1 / 26

Making Security Decisions Disappear into the User’s Workflow

Making Security Decisions Disappear into the User’s Workflow. Alan H. Karp and Marc Stiegler Virus Safe Computing Initiative Hewlett-Packard Laboratories. Carnac Research. Security Dialog Box Greatest Hits. The Real Question: How Do I Get My Work Done?. Lots of Work to Make Dialogs Clear.

miron
Download Presentation

Making Security Decisions Disappear into the User’s Workflow

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Making Security Decisions Disappear into the User’s Workflow Alan H. Karp and Marc Stiegler Virus Safe Computing Initiative Hewlett-Packard Laboratories

  2. Carnac Research

  3. Security Dialog Box Greatest Hits The Real Question: How Do I Get My Work Done?

  4. Lots of Work to Make Dialogs Clear

  5. Why are we asking?

  6. Let’s Work on This Document Together • Not secure – nobody encrypts email • Inconvenient – Must remember to send changes • Dangerous – No help with edit conflicts

  7. SCoopFS(The F is silent) Simple Secure Cooperative File Sharing

  8. Add a Pal

  9. Scoop a Pal

  10. Check Inbox

  11. Save the Attachment

  12. Change Your Mind

  13. What You Didn’t See No Help Button A crutch for developers No security boxes

  14. Actual User Feedback “This is a nice tool, but it would be better with some security. How do I turn it on?”

  15. But Security Is There https://sha-256-gircxeyeid756z4l.yurl.net:8443/-/mailbox/#s=dmgdue56oc3lqt Encryption – HTTPS Server authentication – domain name User authorization – unguessable fragment

  16. SCoopFS(The F is silent) Secure Simple Secure Cooperative File Sharing

  17. Beyond Engineering Wrote “Not One Click for Security” Realized there might be an underlying principle Stopped to think! (Professional driver on a closed course. Do not attempt.)

  18. Ping’s Ten Principles Make the easy way the least authority way. Use acts of designation to grant authority. Let the user reduce the authority an entity has. Keep the user aware of other’s relevant authorities. Keep the user aware of own authorities. Protect channels that manipulate the user’s authority. Let the user express security in terms that fit the job. Distinguish objects and actions relevant to the task. Use distinguishable, truthful appearances. Indicate clearly the consequences of user actions.

  19. Four Dimensions • Information Needed to make an intelligent decision • Expressiveness Must be able to implement desired policy • Control Need UI controls to inform system • Time When things are done affects user’s perception

  20. Six Degrees of Sharing Dynamic Recomposable Chained Attenuated Accountable Cross Domain

  21. Why people share Files with email

  22. What happens when you block sharing? People work around your barriers.

  23. Four Principles • Uniquely identify every user controllable object • Unique affordance for every decision • Uniquely identify every decision • Unique affordance for every change

  24. Other Applications Share Shell Simple Purse Text Bliki

  25. Can It Be Generalized? For security dialog boxes

  26. Q&A

More Related