25
WHY IS USABLE SECURITY HARD? AND WHAT SHOULD WE DO ABOUT IT? Adrienne Porter Felt, Google

WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

WHY IS USABLE SECURITY HARD?AND WHAT SHOULD WE DO ABOUT IT?

Adrienne Porter Felt, Google

Page 2: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 3: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

invisible when you don’t need it, helpful when you do

A security feature should be...

Page 4: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 5: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 6: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 7: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 8: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

Usable security is science,BUT NOT ENOUGH PEOPLE TREAT IT LIKE SCIENCE

Page 9: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 10: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 11: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 12: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

NOTIFICATIONS

# prior requests

Acc

ep

tan

ce r

ate

Page 13: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

NOTIFICATIONS

# prior requests

Acc

ep

tan

ce r

ate

GEOLOCATION

Page 14: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 15: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 16: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 17: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

Control The website ahead contains malware!

The website ahead contains malware! Go back!

Control This file is malicious.

This file is malicious. Discard this file to stay safe.

This file is malicious. To stay safe, don’t run it.

This file is malicious. To stay safe, discard it.

Page 18: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

Control The website ahead contains malware! 84%

The website ahead contains malware! Go back! 82%

Control This file is malicious. 77%

This file is malicious. Discard this file to stay safe. 76%

This file is malicious. To stay safe, don’t run it. 78%

This file is malicious. To stay safe, discard it. 74%

Page 19: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 20: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 21: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 22: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

ANDROID WINDOWS

MALWARE WARNINGS

Page 23: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

ANDROID WINDOWS

HTTPS ERROR WARNINGS

Page 24: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be
Page 25: WHY IS USABLE SECURITY HARD? Adrienne Porter Felt, Google ... · Adrienne Porter Felt, Google. invisible when you don’t need it, helpful when you do A security feature should be

Usable security is science,SO DO GREAT SCIENCE & SHARE IT WITH EVERYONE