SlideShare une entreprise Scribd logo
1  sur  45
Télécharger pour lire hors ligne
Copyright © Wombat Security Technologies, Inc. 2008-2010
ISSA Webinar May 2012
Jason Hong, PhD
Assoc. Prof, Carnegie Mellon University
CTO, Wombat Security Technologies
Copyright © Wombat Security Technologies, Inc. 2008-2012
About the Speaker
 Assoc. Professor
 Carnegie Mellon University,
Human-Computer Interaction
 Usable privacy and security,
Mobile computing
 Co-author
 Co-founder of Wombat
Security Technologies
Copyright © Wombat Security Technologies, Inc. 2008-2012
About this Talk
 Useful for people interested in:
 How to effectively train people?
 How to effectively design better
user interfaces for privacy and security?
 One case study from my research
Micro Games
for Security Education
Copyright © Wombat Security Technologies, Inc. 2008-2012
What is Human-Computer
Interaction?
 Field that seeks to understand the
relationship between people & computers
 Designing useful, usable, desirable artifacts
 Understanding how people use systems
 Expanding the ways we can use computers
 Combines behavioral sciences,
interaction design, and computer science
Copyright © Wombat Security Technologies, Inc. 2008-2012
Interactions Can Be Successful
Copyright © Wombat Security Technologies, Inc. 2008-2012
Interactions Can Also Fail
Copyright © Wombat Security Technologies, Inc. 2008-2012
Design Principles in 5 Minutes
 How do people believe
how things work?
 Mental models describe
how a person thinks
something works
 Incorrect mental models
can make things very hard
to understand and use
Copyright © Wombat Security Technologies, Inc. 2008-2012
Mental Models Example:
Refrigerator
Freezer
(temperature too cold)
Fresh food
(temperature just right)
Copyright © Wombat Security Technologies, Inc. 2008-2012
Refrigerator Controls
What is a typical conceptual model?
Normal Settings C and 5
Colder Fresh Food C and 6-7
Coldest Fresh Food B and 8-9
Colder Freezer D and 7-8
Warmer Fresh Food C and 4-1
OFF (both) 0
A B C D E 7 6 5 4 3
Copyright © Wombat Security Technologies, Inc. 2008-2012
7 6 5 4 3
A B C D E
Most people think of
independent controls
Cooling
Unit
Cooling
Unit
A Common Conceptual Model
Copyright © Wombat Security Technologies, Inc. 2008-2012
 Two general solutions:
 make controls map to user’s mental model
 foster a more accurate mental model
7 6 5 4 3
A B C D E
Cooling
Unit
Actual Conceptual Model
Controls amount of cold air
Controls amount air vectored up and down
Copyright © Wombat Security Technologies, Inc. 2008-2012
Nissan Maxima Gear Shift
Copyright © Wombat Security Technologies, Inc. 2008-2012
 Users create a model from what they hear
from others, past experiences, and usage
 interactions with system image
Three Different Models
System Image
(Your implementation)
User Interactions
System feedback
Design Model
(How you intend the
system to work)
User Model
(How users think the
system works)
Copyright © Wombat Security Technologies, Inc. 2008-2012
Mental Models
 People inevitably build models of how
things work
 Ex. children and computers
 Ex. you and your car
 Ex. how hackers work (and why)
 Ex. visibility in social networking sites
 Ex. app stores (all apps vetted by Google?)
 Two options:
 Make the system match people’s models
 Foster a better mental model
Copyright © Wombat Security Technologies, Inc. 2008-2012
Example: Phishing Attacks
 Interviewed 40 people as part of an “email
study” (Downs et al, SOUPS 2006)
 Only 55% of participants said they had
ever noticed an unexpected or strange-
looking URL
 Most did not consider them to be suspicious
Copyright © Wombat Security Technologies, Inc. 2008-2012
Example: Phishing Attacks
 55% of participants reported being
cautious when email asks for sensitive
financial info
 But very few reported being suspicious of
email asking for passwords
 Knowledge of financial phish reduced
likelihood of falling for these scams
 But did not transfer to other scams, such as
an amazon.com password phish
Copyright © Wombat Security Technologies, Inc. 2008-2012
Can We Educate End-Users?
 Users not motivated to learn
 Security is a secondary task
 Difficult to teach people right decisions
without increasing false positives
 Basically, educating users is
as hard as herding cats
Copyright © Wombat Security Technologies, Inc. 2008-2012
Yes, End-Users Are Trainable
 Our research demonstrates users can
learn how to protect themselves… if you
can get them to pay attention to training
 Problem is that today’s training often
boring, time consuming, and ineffective
