leveraging human factors for effective security training€¦ · • modern web browsers come with...

68
©2009 Carnegie Mellon University : 1 Leveraging Human Factors for Effective Security Training FISSEA 2012 Jason Hong [email protected]

Upload: others

Post on 03-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

09 C

arne

gie

Mel

lon

Uni

vers

ity

1

Leveraging Human Factors for Effective Security Training

FISSEA 2012

Jason Hongjasonhcscmuedu

About the Speaker

bull Associate Prof Carnegie Mellon University School of Comp Science

bull Research and teaching interests ndash Usable privacy and security ndash Mobile computing

bull Co-author bull Startup

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

About this Talk

bull Useful for people interested in ndash How to effectively train people ndash How to effectively design better

user interfaces for privacy and security bull Two case studies from my research

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

4

Human Element of Security

bull People are key part of computer security for every organization ndash Keeping passwords strong and secure ndash Avoiding social engineering ndash Avoiding malware ndash Appropriate use of social networking ndash Keeping mobile devices secure

bull Overlooking human element is most common mistake in computer security

What is Human-Computer Interaction Field that seeks to understand the

ndash Designing useful usable desirable artifacts

ndash Understanding how people use systems ndash Expanding the ways we can use computers

Combines behavioral sciences interaction design and computer science

relationship between people amp computers

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

copy20

12

Car

negi

e M

ello

n U

nive

rsity

6

Interactions Can Be Successful

copy

2012

Car

negi

e M

ello

n U

nive

rsity

7

Interactions Can Also Fail

copy20

12

Design Principles in 5 Minutes

How do people believe how things work

Mental models describe how a person thinks something works Incorrect mental models can make things very hard to understand and use

Car

negi

e M

ello

n U

nive

rsity

8

Mental Models Example Refrigerator

Freezer (temperature too cold)

Fresh food (temperature just right)

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

9

Refrigerator Controls

Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0

A B C D E 7 6 5 4 3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

0

What is a typical conceptual model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 2: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

About the Speaker

bull Associate Prof Carnegie Mellon University School of Comp Science

bull Research and teaching interests ndash Usable privacy and security ndash Mobile computing

bull Co-author bull Startup

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

About this Talk

bull Useful for people interested in ndash How to effectively train people ndash How to effectively design better

user interfaces for privacy and security bull Two case studies from my research

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

4

Human Element of Security

bull People are key part of computer security for every organization ndash Keeping passwords strong and secure ndash Avoiding social engineering ndash Avoiding malware ndash Appropriate use of social networking ndash Keeping mobile devices secure

bull Overlooking human element is most common mistake in computer security

What is Human-Computer Interaction Field that seeks to understand the

ndash Designing useful usable desirable artifacts

ndash Understanding how people use systems ndash Expanding the ways we can use computers

Combines behavioral sciences interaction design and computer science

relationship between people amp computers

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

copy20

12

Car

negi

e M

ello

n U

nive

rsity

6

Interactions Can Be Successful

copy

2012

Car

negi

e M

ello

n U

nive

rsity

7

Interactions Can Also Fail

copy20

12

Design Principles in 5 Minutes

How do people believe how things work

Mental models describe how a person thinks something works Incorrect mental models can make things very hard to understand and use

Car

negi

e M

ello

n U

nive

rsity

8

Mental Models Example Refrigerator

Freezer (temperature too cold)

Fresh food (temperature just right)

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

9

Refrigerator Controls

Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0

A B C D E 7 6 5 4 3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

0

What is a typical conceptual model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 3: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

About this Talk

bull Useful for people interested in ndash How to effectively train people ndash How to effectively design better

user interfaces for privacy and security bull Two case studies from my research

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

4

Human Element of Security

bull People are key part of computer security for every organization ndash Keeping passwords strong and secure ndash Avoiding social engineering ndash Avoiding malware ndash Appropriate use of social networking ndash Keeping mobile devices secure

bull Overlooking human element is most common mistake in computer security

What is Human-Computer Interaction Field that seeks to understand the

ndash Designing useful usable desirable artifacts

ndash Understanding how people use systems ndash Expanding the ways we can use computers

