Week 8 - Human Aspects Of Computer Security Flashcards
Security sometimes must be reduced to allow for end user usability. Learn about how humans are incorporated into computer security.
What are some bad practices with password policy?
Making passwords need to be overly complicated
Not encrypting passwords
Why could making a password overly complicated hinder security?
A user might write down a complicated password if they cannot remember it, making it less secure as someone else could find this physical password.
When was the first usable security and privacy conference held?
2005
When did the first publications and research outlining users as not the enemy come out? And by who?
Late 1990s by Adams and Sass.
What does SOUPS stand for?
Symposium on usable security and privacy.
What are common mistakes that end users make to do with passwords?
Writing down passwords
Using easily guessed or common passwords
What is a productive task?
A task where you are trying to achieve an objective or goal. This will have a secindary/supporting task attached.
This task could be to send an email.
What is a secondary/supporting task?
A secondary task that you must complete in order to achieve a productive primary task. A secondary task will also have a productive primary task.
Seoncdary tasks are often authentication, an example of this could be logging into your email.
What is human centered security.
When humans are considered as part of the security of a system. Their behaviour and motivations are factored into the security of the system, and the system is made to accommodate these needs.
What are Yee’s 9 guidelines for developing usable security systems?
- Path of least resistance
- Explicit authorisation
- Appropriate boundaries
- Revocability
- Expected ability
- Trusted path
- Identifiability
- Expressiveness
- Clarity
What is the path of least resistance guideline?
It says that the most likely path of steps to complete a task should be the most secure, meaning that extra security should be put in place there.
What is explicit authorisation guideline?
When a end user must explicitly grant authorisation to another actor (e.g another end user or process).
What is appropriate boundaries guideline?
When the interface should make it clear where you have distinct objects and actions that are relevant to only the user. E.g. The resources available to the user with their authorisation.
What is revocability guideline?
The interface should allow the user to revoke authorisation that they have granted in the past wherever possible.
What is expected ability guideline?
When the interface should not appear to provide functionality that it does not provide.
What is trusted path guideline?
The interface must provide an authenticated and secure communication channel between the user and trusted entities on the network.
What is it the identifiability guideline?
The interface should make sure that all distinct objects/resources and actions are make clear to be distinct and are unspoofable.
What is the expressiveness guideline?
The interface needs to be capable of describing a security policy with ease and allow users to easily implement their own security policies and rules to fit their goals.
What is the clarity guideline?
If an action has a potential negative impact on the security of system, then the user should be clearly warned of the impact of this action before they attempt to take it.
What is phishing?
When an attacker tries to trick a user into giving away login credentials, personal information or to download malware.
They use emails pretending to be a legitimate source, usually attaching a link that invites the user to click on it. The link is normally of a malicious but elgimate looking website (Often a recreation of a bank website) that asks the user to ‘confirm’ their details. The link could also be a download link for some malware.
What type of attack is phishing?
A social engineering attack.
How do you identify a phishing attacks?
Spelling errors
Lack of user identifiable information (Users name)
Wrong email address
Being asked to confirm login details over email
Non official website url
Advanced techniques):
Vieiwng original email source code
How do you open the original source code for an email?
Open an email message, click the drop downs and click ‘Show original’.
How do you get the from address if an email in the source code?
You need an SMTP server
The correct mailing software
You can use these to fill in the from email.