 All day lecture, no chance to practice skills
 Or passively watching videos
 Or posters and mugs and calendars
 Raise awareness, but little on what
to actually do
Copyright © Wombat Security Technologies, Inc. 2008-2012
How Do We Get People Trained?
 Create “teachable moments”
 Micro-games for training (fun)
 Use learning science principles throughout
PhishGuru Embedded Training Micro-Game on Phishing
Copyright © Wombat Security Technologies, Inc. 2008-2012
Micro-Games for Cyber Security
 Training doesn’t have to be long & boring
 Micro game format, play for short time
 Two-thirds of Americans played
a video game in past six months
 Not just young people
 Average game player 35 years old
 25% of people over 50 play games
 Not just males
 40% of casual gamers are women
Copyright © Wombat Security Technologies, Inc. 2008-2012
Case Study: Anti-Phishing Phil
 Tested Anti-Phishing Phil with ~4500
people
 Huge improvement by novices in identifying
phishing URLs
 Also dramatically lowered false positives
Copyright © Wombat Security Technologies, Inc. 2008-2012
Copyright © Wombat Security Technologies, Inc. 2008-2012
Copyright © Wombat Security Technologies, Inc. 2008-2012
Copyright © Wombat Security Technologies, Inc. 2008-2012
Copyright © Wombat Security Technologies, Inc. 2008-2012
Copyright © Wombat Security Technologies, Inc. 2008-2012
Copyright © Wombat Security Technologies, Inc. 2008-2012
Summary
 Human element most overlooked
aspect of computer security
 Ex. phishing scams, passwords, mobile
 Mental models important to design
 Mismatched models can cause failures
 Micro games one strategy for training
people about computer security
Copyright © Wombat Security Technologies, Inc. 2008-2012
Thanks, where can
I learn more?
Find more at
wombatsecurity.com
info@wombatsecurity.com
Copyright © Wombat Security Technologies, Inc. 2008-2012
Copyright © Wombat Security Technologies, Inc. 2008-2012
False negatives for users who played Anti-Phishing Phil (“game condition”). False negatives are
situations where people incorrectly label a phishing site as legitimate. Novices saw the greatest
reduction in false negatives, and retained what they had learned.
Copyright © Wombat Security Technologies, Inc. 2008-2012
False positives for users who played the Anti-Phishing Phil game. False positives are situations
where people incorrectly label a legitimate site as phishing. Again, novices saw the greatest
improvement in reducing false positives, and retained what they had learned.
Copyright © Wombat Security Technologies, Inc. 2008-2012
Copyright © Wombat Security Technologies, Inc. 2008-2012
Example Topic: Email
Security
Copyright © Wombat Security Technologies, Inc. 2008-2012
Example Topic: Passwords
Copyright © Wombat Security Technologies, Inc. 2008-2012
Other Training: Social
Networks
Copyright © Wombat Security Technologies, Inc. 2008-2012
Measurable
Copyright © Wombat Security Technologies, Inc. 2008-2012
Measurable
Copyright © Wombat Security Technologies, Inc. 2008-2012
Case Study #1: PhishGuru
 Canadian healthcare organization
 Three-month embedded training
campaign
 190 employees
 Security assessment and effective training in
context
Copyright © Wombat Security Technologies, Inc. 2008-2012
Simulated Phishing Email
Copyright © Wombat Security Technologies, Inc. 2008-2012
Case Study
Copyright © Wombat Security Technologies, Inc. 2008-2012
Measurable Reduction in Falling
for Phish
Viewed
Email
Only %
Viewed
Email and
Clicked
Link % Employees
Campaign 1 20 10.53% 35 18.42% 190
Campaign 2 37 19.47% 23 12.11% 190
Campaign 3 7 3.70% 10 5.29% 189
Copyright © Wombat Security Technologies, Inc. 2008-2012
0 10 20 30 40
Campaign3
Campaign2
Campaign1
ViewedEmail and Clicked
Link
ViewedEmail Only
Copyright © Wombat Security Technologies, Inc. 2008-2012
Can We Educate End-Users?
 Users not motivated to learn
 Security is a secondary task
 Difficult to teach people right decisions
without increasing false positives
“User education is a complete waste
of time. It is about as much use as
nailing jelly to a wall… They are not
interested…they just want to do their
job.”
-- An IBM security specialist
Copyright © Wombat Security Technologies, Inc. 2008-2012
Human Element of Security
 People are key part of computer
security for every organization
 Keeping passwords strong and secure
 Avoiding social engineering
 Avoiding malware
 Appropriate use of social networking
 Keeping mobile devices secure
 Overlooking human element is most
common mistake in computer security