Combines behavioral sciences interaction design and computer science

relationship between people amp computers

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

copy20

12

Car

negi

e M

ello

n U

nive

rsity

6

Interactions Can Be Successful

copy

2012

Car

negi

e M

ello

n U

nive

rsity

7

Interactions Can Also Fail

copy20

12

Design Principles in 5 Minutes

How do people believe how things work

Mental models describe how a person thinks something works Incorrect mental models can make things very hard to understand and use

Car

negi

e M

ello

n U

nive

rsity

8

Mental Models Example Refrigerator

Freezer (temperature too cold)

Fresh food (temperature just right)

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

9

Refrigerator Controls

Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0

A B C D E 7 6 5 4 3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

0

What is a typical conceptual model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 4: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

4

Human Element of Security

bull People are key part of computer security for every organization ndash Keeping passwords strong and secure ndash Avoiding social engineering ndash Avoiding malware ndash Appropriate use of social networking ndash Keeping mobile devices secure

bull Overlooking human element is most common mistake in computer security

What is Human-Computer Interaction Field that seeks to understand the

ndash Designing useful usable desirable artifacts

ndash Understanding how people use systems ndash Expanding the ways we can use computers

Combines behavioral sciences interaction design and computer science

relationship between people amp computers

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

copy20

12

Car

negi

e M

ello

n U

nive

rsity

6

Interactions Can Be Successful

copy

2012

Car

negi

e M

ello

n U

nive

rsity

7

Interactions Can Also Fail

copy20

12

Design Principles in 5 Minutes

How do people believe how things work

Mental models describe how a person thinks something works Incorrect mental models can make things very hard to understand and use

Car

negi

e M

ello

n U

nive

rsity

8

Mental Models Example Refrigerator

Freezer (temperature too cold)

Fresh food (temperature just right)

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

9

Refrigerator Controls

Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0

A B C D E 7 6 5 4 3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

0

What is a typical conceptual model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 5: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

What is Human-Computer Interaction Field that seeks to understand the

ndash Designing useful usable desirable artifacts

ndash Understanding how people use systems ndash Expanding the ways we can use computers

Combines behavioral sciences interaction design and computer science

relationship between people amp computers

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

copy20

12

Car

negi

e M

ello

n U

nive

rsity

6

Interactions Can Be Successful

copy

2012

Car

negi

e M

ello

n U

nive

rsity

7

Interactions Can Also Fail

copy20

12

Design Principles in 5 Minutes

How do people believe how things work

Mental models describe how a person thinks something works Incorrect mental models can make things very hard to understand and use

Car

negi

e M

ello

n U

nive

rsity

8

Mental Models Example Refrigerator

Freezer (temperature too cold)

Fresh food (temperature just right)

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

9

Refrigerator Controls

Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0

A B C D E 7 6 5 4 3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

0

What is a typical conceptual model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 6: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12

Car

negi

e M

ello

n U

nive

rsity

6

Interactions Can Be Successful

copy

2012

Car

negi

e M

ello

n U

nive

rsity

7

Interactions Can Also Fail

copy20

12

Design Principles in 5 Minutes

How do people believe how things work

Mental models describe how a person thinks something works Incorrect mental models can make things very hard to understand and use

Car

negi

e M

ello

n U

nive

rsity

8

Mental Models Example Refrigerator

Freezer (temperature too cold)

Fresh food (temperature just right)

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

9

Refrigerator Controls

Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0

A B C D E 7 6 5 4 3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

0

What is a typical conceptual model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 7: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

7

Interactions Can Also Fail

copy20

12

Design Principles in 5 Minutes

How do people believe how things work

Mental models describe how a person thinks something works Incorrect mental models can make things very hard to understand and use

