SlideShare a Scribd company logo
©2009CarnegieMellonUniversity:1
Leveraging Human Factors
for Effective Security Training
FISSEA 2012
Jason Hong
jasonh@cs.cmu.edu
©2012CarnegieMellonUniversity:2
About the Speaker
• Associate Prof, Carnegie Mellon
University, School of Comp Science
• Research and teaching interests:
– Usable privacy and security
– Mobile computing
• Co-author
• Startup
©2012CarnegieMellonUniversity:3
About this Talk
• Useful for people interested in:
– How to effectively train people?
– How to effectively design better
user interfaces for privacy and security?
• Two case studies from my research
Embedded Training Evaluating Warnings
©2012CarnegieMellonUniversity:4
Human Element of Security
• People are key part of computer
security for every organization
– Keeping passwords strong and secure
– Avoiding social engineering
– Avoiding malware
– Appropriate use of social networking
– Keeping mobile devices secure
• Overlooking human element is most
common mistake in computer security
©2012CarnegieMellonUniversity:5
What is Human-Computer
Interaction?
• Field that seeks to understand the
relationship between people & computers
– Designing useful, usable, desirable artifacts
– Understanding how people use systems
– Expanding the ways we can use computers
• Combines behavioral sciences,
interaction design, and computer science
©2012CarnegieMellonUniversity:6
Interactions Can Be Successful
©2012CarnegieMellonUniversity:7
Interactions Can Also Fail
©2012CarnegieMellonUniversity:8
Design Principles in 5 Minutes
• How do people believe
how things work?
• Mental models describe
how a person thinks
something works
• Incorrect mental models
can make things very hard
to understand and use
©2012CarnegieMellonUniversity:9
Mental Models Example:
Refrigerator
Freezer
(temperature too cold)
Fresh food
(temperature just right)
©2012CarnegieMellonUniversity:10
Refrigerator Controls
What is a typical conceptual model?
Normal Settings C and 5
Colder Fresh Food C and 6-7
Coldest Fresh Food B and 8-9
Colder Freezer D and 7-8
Warmer Fresh Food C and 4-1
OFF (both) 0
A B C D E 7 6 5 4 3
©2012CarnegieMellonUniversity:11
7 6 5 4 3
A B C D E
Most people think of
independent controls
Cooling
Unit
Cooling
Unit
A Common Conceptual Model
©2012CarnegieMellonUniversity:12
• Now can you fix the problem?
• Two general solutions:
– make controls map to user’s mental model
– foster a more accurate mental model
7 6 5 4 3
A B C D E
Cooling
Unit
Actual Conceptual Model
Controls amount of cold air
Controls amount air vectored up and down
©2012CarnegieMellonUniversity:13
Nissan Maxima Gear Shift
©2012CarnegieMellonUniversity:14
• Users create a model from what they hear
from others, past experiences, and usage
– interactions with system image
Three Different Models
Design Model
(How you intend the
system to work)
Design Model
(How you intend the
system to work)
User Model
(How users think the
system works)
User Model
(How users think the
system works)
System Image
(Your implementation)
System Image
(Your implementation)
User Interactions
System feedback
©2012CarnegieMellonUniversity:15
Mental Models
• People inevitably build models of how
things work
– Ex. children and computers
– Ex. you and your car
– Ex. how hackers work (and why)
– Ex. visibility in social networking sites
– Ex. app stores (all apps vetted by Google?)
• Two options:
– Make the system match people’s models
– Foster a better mental model
©2012CarnegieMellonUniversity:16
Example: Phishing Attacks
• Interviewed 40 people as part of an
“email study” (Downs et al, SOUPS 2006)
• Only 55% of participants said they had
ever noticed an unexpected or strange-
looking URL
– Most did not consider them to be suspicious
©2012CarnegieMellonUniversity:17
Example: Phishing Attacks
• 55% of participants reported being
cautious when email asks for sensitive
financial info
– But very few reported being suspicious of
email asking for passwords
• Knowledge of financial phish reduced
likelihood of falling for these scams
– But did not transfer to other scams, such
as an amazon.com password phish
©2012CarnegieMellonUniversity:18
Can We Educate End-Users?
• Users not motivated to learn
• Security is a secondary task
• Difficult to teach people right decisions
without increasing false positives
• Basically, educating users is
as hard as herding cats
©2012CarnegieMellonUniversity:19
Yes, End-Users Are Trainable
• Our research demonstrates users can
learn how to protect themselves… if you
can get them to pay attention to training