Contenu connexe

Tendances

Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeUniversity of Geneva
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOsMorten Bjørklund
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final ResultsCIONET
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignoredrichard_turner
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School FDMagazine
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...GFI Software
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Peter Bihr
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelKoen Maris
 
The importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationThe importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationJisc
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOsIBM Security
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 

Tendances (20)

Reinstating Trust in the Digital Age
Reinstating Trust in the Digital AgeReinstating Trust in the Digital Age
Reinstating Trust in the Digital Age
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Social Media Can Not Be Ignored
Social Media Can Not Be IgnoredSocial Media Can Not Be Ignored
Social Media Can Not Be Ignored
 
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
 
The importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationThe importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and education
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 

En vedette

FFEA 2016 -10 Website Mistakes Even Great Marketers Can Make
FFEA 2016 -10 Website Mistakes Even Great Marketers Can MakeFFEA 2016 -10 Website Mistakes Even Great Marketers Can Make
FFEA 2016 -10 Website Mistakes Even Great Marketers Can MakeSaffire
 
5 Steps To A Smart Compensation Plan
5 Steps To A Smart Compensation Plan5 Steps To A Smart Compensation Plan
5 Steps To A Smart Compensation PlanBambooHR
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking waterEason Chan
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back KidEthos3
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChatChris Baker
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage ContentBarry Feldman
 
50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)Heinz Marketing Inc
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitudeWith Company
 

En vedette (9)

FFEA 2016 -10 Website Mistakes Even Great Marketers Can Make
FFEA 2016 -10 Website Mistakes Even Great Marketers Can MakeFFEA 2016 -10 Website Mistakes Even Great Marketers Can Make
FFEA 2016 -10 Website Mistakes Even Great Marketers Can Make
 
Stay Up To Date on the Latest Happenings in the Boardroom: Recommended Summer...
Stay Up To Date on the Latest Happenings in the Boardroom: Recommended Summer...Stay Up To Date on the Latest Happenings in the Boardroom: Recommended Summer...
Stay Up To Date on the Latest Happenings in the Boardroom: Recommended Summer...
 
