warnings?
• Tested four conditions
– FireFox Active Block
– IE Active Block
– IE Passive Warning
– Control (no warnings or blocks)
• “Shopping Study”
– Setup phishing pages and added to blacklists
– Phished users after real purchases (2 phish)
– Used real email accounts and personal info
S. Egelman, L. Cranor, and J. Hong. You've Been Warned:
An Empirical Study of the Effectiveness of Web Browser Phishing
Warnings. CHI 2008.
©2012CarnegieMellonUniversity:33
How Effective are these
Warnings?
Almost everyone clicked, even those
with strong technical backgrounds
©2012CarnegieMellonUniversity:34
How Effective are these
Warnings?
• No one in Firefox condition fell for our phish
• People in Firefox condition not more technically savvy
©2012CarnegieMellonUniversity:35
Discussion of Phish Warnings
• Nearly everyone will fall for highly
targeted and contextualized phish
• Passive IE warning failed for many
reasons
– Didn’t interrupt the main task
– Can be slow to appear (up to 5 seconds)
– Not clear what the right action was
– Looked too much like other ignorable
warnings (habituation)
– Bug, any keystroke dismissed
©2012CarnegieMellonUniversity:36
Screenshots
Internet Explorer – Passive Warning
©2012CarnegieMellonUniversity:37
Discussion of Phish Warnings
• Active IE warnings
– Most saw the warning, but many did not
believe it
• “Since it gave me the option of still
proceeding to the website, I figured it
couldn’t be that bad”
– Some element of habituation (looks like
other warnings)
– Saw two pathological cases
©2012CarnegieMellonUniversity:38
Screenshots
Internet Explorer – Active Block
©2012CarnegieMellonUniversity:39
MSIE8 Re-design Based on
our Work
MSIE8 Redesign Based on our Work
©2012CarnegieMellonUniversity:40
A Science of
Warnings
• C-HIP model
for real-world
warnings
– See the warning?
– Understand it?
– Believe it?
– Motivated?
– Can and will act?
©2012CarnegieMellonUniversity:41
Designing for Path of Least
Resistance
• Where possible, make the
default behavior safe
– Ex. The two pathological cases
– Assume people won’t see, read,
believe, or be motivated
• Active warnings over passive warnings
– Interrupt people if warning is important
– Need to balance this with habituation
• Make important warnings look very
different
©2012CarnegieMellonUniversity:42
Summary
• Human element most overlooked
aspect of computer security
– Ex. phishing scams, passwords, mobile
• Mental models important to design
– Mismatched models can cause failures
• Security training can work if done right
– Learning sciences
• C-HIP model for security warnings
– Do people see, understand, believe,
and can act on warnings?
©2012CarnegieMellonUniversity:43
More of Our Research
• Our team does research on:
– Better password policies
– Alternatives to passwords
– Mobile apps, privacy and security
– Location-based services and privacy
– Social networking and privacy
– Configuring firewalls
©2012CarnegieMellonUniversity:44
More of Our Research
• http://cups.cs.cmu.edu
• http://mcom.cs.cmu.edu
• http://cmuchimps.org/
©2012CarnegieMellonUniversity:45
Thanks, where can
I learn more?
Find more at
wombatsecurity.com
jasonh@cs.cmu.edu
©2012CarnegieMellonUniversity:46
©2012CarnegieMellonUniversity:47
Micro-Games for Cyber
Security
• Training doesn’t have to be long & boring
• Micro game format, play for short time
• Two-thirds of Americans played
a video game in past six months
• Not just young people
– Average game player 35 years old
– 25% of people over 50 play games
• Not just males
– 40% of casual gamers are women
©2012CarnegieMellonUniversity:48
Case Study: Anti-Phishing Phil
• Tested Anti-Phishing Phil with ~4500
people
– Huge improvement by novices in identifying
phishing URLs
– Also dramatically lowered false positives
©2012CarnegieMellonUniversity:49
©2012CarnegieMellonUniversity:50
©2012CarnegieMellonUniversity:51
©2012CarnegieMellonUniversity:52
©2012CarnegieMellonUniversity:53
©2012CarnegieMellonUniversity:54
©2012CarnegieMellonUniversity:55
False negatives for users who played Anti-Phishing Phil (“game condition”). False negatives are
situations where people incorrectly label a phishing site as legitimate. Novices saw the greatest
reduction in false negatives, and retained what they had learned.
©2012CarnegieMellonUniversity:56
False positives for users who played the Anti-Phishing Phil game. False positives are situations
where people incorrectly label a legitimate site as phishing. Again, novices saw the greatest
improvement in reducing false positives, and retained what they had learned.
©2012CarnegieMellonUniversity:57
©2012CarnegieMellonUniversity:58
Example Topic: Email Security
©2012CarnegieMellonUniversity:59
Example Topic: Passwords
©2012CarnegieMellonUniversity:60
Other Training: Social
Networks
©2012CarnegieMellonUniversity:61
Measurable
©2012CarnegieMellonUniversity:62
Measurable
©2012CarnegieMellonUniversity:63
Case Study #1: PhishGuru
• Canadian healthcare organization
• Three-month embedded training
campaign
– 190 employees
– Security assessment and effective training in
context
©2012CarnegieMellonUniversity:64
Simulated Phishing Email
©2012CarnegieMellonUniversity:65
Case Study
©2012CarnegieMellonUniversity:66
Measurable Reduction in
Falling for Phish
Viewed
Email
Only %
Viewed
Email and
Clicked
Link % Employees
Campaign 1 20 10.53% 35 18.42% 190
Campaign 2 37 19.47% 23 12.11% 190
Campaign 3 7 3.70% 10 5.29% 189
©2012CarnegieMellonUniversity:67
0 10 20 30 40
Campaign3
Campaign2
Campaign1
ViewedEmail and Clicked
Link
ViewedEmail Only
©2012CarnegieMellonUniversity:68
Can We Educate End-Users?
• Users not motivated to learn
• Security is a secondary task
• Difficult to teach people right decisions
without increasing false positives
“User education is a complete waste
of time. It is about as much use as
nailing jelly to a wall… They are not
interested…they just want to do their
job.”
-- An IBM security specialist