• Problem is that today’s training often
boring, time consuming, and ineffective
– All day lecture, no chance to practice skills
– Or passively watching videos
– Or posters and mugs and calendars
– Raise awareness, but little on what
to actually do
©2012CarnegieMellonUniversity:20
How Do We Get People Trained?
• Create “teachable moments”
• Micro-games for training (fun)
• Use learning science principles throughout
Embedded Training Micro-Game on Phishing
©2012CarnegieMellonUniversity:21
PhishGuru Embedded Training
• Send simulated phishing emails
• If recipient falls for it, show intervention
that teaches what cues to look for in
succinct and engaging format
– Useful for people who don’t know
that they don’t know
• Multiple user studies have demonstrated
that PhishGuru is effective
• Delivering training via direct email
not effective
©2012CarnegieMellonUniversity:22
Subject: Revision to Your Amazon.com InformationSubject: Revision to Your Amazon.com Information
©2012CarnegieMellonUniversity:23
Subject: Revision to Your Amazon.com InformationSubject: Revision to Your Amazon.com Information
Please login and enter your informationPlease login and enter your information
©2012CarnegieMellonUniversity:24
©2012CarnegieMellonUniversity:25
Learning Science
• Area of research examining learning,
retention, and transfer of skills
• Example principles
– Learning by doing
– Immediate feedback
– Conceptual-procedural
– Reflection
– … many others
©2012CarnegieMellonUniversity:26
Evaluation of PhishGuru
• Is embedded training effective?
– We’ve conducted 4 peer-reviewed studies
showing embedded training works well
– Studies showed significant decrease in
falling for phish and ability to retain what
they learned
P. Kumaraguru et al. Protecting People from Phishing:
The Design and Evaluation of an Embedded Training
Email System. CHI 2007.
P. Kumaraguru et al. School of Phish: A Real-Word
Evaluation of Anti-Phishing Training. SOUPS 2009.
©2012CarnegieMellonUniversity:27
Results of One Study
• Tested 500+ people in one month
– 1 simulated phish at beginning of month,
testing done at end of month
• ~50% reduction in falling for phish
– 68 out of 85 surveyed said they recommend
continuing doing this sort of training in the
future
– “I really liked the idea of sending
[organization] fake phishing emails and then
saying to them, essentially, HEY! You
could've just gotten scammed! You should
be more careful – here's how...”
©2012CarnegieMellonUniversity:28
Can Browser Interfaces Help?
• Modern web browsers come with
blacklists and special interfaces for
identifying phish
– Our evaluation of several blacklists show
they catch ~80% of phish after 24 hours,
not very good in first few hours
• Are these browser interfaces effective?
– And, what can we learn from them?
– Science of Warnings from human factors
©2012CarnegieMellonUniversity:29
Screenshots
Internet Explorer 7 – Passive Warning
©2012CarnegieMellonUniversity:30
Screenshots
Internet Explorer 7 – Active Block
©2012CarnegieMellonUniversity:31
Screenshots
Mozilla Firefox – Active Block
©2012CarnegieMellonUniversity:32
How Effective are these
Warnings?
• Tested four conditions
– FireFox Active Block
– IE Active Block
– IE Passive Warning
– Control (no warnings or blocks)
• “Shopping Study”
– Setup phishing pages and added to blacklists
– Phished users after real purchases (2 phish)
– Used real email accounts and personal info
S. Egelman, L. Cranor, and J. Hong. You've Been Warned:
An Empirical Study of the Effectiveness of Web Browser Phishing
Warnings. CHI 2008.
©2012CarnegieMellonUniversity:33
How Effective are these
Warnings?
Almost everyone clicked, even those
with strong technical backgrounds
©2012CarnegieMellonUniversity:34
How Effective are these
Warnings?
• No one in Firefox condition fell for our phish
• People in Firefox condition not more technically savvy
©2012CarnegieMellonUniversity:35
Discussion of Phish Warnings
• Nearly everyone will fall for highly
targeted and contextualized phish
• Passive IE warning failed for many
reasons
– Didn’t interrupt the main task
– Can be slow to appear (up to 5 seconds)
– Not clear what the right action was
– Looked too much like other ignorable
warnings (habituation)
– Bug, any keystroke dismissed
©2012CarnegieMellonUniversity:36
Screenshots
Internet Explorer – Passive Warning
©2012CarnegieMellonUniversity:37
Discussion of Phish Warnings
• Active IE warnings
– Most saw the warning, but many did not
believe it
• “Since it gave me the option of still