5 Steps To A Smart Compensation Plan
5 Steps To A Smart Compensation Plan5 Steps To A Smart Compensation Plan
5 Steps To A Smart Compensation Plan
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking water
 
The Presentation Come-Back Kid
The Presentation Come-Back KidThe Presentation Come-Back Kid
The Presentation Come-Back Kid
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChat
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content
 
50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 

Similaire à Leveraging Human Factors for Effective Security Training, for ISSA Webinar May 2012

Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesZivaro Inc
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Jason Hong
 
A Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at QualcommA Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at QualcommB.J. Schone
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...Atle Skjekkeland
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?Robert Smith
 
Informationweek 500 - 2010 Enterprise Social Networking Presentation
Informationweek 500 - 2010 Enterprise Social Networking PresentationInformationweek 500 - 2010 Enterprise Social Networking Presentation
Informationweek 500 - 2010 Enterprise Social Networking PresentationMichael Healey
 
Enterprise2.0 Conference Presentation
Enterprise2.0 Conference PresentationEnterprise2.0 Conference Presentation
Enterprise2.0 Conference PresentationJennifer Okimoto
 
Brighttalk learning to cook- network management recipes - final
Brighttalk   learning to cook- network management recipes - finalBrighttalk   learning to cook- network management recipes - final
Brighttalk learning to cook- network management recipes - finalAndrew White
 
Network GRC Delivery
Network GRC DeliveryNetwork GRC Delivery
Network GRC Deliveryiansadler
 
importance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdfimportance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdfAbrahamGadissa
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 

Similaire à Leveraging Human Factors for Effective Security Training, for ISSA Webinar May 2012 (20)

Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security Technologies
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
A Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at QualcommA Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at Qualcomm
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
portfolio.docx
portfolio.docxportfolio.docx
portfolio.docx
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
 
Informationweek 500 - 2010 Enterprise Social Networking Presentation
Informationweek 500 - 2010 Enterprise Social Networking PresentationInformationweek 500 - 2010 Enterprise Social Networking Presentation
Informationweek 500 - 2010 Enterprise Social Networking Presentation
 
Enterprise2.0 Conference Presentation
Enterprise2.0 Conference PresentationEnterprise2.0 Conference Presentation
Enterprise2.0 Conference Presentation
 
Brighttalk learning to cook- network management recipes - final
Brighttalk   learning to cook- network management recipes - finalBrighttalk   learning to cook- network management recipes - final
Brighttalk learning to cook- network management recipes - final
 
Network GRC Delivery
Network GRC DeliveryNetwork GRC Delivery
Network GRC Delivery
 
importance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdfimportance-security-awareness-training-33013.pdf
importance-security-awareness-training-33013.pdf
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Security economics
Security economicsSecurity economics
Security economics
 

Dernier

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Dernier (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

Leveraging Human Factors for Effective Security Training, for ISSA Webinar May 2012