Contenu connexe

Tendances

Developing Mobile Learnigng
Developing Mobile Learnigng Developing Mobile Learnigng
Developing Mobile Learnigng Kayla Camlin
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD ImplementationDiana Benner
 
benefits-and-challenges-of-elearning
benefits-and-challenges-of-elearningbenefits-and-challenges-of-elearning
benefits-and-challenges-of-elearningMaarten Cannaerts
 
Model equipment distribution essay
Model equipment distribution essayModel equipment distribution essay
Model equipment distribution essayivanzampedri
 
Final Project, Power Point Presentation[1]
Final Project, Power Point Presentation[1]Final Project, Power Point Presentation[1]
Final Project, Power Point Presentation[1]guesta27a047
 
My portfolio in Educational Technology
My portfolio in Educational TechnologyMy portfolio in Educational Technology
My portfolio in Educational TechnologyGellie Perido
 
Updated tri center 2012 csd technology
Updated tri center 2012 csd technologyUpdated tri center 2012 csd technology
Updated tri center 2012 csd technologyTri-Center
 
1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 SchoolsSecurly
 
Digital Citizenship community evening
Digital Citizenship community eveningDigital Citizenship community evening
Digital Citizenship community eveningLisaCavanagh
 
Tri center 2012 csd technology
Tri center 2012 csd technologyTri center 2012 csd technology
Tri center 2012 csd technologyTri-Center
 
Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriersJohn Oxley
 
The New Information Ecosystem in Education
The New Information Ecosystem in EducationThe New Information Ecosystem in Education
The New Information Ecosystem in EducationDarwin Gosal
 
What will be the most interesting changes after COVID-19?
What will be the most interesting changes after COVID-19? What will be the most interesting changes after COVID-19?
What will be the most interesting changes after COVID-19? Khulisa Management Services
 