proceeding to the website, I figured it
couldn’t be that bad”
– Some element of habituation (looks like
other warnings)
– Saw two pathological cases
©2012CarnegieMellonUniversity:38
Screenshots
Internet Explorer – Active Block
©2012CarnegieMellonUniversity:39
MSIE8 Re-design Based on
our Work
MSIE8 Redesign Based on our Work
©2012CarnegieMellonUniversity:40
A Science of
Warnings
• C-HIP model
for real-world
warnings
– See the warning?
– Understand it?
– Believe it?
– Motivated?
– Can and will act?
©2012CarnegieMellonUniversity:41
Designing for Path of Least
Resistance
• Where possible, make the
default behavior safe
– Ex. The two pathological cases
– Assume people won’t see, read,
believe, or be motivated
• Active warnings over passive warnings
– Interrupt people if warning is important
– Need to balance this with habituation
• Make important warnings look very
different
©2012CarnegieMellonUniversity:42
Summary
• Human element most overlooked
aspect of computer security
– Ex. phishing scams, passwords, mobile
• Mental models important to design
– Mismatched models can cause failures
• Security training can work if done right
– Learning sciences
• C-HIP model for security warnings
– Do people see, understand, believe,
and can act on warnings?
©2012CarnegieMellonUniversity:43
More of Our Research
• Our team does research on:
– Better password policies
– Alternatives to passwords
– Mobile apps, privacy and security
– Location-based services and privacy
– Social networking and privacy
– Configuring firewalls
©2012CarnegieMellonUniversity:44
More of Our Research
• http://cups.cs.cmu.edu
• http://mcom.cs.cmu.edu
• http://cmuchimps.org/
©2012CarnegieMellonUniversity:45
Thanks, where can
I learn more?
Find more at
wombatsecurity.com
jasonh@cs.cmu.edu
©2012CarnegieMellonUniversity:46
©2012CarnegieMellonUniversity:47
Micro-Games for Cyber
Security
• Training doesn’t have to be long & boring
• Micro game format, play for short time
• Two-thirds of Americans played
a video game in past six months
• Not just young people
– Average game player 35 years old
– 25% of people over 50 play games
• Not just males
– 40% of casual gamers are women
©2012CarnegieMellonUniversity:48
Case Study: Anti-Phishing Phil
• Tested Anti-Phishing Phil with ~4500
people
– Huge improvement by novices in identifying
phishing URLs
– Also dramatically lowered false positives
©2012CarnegieMellonUniversity:49
©2012CarnegieMellonUniversity:50
©2012CarnegieMellonUniversity:51
©2012CarnegieMellonUniversity:52
©2012CarnegieMellonUniversity:53
©2012CarnegieMellonUniversity:54
©2012CarnegieMellonUniversity:55
False negatives for users who played Anti-Phishing Phil (“game condition”). False negatives are
situations where people incorrectly label a phishing site as legitimate. Novices saw the greatest
reduction in false negatives, and retained what they had learned.
©2012CarnegieMellonUniversity:56
False positives for users who played the Anti-Phishing Phil game. False positives are situations
where people incorrectly label a legitimate site as phishing. Again, novices saw the greatest
improvement in reducing false positives, and retained what they had learned.
©2012CarnegieMellonUniversity:57
©2012CarnegieMellonUniversity:58
Example Topic: Email Security
©2012CarnegieMellonUniversity:59
Example Topic: Passwords
©2012CarnegieMellonUniversity:60
Other Training: Social
Networks
©2012CarnegieMellonUniversity:61
Measurable
©2012CarnegieMellonUniversity:62
Measurable
©2012CarnegieMellonUniversity:63
Case Study #1: PhishGuru
• Canadian healthcare organization
• Three-month embedded training
campaign
– 190 employees
– Security assessment and effective training in
context
©2012CarnegieMellonUniversity:64
Simulated Phishing Email
©2012CarnegieMellonUniversity:65
Case Study
©2012CarnegieMellonUniversity:66
Measurable Reduction in
Falling for Phish
Viewed
Email
Only %
Viewed
Email and
Clicked
Link % Employees
Campaign 1 20 10.53% 35 18.42% 190
Campaign 2 37 19.47% 23 12.11% 190
Campaign 3 7 3.70% 10 5.29% 189
©2012CarnegieMellonUniversity:67
0 10 20 30 40
Campaign3
Campaign2
Campaign1
ViewedEmail and Clicked
Link
ViewedEmail Only
©2012CarnegieMellonUniversity:68
Can We Educate End-Users?
• Users not motivated to learn
• Security is a secondary task
• Difficult to teach people right decisions
without increasing false positives
“User education is a complete waste
of time. It is about as much use as
nailing jelly to a wall… They are not
interested…they just want to do their
job.”
-- An IBM security specialist

