Week 8 - Human Aspects Of Computer Security Flashcards
Security sometimes must be reduced to allow for end user usability. Learn about how humans are incorporated into computer security.
What are some bad practices with password policy?
Making passwords need to be overly complicated
Not encrypting passwords
Why could making a password overly complicated hinder security?
A user might write down a complicated password if they cannot remember it, making it less secure as someone else could find this physical password.
When was the first usable security and privacy conference held?
2005
When did the first publications and research outlining users as not the enemy come out? And by who?
Late 1990s by Adams and Sass.
What does SOUPS stand for?
Symposium on usable security and privacy.
What are common mistakes that end users make to do with passwords?
Writing down passwords
Using easily guessed or common passwords
What is a productive task?
A task where you are trying to achieve an objective or goal. This will have a secindary/supporting task attached.
This task could be to send an email.
What is a secondary/supporting task?
A secondary task that you must complete in order to achieve a productive primary task. A secondary task will also have a productive primary task.
Seoncdary tasks are often authentication, an example of this could be logging into your email.
What is human centered security.
When humans are considered as part of the security of a system. Their behaviour and motivations are factored into the security of the system, and the system is made to accommodate these needs.
What are Yee’s 9 guidelines for developing usable security systems?
- Path of least resistance
- Explicit authorisation
- Appropriate boundaries
- Revocability
- Expected ability
- Trusted path
- Identifiability
- Expressiveness
- Clarity
What is the path of least resistance guideline?
It says that the most likely path of steps to complete a task should be the most secure, meaning that extra security should be put in place there.
What is explicit authorisation guideline?
When a end user must explicitly grant authorisation to another actor (e.g another end user or process).
What is appropriate boundaries guideline?
When the interface should make it clear where you have distinct objects and actions that are relevant to only the user. E.g. The resources available to the user with their authorisation.
What is revocability guideline?
The interface should allow the user to revoke authorisation that they have granted in the past wherever possible.
What is expected ability guideline?
When the interface should not appear to provide functionality that it does not provide.
What is trusted path guideline?
The interface must provide an authenticated and secure communication channel between the user and trusted entities on the network.
What is it the identifiability guideline?
The interface should make sure that all distinct objects/resources and actions are make clear to be distinct and are unspoofable.
What is the expressiveness guideline?
The interface needs to be capable of describing a security policy with ease and allow users to easily implement their own security policies and rules to fit their goals.