100 likes | 187 Views
Icon-Based Representation of User Adherence to Security Policies. Creating Software to Modify Computer Users’ Behavior. Brian Overstreet. Overview. Background Research Statement Research Methods Results Future Directions Questions?. Background .
E N D
Icon-Based Representation of User Adherence to Security Policies Creating Software to Modify Computer Users’ Behavior Brian Overstreet
Overview • Background • Research Statement • Research Methods • Results • Future Directions • Questions?
Background • “People often represent weakest link in the security chain and are chronically responsible for the failure of security systems”1 • Most organizations ignore the human factor2 • Most users do not understand security or their part in it3 1. Schneier 2000 2. Koptyoff 2002 3. Adams and Sasse 1999
Background • Enforcement • Zero tolerance • Persuasion • Come on, you can do it • Alignment • Here’s all the information you need, now make your own decision
Research Statement • Can user agents be used to monitor, educate, and modify users’ behavior with regard to security policies and practices?
Research Methods • Devise an Agent with • Enforcement • logging • Persuasion • tokens • Alignment • information • Define the Characteristics • Icon Based
Results • Implemented Proof of Concept • C# • Windows Operating System
Next Step • Now we can take the agent to a testing environment to see if the agent is able to educate users and modify their behavior
Icon-Based Representation of User Adherence to Security Policies Creating Software to Modify Computer Users’ Behavior Douglas C. Sicker, Principal Investigator Brian Overstreet, Assistant