Car

negi

e M

ello

n U

nive

rsity

8

Mental Models Example Refrigerator

Freezer (temperature too cold)

Fresh food (temperature just right)

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

9

Refrigerator Controls

Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0

A B C D E 7 6 5 4 3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

0

What is a typical conceptual model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 8: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12

Design Principles in 5 Minutes

How do people believe how things work

Mental models describe how a person thinks something works Incorrect mental models can make things very hard to understand and use

Car

negi

e M

ello

n U

nive

rsity

8

Mental Models Example Refrigerator

Freezer (temperature too cold)

Fresh food (temperature just right)

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

9

Refrigerator Controls

Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0

A B C D E 7 6 5 4 3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

0

What is a typical conceptual model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 9: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Mental Models Example Refrigerator

Freezer (temperature too cold)

Fresh food (temperature just right)

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

9

Refrigerator Controls

Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0

A B C D E 7 6 5 4 3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

0

What is a typical conceptual model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 10: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Refrigerator Controls

Normal Settings C and 5 Colder Fresh Food C and 6-7 Coldest Fresh Food B and 8-9 Colder Freezer D and 7-8 Warmer Fresh Food C and 4-1 OFF (both) 0

A B C D E 7 6 5 4 3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

0

What is a typical conceptual model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 11: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

1

7 6 5 4 3

A B C D E

Most people think of independent controls

Cooling Unit

Cooling Unit

A Common Conceptual Model

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 12: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

2

Now can you fix the problem Two general solutions

ndash make controls map to userrsquos mental model ndash foster a more accurate mental model

7 6 5 4 3

A B C D E

Cooling Unit

Actual Conceptual Model Controls amount of cold air

Controls amount air vectored up and down

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 13: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

13

Nissan Maxima Gear Shift

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 14: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

4

Users create a model from what they hear from others past experiences and usage ndash interactions with system image

Three Different Models

Design Model(How you intend thesystem to work)

Design Model (How you intend the system to work)

User Model(How users think the

system works)

User Model (How users think the

system works)

System Image(Your implementation)System Image

(Your implementation)

User Interactions System feedback

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 15: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12

Car

negi

e M

ello

n U

nive

rsity

15

Mental Models

People inevitably build models of how things work ndash Ex children and computers ndash Ex you and your car ndash Ex how hackers work (and why) ndash Ex visibility in social networking sites ndash Ex app stores (all apps vetted by Google) Two options ndash Make the system match peoplersquos models ndash Foster a better mental model

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 16: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Example Phishing Attacks

bull Interviewed 40 people as part of an ldquoemail studyrdquo (Downs et al SOUPS 2006)

bull Only 55 of participants said they had ever noticed an unexpected or strange-looking URL ndash Most did not consider them to be suspicious

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

6

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 17: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Example Phishing Attacks

bull 55 of participants reported being cautious when email asks for sensitive financial info ndash But very few reported being suspicious of

email asking for passwords

bull Knowledge of financial phish reduced likelihood of falling for these scams ndash But did not transfer to other scams such

as an amazoncom password phish

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

7

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 18: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

an We Educate End-Users

Users not motivated to learnSecurity is a secondary taskDifficult to teach without increasing false positives

Basically educating users is as hard as herding cats

C

bull bull bull

bull

people right decisions copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

1

8

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 19: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

19

Yes End-Users Are Trainable

Our research demonstrates users can learn how to protect themselveshellip if you can get them to pay attention to training Problem is that todayrsquos training often boring time consuming and ineffective ndash All day lecture no chance to practice skills ndash Or passively watching videos ndash Or posters and mugs and calendars ndash Raise awareness but little on what

to actually do

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 20: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

20

How Do We Get People Trained

Create ldquoteachable momentsrdquo Micro-games for training (fun) Use learning science principles throughout

Embedded Training Micro-Game on Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 21: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