More Related Content

What's hot

Developing Mobile Learnigng
Developing Mobile Learnigng Developing Mobile Learnigng
Developing Mobile Learnigng
Kayla Camlin
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
Diana Benner
 
benefits-and-challenges-of-elearning
benefits-and-challenges-of-elearningbenefits-and-challenges-of-elearning
benefits-and-challenges-of-elearning
Maarten Cannaerts
 
Model equipment distribution essay
Model equipment distribution essayModel equipment distribution essay
Model equipment distribution essayivanzampedri
 
Final Project, Power Point Presentation[1]
Final Project, Power Point Presentation[1]Final Project, Power Point Presentation[1]
Final Project, Power Point Presentation[1]guesta27a047
 
My portfolio in Educational Technology
My portfolio in Educational TechnologyMy portfolio in Educational Technology
My portfolio in Educational Technology
Gellie Perido
 
Updated tri center 2012 csd technology
Updated tri center 2012 csd technologyUpdated tri center 2012 csd technology
Updated tri center 2012 csd technologyTri-Center
 
1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools
Securly
 
Digital Citizenship community evening
Digital Citizenship community eveningDigital Citizenship community evening
Digital Citizenship community eveningLisaCavanagh
 
Tri center 2012 csd technology
Tri center 2012 csd technologyTri center 2012 csd technology
Tri center 2012 csd technologyTri-Center
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
Sue Noor
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
John Oxley
 
The New Information Ecosystem in Education
The New Information Ecosystem in EducationThe New Information Ecosystem in Education
The New Information Ecosystem in Education
Darwin Gosal
 
What will be the most interesting changes after COVID-19?
What will be the most interesting changes after COVID-19? What will be the most interesting changes after COVID-19?
What will be the most interesting changes after COVID-19?
Khulisa Management Services
 
Assessment for Learning: Leveraging Technology
Assessment for Learning: Leveraging TechnologyAssessment for Learning: Leveraging Technology
Assessment for Learning: Leveraging Technology
Jeremy Williams
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
Point2Protect
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product Brief
Securly
 

What's hot (17)

Developing Mobile Learnigng
Developing Mobile Learnigng Developing Mobile Learnigng
Developing Mobile Learnigng
 
Surviving a BYOD Implementation
Surviving a BYOD ImplementationSurviving a BYOD Implementation
Surviving a BYOD Implementation
 
benefits-and-challenges-of-elearning
benefits-and-challenges-of-elearningbenefits-and-challenges-of-elearning
benefits-and-challenges-of-elearning
 
Model equipment distribution essay
Model equipment distribution essayModel equipment distribution essay
Model equipment distribution essay
 
Final Project, Power Point Presentation[1]
Final Project, Power Point Presentation[1]Final Project, Power Point Presentation[1]
Final Project, Power Point Presentation[1]
 
My portfolio in Educational Technology
My portfolio in Educational TechnologyMy portfolio in Educational Technology
My portfolio in Educational Technology
 
Updated tri center 2012 csd technology
Updated tri center 2012 csd technologyUpdated tri center 2012 csd technology
Updated tri center 2012 csd technology
 
1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools1:1 Device Theft in K-12 Schools
1:1 Device Theft in K-12 Schools
 
Digital Citizenship community evening
Digital Citizenship community eveningDigital Citizenship community evening
Digital Citizenship community evening
 
Tri center 2012 csd technology
Tri center 2012 csd technologyTri center 2012 csd technology
Tri center 2012 csd technology
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
The New Information Ecosystem in Education
The New Information Ecosystem in EducationThe New Information Ecosystem in Education
The New Information Ecosystem in Education
 
What will be the most interesting changes after COVID-19?
What will be the most interesting changes after COVID-19? What will be the most interesting changes after COVID-19?
What will be the most interesting changes after COVID-19?
 