  • 1. Copyright © Wombat Security Technologies, Inc. 2008-2010 ISSA Webinar May 2012 Jason Hong, PhD Assoc. Prof, Carnegie Mellon University CTO, Wombat Security Technologies
  • 2. Copyright © Wombat Security Technologies, Inc. 2008-2012 About the Speaker  Assoc. Professor  Carnegie Mellon University, Human-Computer Interaction  Usable privacy and security, Mobile computing  Co-author  Co-founder of Wombat Security Technologies
  • 3. Copyright © Wombat Security Technologies, Inc. 2008-2012 About this Talk  Useful for people interested in:  How to effectively train people?  How to effectively design better user interfaces for privacy and security?  One case study from my research Micro Games for Security Education
  • 4. Copyright © Wombat Security Technologies, Inc. 2008-2012 What is Human-Computer Interaction?  Field that seeks to understand the relationship between people & computers  Designing useful, usable, desirable artifacts  Understanding how people use systems  Expanding the ways we can use computers  Combines behavioral sciences, interaction design, and computer science
  • 5. Copyright © Wombat Security Technologies, Inc. 2008-2012 Interactions Can Be Successful
  • 6. Copyright © Wombat Security Technologies, Inc. 2008-2012 Interactions Can Also Fail
  • 7. Copyright © Wombat Security Technologies, Inc. 2008-2012 Design Principles in 5 Minutes  How do people believe how things work?  Mental models describe how a person thinks something works  Incorrect mental models can make things very hard to understand and use
  • 8. Copyright © Wombat Security Technologies, Inc. 2008-2012 Mental Models Example: Refrigerator Freezer (temperature too cold) Fresh food (temperature just right)
  • 9. Copyright © Wombat Security Technologies, Inc. 2008-2012 Refrigerator Controls What is a typical conceptual model? Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0 A B C D E 7 6 5 4 3
  • 10. Copyright © Wombat Security Technologies, Inc. 2008-2012 7 6 5 4 3 A B C D E Most people think of independent controls Cooling Unit Cooling Unit A Common Conceptual Model
  • 11. Copyright © Wombat Security Technologies, Inc. 2008-2012  Two general solutions:  make controls map to user’s mental model  foster a more accurate mental model 7 6 5 4 3 A B C D E Cooling Unit Actual Conceptual Model Controls amount of cold air Controls amount air vectored up and down
  • 12. Copyright © Wombat Security Technologies, Inc. 2008-2012 Nissan Maxima Gear Shift
  • 13. Copyright © Wombat Security Technologies, Inc. 2008-2012  Users create a model from what they hear from others, past experiences, and usage  interactions with system image Three Different Models System Image (Your implementation) User Interactions System feedback Design Model (How you intend the system to work) User Model (How users think the system works)
  • 14. Copyright © Wombat Security Technologies, Inc. 2008-2012 Mental Models  People inevitably build models of how things work  Ex. children and computers  Ex. you and your car  Ex. how hackers work (and why)  Ex. visibility in social networking sites  Ex. app stores (all apps vetted by Google?)  Two options:  Make the system match people’s models  Foster a better mental model
  • 15. Copyright © Wombat Security Technologies, Inc. 2008-2012 Example: Phishing Attacks  Interviewed 40 people as part of an “email study” (Downs et al, SOUPS 2006)  Only 55% of participants said they had ever noticed an unexpected or strange- looking URL  Most did not consider them to be suspicious
  • 16. Copyright © Wombat Security Technologies, Inc. 2008-2012 Example: Phishing Attacks  55% of participants reported being cautious when email asks for sensitive financial info  But very few reported being suspicious of email asking for passwords  Knowledge of financial phish reduced likelihood of falling for these scams  But did not transfer to other scams, such as an amazon.com password phish
  • 17. Copyright © Wombat Security Technologies, Inc. 2008-2012 Can We Educate End-Users?  Users not motivated to learn  Security is a secondary task  Difficult to teach people right decisions without increasing false positives  Basically, educating users is as hard as herding cats
  • 18. Copyright © Wombat Security Technologies, Inc. 2008-2012 Yes, End-Users Are Trainable  Our research demonstrates users can learn how to protect themselves… if you can get them to pay attention to training  Problem is that today’s training often boring, time consuming, and ineffective  All day lecture, no chance to practice skills  Or passively watching videos  Or posters and mugs and calendars  Raise awareness, but little on what to actually do
  • 19. Copyright © Wombat Security Technologies, Inc. 2008-2012 How Do We Get People Trained?  Create “teachable moments”  Micro-games for training (fun)  Use learning science principles throughout PhishGuru Embedded Training Micro-Game on Phishing
