Course Overview January 17, 2006 1

advertisement
Course Overview
January 17, 2006
Usable Privacy and Security • Carnegie Mellon University • Spring 2006 • Cranor/Hong/Reiter • http://cups.cs.cmu.edu/courses/ups-sp06/
1
Outline
Introduction to usable privacy and security
Review syllabus and course policies
• Distribute survey
Faculty research overview
Introduce students
Usable Privacy and Security • Carnegie Mellon University • Spring 2006 • Cranor/Hong/Reiter • http://cups.cs.cmu.edu/courses/ups-sp06/
2
Unusable security & privacy
-
Unpatched Windows machines compromised in minutes
-
Phishing web sites increasing by 28% each month
-
Most PCs infected with spyware (avg. = 25)
-
Users have more passwords than they can remember and practice poor
password security
-
Enterprises store confidential information on laptops and mobile
devices that are frequently lost or stolen
3
Grand Challenge
“Give end-users
security controls they can understand
and privacy they can control for
the dynamic, pervasive computing
environments of the future.”
- Computing Research Association 2003
4
Just work
security/privacy researchers
and system developers
human computer interaction researchers
and usability professionals
6
Symposium On Usable Privacy and Security
(SOUPS)
July 6-8, 2005
Pittsburgh, PA USA
http://cups.cs.cmu.edu/soups/
7
A preview of some topics we’ll
cover in this course
1.
Problems and approaches
2.
Passwords
3.
Symbols & metaphors
4.
Rethinking cookies
5.
Making Web privacy visible
8
Problems and
approaches
1.
How do you stay safe online?
10
Experts recommend…
POP!
12
After installing all that
security and privacy software
13
Do you have any time left to
get any work done?
14
Secondary tasks
Approaches to usable
security
- Make it “just work”
- Invisible security
- Make security/privacy understandable
- Make it visible
- Make it intuitive
- Use metaphors that users can relate to
- Train the user
16
Make decisions
- Developers
should not expect
users to make
decisions they
themselves can’t
make
17
Present choices, not
dilemmas
- Chris Nodder
(in charge of user
experience for XP SP2)
19
20
Passwords
2.
Typical advice
- Pick a hard to guess password
- Don’t use it anywhere else
- Change it often
- Don’t write it down
22
What do users do when every
web site wants a password?
24
25
Symbols &
Metaphors
3.
Cookie flag
Netscape SSL icons
IE6 cookie flag
Firefox SSL icon
27
Privacy Bird icons
Privacy policy
matches user’s
privacy preferences
Privacy policy
does not
match user’s
privacy
preferences
28
Rethinking cookies
4.
30
31
Making Web privacy
visible
5.
Web site privacy policies
- Many posted
- Few read
33
What if your browser
could read privacy
policies for you?
Platform for Privacy
Preferences (P3P)
- 2002 W3C Recommendation
- XML format for Web
privacy policies
- Protocol enables clients
to locate and fetch
policies from servers
TIFF
(Un QuickT
are necompressime™ and
ed
a
eded
to see ) decomp
re
this p
icture ssor
.
35
Privacy Bird
- P3P user agent
- Free download
http://privacybird.com/
- Compares user
preferences with
P3P policies
36
Chirping bird is privacy indicator
Red bird indicates mismatch
Privacy settings
Example:
Sending flowers
Wireless privacy
- Many users unaware that
communications over wireless
computer networks are not private
43
Wall of sheep
Defcon 2001
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Photo credit: Kyoorius @ techfreakz.org http://www.techfreakz.org/defcon10/?slide=38
Defcon 2004
QuickTime™ and a
TIFF (Uncompressed) decompressor
are needed to see this picture.
Photo credit: http://www.timekiller.org/gallery/DefconXII/photo0003
Peripheral display
- Help users form more accurate
expectations of privacy
- Without making the problem worse
47
48
Experimental trial
- 11 subjects in student workspace
- Data collected by survey and traffic
analysis
- Did they refine their expectations of
privacy?
49
Results
- No change in behavior
- Peripheral display raised privacy
awareness in student workspace
- But they didn’t really get it
50
Privacy awareness increased
“I feel like my information /activity /
privacy are not being protected ….
seems like someone can monitor or get
my information from my computer, or
even publish them.”
51
But only while the display was
on
“Now that words [projected on the
wall] are gone, I'll go back to the
same.”
52
Questions to ask about a
security or privacy cue
- Do users notice it?
- Do they know what it means?
- Do they know what they are supposed to do when
they see it?
- Will they actually do it?
- Will they keep doing it?
53
Syllabus
http://cups.cs.cmu.edu/courses/ups-sp06/
Homework (25%)
Lecture (25%)
Project (50%)
Textbook and readings
Schedule
Usable Privacy and Security • Carnegie Mellon University • Spring 2006 • Cranor/Hong/Reiter • http://cups.cs.cmu.edu/courses/ups-sp06/
54
Survey
Please fill out course survey and bring it
with you to class on Thursday
Usable Privacy and Security • Carnegie Mellon University • Spring 2006 • Cranor/Hong/Reiter • http://cups.cs.cmu.edu/courses/ups-sp06/
55
Faculty research overview
Quick Time™a nd a
TIFF ( Unco mpre ssed ) dec ompr esso r
ar e nee ded to see this pictur e.
QuickTime™ and a
TIF F (Uncompressed) decompressor
are needed to see this picture.
Lorrie
Cranor
Michael
Reiter
Jason
Hong
Usable Privacy and Security • Carnegie Mellon University • Spring 2006 • Cranor/Hong/Reiter • http://cups.cs.cmu.edu/courses/ups-sp06/
56
Student introductions
 Introduce yourself to your neighbor and tell them
your background. Tell them why you’re taking the
course and what you want to get out of the
course
 Form a group of ~4 and repeat
 Form a group of ~8 and repeat
 Pick someone to stand up in front of the class,
introduce your group members, and summarize
the reasons people in your group are taking the
course and what you want to get out of the
course
Usable Privacy and Security • Carnegie Mellon University • Spring 2006 • Cranor/Hong/Reiter • http://cups.cs.cmu.edu/courses/ups-sp06/
57
Download