Assessment for Learning: Leveraging Technology
Assessment for Learning: Leveraging TechnologyAssessment for Learning: Leveraging Technology
Assessment for Learning: Leveraging Technology
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
Student Safety Reimagined - Product Brief
Student Safety Reimagined - Product BriefStudent Safety Reimagined - Product Brief
Student Safety Reimagined - Product Brief
 

Viewers also liked

Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
Jason Hong
 
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Jason Hong
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Jason Hong
 
Gamification and Security Oct2012
Gamification and Security Oct2012Gamification and Security Oct2012
Gamification and Security Oct2012
Jason Hong
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Jason Hong
 
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Jason Hong
 
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Jason Hong
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Jason Hong
 
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Jason Hong
 
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
Jason Hong
 
Why People Hate Your App: Making Sense of User Feedback in a Mobile App Stor...
Why People Hate Your App: Making  Sense of User Feedback in a Mobile App Stor...Why People Hate Your App: Making  Sense of User Feedback in a Mobile App Stor...
Why People Hate Your App: Making Sense of User Feedback in a Mobile App Stor...
Jason Hong
 
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Jason Hong
 
Improving Usable Authentication
Improving Usable AuthenticationImproving Usable Authentication
Improving Usable Authentication
Jason Hong
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Jason Hong
 
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Jason Hong
 
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Jason Hong
 
Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004
Jason Hong
 
Informal PUIs: No Recognition Required, at AAAI 2002 workshop
Informal PUIs: No Recognition Required, at AAAI 2002 workshopInformal PUIs: No Recognition Required, at AAAI 2002 workshop
Informal PUIs: No Recognition Required, at AAAI 2002 workshop
Jason Hong
 

Viewers also liked (20)

Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
 
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
Applications and Privacy Issues with Sensor Nets, at Microsoft Faculty Summit...
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Gamification and Security Oct2012
Gamification and Security Oct2012Gamification and Security Oct2012
Gamification and Security Oct2012
 
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
Analyzing the Privacy of Smartphone Apps, for CMU Cylab Talk on April 2013
 
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. ...
 
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Syst...
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
Applying the Wisdom of Crowds to Usable Privacy and Security, CMU Crowdsourci...
 
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
 
Why People Hate Your App: Making Sense of User Feedback in a Mobile App Stor...
Why People Hate Your App: Making  Sense of User Feedback in a Mobile App Stor...Why People Hate Your App: Making  Sense of User Feedback in a Mobile App Stor...
Why People Hate Your App: Making Sense of User Feedback in a Mobile App Stor...
 
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sep...
 
Improving Usable Authentication
Improving Usable AuthenticationImproving Usable Authentication
Improving Usable Authentication
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
 
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People N...
 
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
Exploring Capturable Everyday Memory for Autobiographical Authentication, at ...
 
Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004Siren: Context-aware Computing for Firefighting, at Pervasive2004
Siren: Context-aware Computing for Firefighting, at Pervasive2004
 
Informal PUIs: No Recognition Required, at AAAI 2002 workshop
Informal PUIs: No Recognition Required, at AAAI 2002 workshopInformal PUIs: No Recognition Required, at AAAI 2002 workshop
Informal PUIs: No Recognition Required, at AAAI 2002 workshop
 
Shelby
ShelbyShelby
Shelby
 

Similar to Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012

Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Jason Hong
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Jason Hong
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Jason Hong
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
Jason Hong
 
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Jason Hong
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Jason Hong
 
IWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWWIWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWW
IWMW
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Construction
jxyz
 
Emtech Deck
Emtech DeckEmtech Deck
Emtech Deck
bc biermann
 
Interactive Machine Learning
Interactive  Machine LearningInteractive  Machine Learning
Interactive Machine Learning
Zitao Liu
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
eckchela
 