21

PhishGuru Embedded Training

Send simulated phishing emails If recipient falls for it show intervention that teaches what cues to look for in succinct and engaging format ndash Useful for people who donrsquot know

that they donrsquot know Multiple user studies have demonstrated that PhishGuru is effective Delivering training via direct email not effective

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 22: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

22

bject Revision to Your Amazon com Information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 23: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

3

ject Revision to Your Amazoncom Information

ase login and enter your information

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 24: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

4

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 25: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Learning Science

bull Area of research examining learning retention and transfer of skills

bull Example principles ndash Learning by doing ndash Immediate feedback ndash Conceptual-procedural ndash Reflection ndash hellip many others

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

5

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 26: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Evaluation of PhishGuru

bull Is embedded training effective ndash Wersquove conducted 4 peer-reviewed studies

showing embedded training works well ndash Studies showed significant decrease in

falling for phish and ability to retain what they learned

P Kumaraguru et al Protecting People from Phishing The Design and Evaluation of an Embedded Training Email System CHI 2007

P Kumaraguru et al School of Phish A Real-Word Evaluation of Anti-Phishing Training SOUPS 2009

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

6

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 27: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

27

Results of One Study Tested 500+ people in one month ndash 1 simulated phish at beginning of month

testing done at end of month ~50 reduction in falling for phish ndash 68 out of 85 surveyed said they recommend

continuing doing this sort of training in the future

ndash ldquoI really liked the idea of sending [organization] fake phishing emails and then saying to them essentially HEY You couldve just gotten scammed You should be more careful ndash heres howrdquo

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 28: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Can Browser Interfaces Help

bull Modern web browsers come with blacklists and special interfaces for identifying phish ndash Our evaluation of several blacklists show

they catch ~80 of phish after 24 hours not very good in first few hours

bull Are these browser interfaces effective ndash And what can we learn from them ndash Science of Warnings from human factors

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

8

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 29: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

2

9

Screenshots

Internet Explorer 7 ndash Passive Warning

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 30: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

0

Screenshots

Internet Explorer 7 ndash Active Block

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 31: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

1

Screenshots

Mozilla Firefox ndash Active Block

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 32: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

32

How Effective are these Warnings Tested four conditions ndash FireFox Active Block ndash IE Active Block ndash IE Passive Warning ndash Control (no warnings or blocks) ldquoShopping Studyrdquo ndash Setup phishing pages and added to blacklists ndash Phished users after real purchases (2 phish) ndash Used real email accounts and personal info

S Egelman L Cranor and J Hong Youve Been Warned An Empirical Study of the Effectiveness of Web Browser Phishing

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 33: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

33

How Effective are these Warnings

Almost everyone clicked even those ith t t h i l b k d

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 34: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

34

How Effective are these Warnings

No one in Firefox condition fell for our phish People in Firefox condition not more technically savvy

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 35: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

5

Discussion of Phish Warnings

Nearly everyone will fall for highly targeted and contextualized phish

Passive IE warning failed for many reasons ndash Didnrsquot interrupt the main task ndash Can be slow to appear (up to 5 seconds) ndash Not clear what the right action was ndash Looked too much like other ignorable

warnings (habituation) ndash Bug any keystroke dismissed

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 36: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

6

Screenshots

Internet Explorer ndash Passive Warning

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 37: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Discussion of Phish Warnings

Active IE warnings ndash Most saw the warning but many did not

believe it bull ldquoSince it gave me the option of still proceeding to the website I figured it couldnrsquot be that badrdquo

ndash Some element of habituation (looks like other warnings)

ndash Saw two pathological cases

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

7

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 38: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

8

Screenshots

Internet Explorer ndash Active Block

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 39: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

MSIE8 Re-design Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

3

9

MSIE8 Redesign Based on our Work

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 40: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

0

ndashndashndashndashndash

A Science of Warnings

-HIP model or real-world warnings

See the warning

Understand it

Believe it

Motivated

Can and will act

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 41: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12