Assessment for Learning: Leveraging Technology
Assessment for Learning: Leveraging TechnologyAssessment for Learning: Leveraging Technology
Assessment for Learning: Leveraging TechnologyJeremy Williams
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefSecurly
 

Tendances (17)

Developing Mobile Learnigng
Developing Mobile Learnigng Developing Mobile Learnigng
Developing Mobile Learnigng
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
benefits-and-challenges-of-elearning
benefits-and-challenges-of-elearningbenefits-and-challenges-of-elearning
benefits-and-challenges-of-elearning
 
Model equipment distribution essay
Model equipment distribution essayModel equipment distribution essay
Model equipment distribution essay
 
Final Project, Power Point Presentation[1]
Final Project, Power Point Presentation[1]Final Project, Power Point Presentation[1]
Final Project, Power Point Presentation[1]
 
My portfolio in Educational Technology
My portfolio in Educational TechnologyMy portfolio in Educational Technology
My portfolio in Educational Technology
 
Updated tri center 2012 csd technology
Updated tri center 2012 csd technologyUpdated tri center 2012 csd technology
Updated tri center 2012 csd technology
 
1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools
 
Digital Citizenship community evening
Digital Citizenship community eveningDigital Citizenship community evening
Digital Citizenship community evening
 
Tri center 2012 csd technology
Tri center 2012 csd technologyTri center 2012 csd technology
Tri center 2012 csd technology
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
The New Information Ecosystem in Education
The New Information Ecosystem in EducationThe New Information Ecosystem in Education
The New Information Ecosystem in Education
 
What will be the most interesting changes after COVID-19?
What will be the most interesting changes after COVID-19? What will be the most interesting changes after COVID-19?
What will be the most interesting changes after COVID-19?
 
Assessment for Learning: Leveraging Technology
Assessment for Learning: Leveraging TechnologyAssessment for Learning: Leveraging Technology
Assessment for Learning: Leveraging Technology
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product Brief
 

En vedette

Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010Jason Hong
 
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Jason Hong
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Jason Hong
 
Gamification and Security Oct2012
Gamification and Security Oct2012Gamification and Security Oct2012
Gamification and Security Oct2012Jason Hong
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Jason Hong
 
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...Jason Hong
 
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...Jason Hong
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Jason Hong
 
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Jason Hong
 
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012Jason Hong
 
Why People Hate Your App: Making Sense of User Feedback in a Mobile App Stor...
Why People Hate Your App: Making  Sense of User Feedback in a Mobile App Stor...Why People Hate Your App: Making  Sense of User Feedback in a Mobile App Stor...
Why People Hate Your App: Making Sense of User Feedback in a Mobile App Stor...Jason Hong
 
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Jason Hong
 
Improving Usable Authentication
Improving Usable AuthenticationImproving Usable Authentication
Improving Usable AuthenticationJason Hong
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Jason Hong
 
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...Jason Hong
 
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...Jason Hong
 
Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004Jason Hong
 
Informal PUIs: No Recognition Required, at AAAI 2002 workshop
Informal PUIs: No Recognition Required, at AAAI 2002 workshopInformal PUIs: No Recognition Required, at AAAI 2002 workshop
Informal PUIs: No Recognition Required, at AAAI 2002 workshopJason Hong
 

En vedette (20)

Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
 
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Gamification and Security Oct2012
Gamification and Security Oct2012Gamification and Security Oct2012
Gamification and Security Oct2012
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
 
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
 
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
 
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
 
Why People Hate Your App: Making Sense of User Feedback in a Mobile App Stor...
Why People Hate Your App: Making  Sense of User Feedback in a Mobile App Stor...Why People Hate Your App: Making  Sense of User Feedback in a Mobile App Stor...
Why People Hate Your App: Making Sense of User Feedback in a Mobile App Stor...
 