Elder Abuse Research
Elder Abuse ResearchElder Abuse Research
Elder Abuse Research
Laura Torres
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Jason Hong
 
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
ZoneFox
 
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007Jason Hong
 
Dragons's Den 2014 Semester 1
Dragons's Den 2014 Semester 1Dragons's Den 2014 Semester 1
Dragons's Den 2014 Semester 1
Samuel Mann
 
Emtech Deck
Emtech DeckEmtech Deck
Emtech Deck
bc biermann
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
Donald E. Hester
 
應用行動科技紀錄與研究人們日常生活行為與脈絡
應用行動科技紀錄與研究人們日常生活行為與脈絡 應用行動科技紀錄與研究人們日常生活行為與脈絡
應用行動科技紀錄與研究人們日常生活行為與脈絡
Stanley Chang
 
Online Proctoring
Online ProctoringOnline Proctoring
Online Proctoring
Charles Darwin University
 

Similar to Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012 (20)

Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
 
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
Are my Devices Spying on Me? Living in a World of Ubiquitous Computing
 
IWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWWIWMW 2007: Usability Testing for the WWW
IWMW 2007: Usability Testing for the WWW
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Construction
 
Emtech Deck
Emtech DeckEmtech Deck
Emtech Deck
 
Interactive Machine Learning
Interactive  Machine LearningInteractive  Machine Learning
Interactive Machine Learning
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Elder Abuse Research
Elder Abuse ResearchElder Abuse Research
Elder Abuse Research
 
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...Social Cybersecurity, or, A Computer Scientist's View of HCI and Theory, at ...
Social Cybersecurity , or, A Computer Scientist's View of HCI and Theory, at ...
 
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
 
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
User Interfaces and Algorithms for Fighting Phishing, Cylab Seminar talk 2007
 
Dragons's Den 2014 Semester 1
Dragons's Den 2014 Semester 1Dragons's Den 2014 Semester 1
Dragons's Den 2014 Semester 1
 
Emtech Deck
Emtech DeckEmtech Deck
Emtech Deck
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
應用行動科技紀錄與研究人們日常生活行為與脈絡
應用行動科技紀錄與研究人們日常生活行為與脈絡 應用行動科技紀錄與研究人們日常生活行為與脈絡
應用行動科技紀錄與研究人們日常生活行為與脈絡
 
Online Proctoring
Online ProctoringOnline Proctoring
Online Proctoring
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012

Editor's Notes

  1. On the left is Nissan Maxima gear shift. It turns out my brother was driving in 3 rd gear for over a year before I pointed out to him that 3 and D are separate. The older Nissan Maxima gear shift on the right makes it hard to make this mistake.
  2. These findings led us to think about how to educate and train people about phishing attacks…
  3. http://news.cnet.com/21007350_361252132.html
  4. These findings led us to think about how to educate and train people about phishing attacks…
  5. These findings led us to think about how to educate and train people about phishing attacks…
  6. ASSUME THAT THIS IS YOUR EMAIL INBOX AND AMONG OTHER EMAILS.. YOU THIS EMAIL FROM AMAZON THAT JUST LOOKS LIKE THE LEGITIMATE EMAIL FROM AMAZON. WHEN YOU OPEN THE EMAIL ….
  7. YOU WILL SEE THIS.. WHICH LOOKS LEGITIMATE.. AND WITH THE DATA THAT WE HAVE .. WE KNOW THAT MOST OF THE USERS WILL CLICK ON THE LINK.. WHEN THEY CLICK ON THE LINK THEY WILL SEE ….
  8. P. Kumaraguru et al. Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System. CHI 2007. P. Kumaraguru et al. Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer . eCrime 2007.
  9. Our evaluation of several blacklists show they catch ~80% of phish after 24 hours, not very good in first few hours Also only catch “shotgun phish” rather than spear-phish
  10. S. Egelman, L. Cranor, and J. Hong. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. CHI 2008.
  11. http://wombatsecurity.com/file_download/6/PhishGuru%20White%20Paper.pdf http://wombatsecurity.com/file_download/8/Anti-Phishing%20Phil%20whitepaper.pdf
  12. http://news.cnet.com/21007350_361252132.html