  • 20. Copyright © Wombat Security Technologies, Inc. 2008-2012 Micro-Games for Cyber Security  Training doesn’t have to be long & boring  Micro game format, play for short time  Two-thirds of Americans played a video game in past six months  Not just young people  Average game player 35 years old  25% of people over 50 play games  Not just males  40% of casual gamers are women
  • 21. Copyright © Wombat Security Technologies, Inc. 2008-2012 Case Study: Anti-Phishing Phil  Tested Anti-Phishing Phil with ~4500 people  Huge improvement by novices in identifying phishing URLs  Also dramatically lowered false positives
  • 22. Copyright © Wombat Security Technologies, Inc. 2008-2012
  • 23. Copyright © Wombat Security Technologies, Inc. 2008-2012
  • 24. Copyright © Wombat Security Technologies, Inc. 2008-2012
  • 25. Copyright © Wombat Security Technologies, Inc. 2008-2012
  • 26. Copyright © Wombat Security Technologies, Inc. 2008-2012
  • 27. Copyright © Wombat Security Technologies, Inc. 2008-2012
  • 28. Copyright © Wombat Security Technologies, Inc. 2008-2012 Summary  Human element most overlooked aspect of computer security  Ex. phishing scams, passwords, mobile  Mental models important to design  Mismatched models can cause failures  Micro games one strategy for training people about computer security
  • 29. Copyright © Wombat Security Technologies, Inc. 2008-2012 Thanks, where can I learn more? Find more at wombatsecurity.com info@wombatsecurity.com
  • 30. Copyright © Wombat Security Technologies, Inc. 2008-2012
  • 31. Copyright © Wombat Security Technologies, Inc. 2008-2012 False negatives for users who played Anti-Phishing Phil (“game condition”). False negatives are situations where people incorrectly label a phishing site as legitimate. Novices saw the greatest reduction in false negatives, and retained what they had learned.
  • 32. Copyright © Wombat Security Technologies, Inc. 2008-2012 False positives for users who played the Anti-Phishing Phil game. False positives are situations where people incorrectly label a legitimate site as phishing. Again, novices saw the greatest improvement in reducing false positives, and retained what they had learned.
  • 33. Copyright © Wombat Security Technologies, Inc. 2008-2012
  • 34. Copyright © Wombat Security Technologies, Inc. 2008-2012 Example Topic: Email Security
  • 35. Copyright © Wombat Security Technologies, Inc. 2008-2012 Example Topic: Passwords
  • 36. Copyright © Wombat Security Technologies, Inc. 2008-2012 Other Training: Social Networks
  • 37. Copyright © Wombat Security Technologies, Inc. 2008-2012 Measurable
  • 38. Copyright © Wombat Security Technologies, Inc. 2008-2012 Measurable
  • 39. Copyright © Wombat Security Technologies, Inc. 2008-2012 Case Study #1: PhishGuru  Canadian healthcare organization  Three-month embedded training campaign  190 employees  Security assessment and effective training in context
  • 40. Copyright © Wombat Security Technologies, Inc. 2008-2012 Simulated Phishing Email
  • 41. Copyright © Wombat Security Technologies, Inc. 2008-2012 Case Study
  • 42. Copyright © Wombat Security Technologies, Inc. 2008-2012 Measurable Reduction in Falling for Phish Viewed Email Only % Viewed Email and Clicked Link % Employees Campaign 1 20 10.53% 35 18.42% 190 Campaign 2 37 19.47% 23 12.11% 190 Campaign 3 7 3.70% 10 5.29% 189
  • 43. Copyright © Wombat Security Technologies, Inc. 2008-2012 0 10 20 30 40 Campaign3 Campaign2 Campaign1 ViewedEmail and Clicked Link ViewedEmail Only
  • 44. Copyright © Wombat Security Technologies, Inc. 2008-2012 Can We Educate End-Users?  Users not motivated to learn  Security is a secondary task  Difficult to teach people right decisions without increasing false positives “User education is a complete waste of time. It is about as much use as nailing jelly to a wall… They are not interested…they just want to do their job.” -- An IBM security specialist
  • 45. Copyright © Wombat Security Technologies, Inc. 2008-2012 Human Element of Security  People are key part of computer security for every organization  Keeping passwords strong and secure  Avoiding social engineering  Avoiding malware  Appropriate use of social networking  Keeping mobile devices secure  Overlooking human element is most common mistake in computer security

Notes de l'éditeur

  1. Multiple choice questionsAudience questions too
  2. These findings led us to think about how to educate and train people about phishing attacks…
  3. http://news.cnet.com/21007350_361252132.html
  4. These findings led us to think about how to educate and train people about phishing attacks…
  5. http://news.cnet.com/21007350_361252132.html