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
 
Improving Usable Authentication
Improving Usable AuthenticationImproving Usable Authentication
Improving Usable Authentication
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
 
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
 
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
 
Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004
 
Informal PUIs: No Recognition Required, at AAAI 2002 workshop
Informal PUIs: No Recognition Required, at AAAI 2002 workshopInformal PUIs: No Recognition Required, at AAAI 2002 workshop
Informal PUIs: No Recognition Required, at AAAI 2002 workshop
 
Shelby
ShelbyShelby
Shelby
 

Similaire à Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012

Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Jason Hong
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Jason Hong
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
 
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Jason Hong
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Jason Hong
 
IWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWWIWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWWIWMW
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Constructionjxyz
 
Interactive Machine Learning
Interactive  Machine LearningInteractive  Machine Learning
Interactive Machine LearningZitao Liu
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Researcheckchela
 
Elder Abuse Research
Elder Abuse ResearchElder Abuse Research
Elder Abuse ResearchLaura Torres
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...Jason Hong
 
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...ZoneFox
 
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007Jason Hong
 
Dragons's Den 2014 Semester 1
Dragons's Den 2014 Semester 1Dragons's Den 2014 Semester 1
Dragons's Den 2014 Semester 1Samuel Mann
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Donald E. Hester
 
應用行動科技紀錄與研究人們日常生活行為與脈絡
應用行動科技紀錄與研究人們日常生活行為與脈絡 應用行動科技紀錄與研究人們日常生活行為與脈絡
應用行動科技紀錄與研究人們日常生活行為與脈絡 Stanley Chang
 

Similaire à Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012 (20)

Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
IWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWWIWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWW
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Construction
 
Emtech Deck
Emtech DeckEmtech Deck
Emtech Deck
 
Interactive Machine Learning
Interactive  Machine LearningInteractive  Machine Learning
Interactive Machine Learning
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Elder Abuse Research
Elder Abuse ResearchElder Abuse Research
Elder Abuse Research
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
 
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
 
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
 
Dragons's Den 2014 Semester 1
Dragons's Den 2014 Semester 1Dragons's Den 2014 Semester 1
Dragons's Den 2014 Semester 1
 
Emtech Deck
Emtech DeckEmtech Deck
Emtech Deck
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
應用行動科技紀錄與研究人們日常生活行為與脈絡
應用行動科技紀錄與研究人們日常生活行為與脈絡 應用行動科技紀錄與研究人們日常生活行為與脈絡
應用行動科技紀錄與研究人們日常生活行為與脈絡
 
Online Proctoring
Online ProctoringOnline Proctoring
Online Proctoring
 

Dernier

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012

Notes de l'éditeur

  1. On the left is Nissan Maxima gear shift. It turns out my brother was driving in 3 rd gear for over a year before I pointed out to him that 3 and D are separate. The older Nissan Maxima gear shift on the right makes it hard to make this mistake.
  2. These findings led us to think about how to educate and train people about phishing attacks…
  3. http://news.cnet.com/21007350_361252132.html
  4. These findings led us to think about how to educate and train people about phishing attacks…
  5. These findings led us to think about how to educate and train people about phishing attacks…
  6. ASSUME THAT THIS IS YOUR EMAIL INBOX AND AMONG OTHER EMAILS.. YOU THIS EMAIL FROM AMAZON THAT JUST LOOKS LIKE THE LEGITIMATE EMAIL FROM AMAZON. WHEN YOU OPEN THE EMAIL ….
  7. YOU WILL SEE THIS.. WHICH LOOKS LEGITIMATE.. AND WITH THE DATA THAT WE HAVE .. WE KNOW THAT MOST OF THE USERS WILL CLICK ON THE LINK.. WHEN THEY CLICK ON THE LINK THEY WILL SEE ….
  8. P. Kumaraguru et al. Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System. CHI 2007. P. Kumaraguru et al. Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer . eCrime 2007.
  9. Our evaluation of several blacklists show they catch ~80% of phish after 24 hours, not very good in first few hours Also only catch “shotgun phish” rather than spear-phish
  10. S. Egelman, L. Cranor, and J. Hong. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. CHI 2008.
  11. http://wombatsecurity.com/file_download/6/PhishGuru%20White%20Paper.pdf http://wombatsecurity.com/file_download/8/Anti-Phishing%20Phil%20whitepaper.pdf
  12. http://news.cnet.com/21007350_361252132.html