Car

negi

e M

ello

n U

nive

rsity

41

Designing for Path of Least Resistance Where possible make the default behavior safe ndash Ex The two pathological cases ndash Assume people wonrsquot see read

believe or be motivated Active warnings over passive warnings ndash Interrupt people if warning is important ndash Need to balance this with habituation Make important warnings look very different

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 42: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Summary

bull Human element most overlooked aspect of computer security ndash Ex phishing scams passwords mobile

bull Mental models important to design ndash Mismatched models can cause failures

bull Security training can work if done right ndash Learning sciences

bull C-HIP model for security warnings ndash Do people see understand believe

and can act on warnings copy

2012

Car

negi

e M

ello

n U

nive

rsity

42

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 43: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

More of Our Research

bull Our team does research on ndash Better password policies ndash Alternatives to passwords ndash Mobile apps privacy and security

ndash Location-based services and privacy ndash Social networking and privacy ndash Configuring firewalls

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

3

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 44: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

44

More of Our Research

bull httpcupscscmuedu bull httpmcomcscmuedu bull httpcmuchimpsorg

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 45: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

5

Thanks where can I learn more

Find more at wombatsecuritycom

jasonhcscmuedu

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 46: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

46

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 47: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Micro-Games for Cyber Security bull Training doesnrsquot have to be long amp boring

bull Micro game format play for short time bull Two-thirds of Americans played

a video game in past six months bull Not just young people

ndash Average game player 35 years old ndash 25 of people over 50 play games

bull Not just males ndash 40 of casual gamers are women

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

7

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 48: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

bull Tested Anti-Phishing Phil with ~4500 people ndash Huge improvement by novices in identifying

phishing URLs ndash Also dramatically lowered false positives

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

8

Case Study Anti-Phishing Phil

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 49: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

4

9

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 50: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

0

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 51: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

1

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 52: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

2

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 53: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

3

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 54: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

4

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 55: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

55

se negatives for users who played Anti‐Phishing Phil (ldquogame conditionrdquo) False negatives are uations where people incorrectly label a phishing site as legitimate Novices saw the greatest duction in false negatives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 56: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

6

e positives for users who played the Anti‐Phishing Phil game False positives are situations ere people incorrectly label a legitimate site as phishing Again novices saw the greatest rovement in reducing false positives and retained what they had learned

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 57: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

5

7

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 58: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

58

Example Topic Email Security

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 59: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

59

Example Topic Passwords

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 60: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

60

Other Training Social Networks

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 61: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

61

Measurable

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 62: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

62

Measurable

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 63: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

Case Study 1 PhishGuru

Canadian healthcare organization Three-month embedded training campaign ndash 190 employees ndash Security assessment and effective training in

context

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

3

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 64: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12

Car

negi

e M

ello

n U

nive

rsity

64

Simulated Phishing Email

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 65: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12

Car

negi

e M

ello

n U

nive

rsity

65

Case Study

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 66: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy20

12 C

arne

gie

Mel

lon

Uni

vers

ity

6

6

Measurable Reduction in Falling for Phish

Viewed Email Only

Viewed Email and Clicked Link Employees

paign 1 20 1053 35 1842 190

paign 2 37 1947 23 1211 190

paign 3 7 370 10 529 189

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 67: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

copy

2012

Car

negi

e M

ello

n U

nive

rsity

67

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68

Page 68: Leveraging Human Factors for Effective Security Training€¦ · • Modern web browsers come with blacklists and special interfaces for identifying phish – Our evaluation of several

motivated to learn

positivesis a complete wa

jelly to a wallhellip They are a

Can We Educate End-Users

bull Users not bull Security is a secondary task bull Difficult to teach people right decisions

without increasing false ldquoUser education ste of time It is about as much use as nailing not interestedhellipthey just w nt to do their jobrdquo

-- An IBM security specialist copy

2012

Car

negi

e M

ello

n U

nive

rsity

68