SlideShare ist ein Scribd-Unternehmen logo
1 von 39
@darrenkall
Darren Kall   #secUX
Employment
 KALL Consulting
 Microsoft
  ◦ Windows Security User Experience team: founder
  ◦ Windows Security Assurance team: founder
  ◦ Windows Core Security: group program manager
  ◦ Microsoft Passport: group program manager
  ◦ Microsoft Passport User Experience team: manager
  ◦ MSN-client: security and privacy team founder
 AT&T Bell Laboratories, IBM, H.E.L.P., LexisNexis
Patents
 11 US patents, 6 international patents,104 patent citations
Education
 Dartmouth College, Rutgers College
User Experience
(UX)


       Insight              Innovation           Impact
       Research             Design               Evaluation


                   Product UX
                   Design & Improve Product UX


          Sec UX                         M&A UX
          Security                       Merger & Acquisition
          User Experience                User Experience

          PI UX                          Strategic UX
          Product Integration            Strategic UX
          User Experience                Management
   Problem: If a security system wasn’t designed to be
    usable by each person who touches it, then the
    people create vulnerabilities

   Solution: An end-to-end UX approach that merges
    technology possibilities, business imperatives, and a
    deep knowledge of users to improve security

   Next Steps: Practical steps to a UX approach
Limited
                      “Imperfect”                               Memory
                       cognitive                                                        Lazy
                        models
        Don’t
      respond
       quickly                                                      Limited number
      enough                                                           crunching


                                                  Don’t
Emotional                                       understand
responses                                        security
                                                                   Limited ability
                                                                     to visualize
                            Fear
Limited decision          negative
  making skill           outcomes

                                                         Too                          Not
                                                         busy                         tech
                   Limits to                                                         savvy
                   vigilance
                                                                  Cognitive
                                                                   biases
                                      Easily
                                     deceived
“The system would be
secure if we just got rid
of the people.”
      Every IT person who ever worked on security
 That   is not an option

 It
   is a lot easier to
 change the system than
 to change people
 If
   a system is not
 designed to be usable by
 the people who have to
 use it, the people are not
 to blame

 The   system is
   Dialog boxes and vigilance
       If an end-user sees a security dialog 100
        times, they agree without reading the 101st time
   Passwords and memory
       If a person has to have a 15 character password
        that must change every 30 days and must contain
        special characters, they write the password on a
        Post-it note
   Trojans and decision making
       If a user opens an Excel spreadsheet without
        questioning the source, they invite hidden
        exploits
 It
   is not just end-users
 but every human in the
 end-to-end system
   End-users              Installers
   Product Managers       Administrators
   Business Analysts      Hackers
   System Designers       Trainers
   Program Managers
                           Maintenance
   Project Managers
   Developers             Monitoring
   Testers                Forensics
   Marketing              Deprecation
   Sales                  etc.
   Developer
       If a developer does not have insight into the
        security skills of the user, they assume the user is
        like them
   Installer
       If it is too hard for an installer to figure out how
        to configure security, it goes in with a risky
        default
   Sales
       If a sales person can’t model a customer’s
        security needs sufficiently, they sell them the
        wrong system
 Am   I exaggerating?
 Comodo   Cert Auth
◦ Problem: tricked into issuing
  fraudulent certs
◦ UX: people are easily deceived
◦ Result: employees were socially
  engineered
   DigiNotar
    ◦ Problem: hacker access to cert issuing
    ◦ UX: people can’t perceive patterns
      over broad data
    ◦ Result: breach not in admin awareness
    ◦ UX: people susceptible to impact bias;
      a cognitive bias of estimation
    ◦ Result: did not prepare a user scenario
      for cert revocation
   Sony
    ◦ Problem: data breach 77 Million ID
      thefts
    ◦ UX: people susceptible to confirmation
      bias
    ◦ Result: did not perceive risk and made
      poor security choices, insufficient
      maintenance of patches
    ◦ UX: overconfidence in decision making
    ◦ Result: provoked the hacker
      community
 RSA
 ◦ Problem: token information hacked
 ◦ UX: limited ability to predict
   consequences
 ◦ Result: people post info in social
   media
 ◦ UX: people are easily deceived
 ◦ Result: fooled by phishing attack
   with Adobe-Excel exploit
   H.323 Protocol
    ◦ Problem: ~150,000 corporate video
      systems set to auto-answer allowing
      spying
    ◦ UX: status quo bias
    ◦ Result: system default configuration
      implications overlooked
    ◦ UX: risk assessment skills
    ◦ Result: not deployed within secure
      corporate networks
 Improveend-to-end
system security by
taking a UX approach to
design and
development
Insight            Innovation           Impact
Research           Design               Evaluation

Customer Insight   Design               Usability testing
User Research      User-friendly        A/B testing
Ideation           Interaction design   Customer validation
Workflow           Information Arch     Beta testing
Task flow          Transformation       Analytics
Activity Cycles    Specification        Evaluation
Pain points        Design guidelines    Measurements
Touch points       Look and Feel        Iterations
Journey map        Development          Etc.
Etc.               Etc.
   Insight Research: Detailed attention to the
    needs, limitations, and behaviors of people in a
    system to gain insights

   Innovation Design: Apply this insight to
    intentional design in all stages of
    development, implementation, and use for
    specific user types

   Impact Evaluation: A multi-stage approach
    requiring analysis, design, and evaluation
    iterations to ensure successful improvement
   Deeply studying the people in the system
   Gathering insight into their
    skills, motivations, limitations, behaviors, etc.
   Using that information to drive innovative
    designs for security problems
   Keep all users in mind when designing
    systems
   Use the deep insights about users to match
    design to their limitations and behaviors
   Designing to address user pain points and
    limitations
   Test with people in the real world not
    theoretical ideal world conditions
   Iterate improvement, evaluate, insight, design
    cycles
    ◦ UX is an ongoing, incremental approach that
      depends on data
   Problem: A security IT tool was not being
    adopted
   UX Action: Ethnographic research and contextual
    inquiry on the variety of IT people using this
    security system to determine root cause
   Result: Identified 4-5 distinct IT persona types
    for each of four company IT segments:
    enterprise, large, medium, and small groups
   Separated roles from
    titles, skills, motivations, and activity/behaviors
   Solution: One-size fits all was not working for
    any group, segmented core product into
    company/role specific products
   Problem: Significant implementation and
    customization errors on install and
    administration
   UX Action: Usability study of system with
    representative users. Included a UX
    assessment of technical writing.
   Result: Root cause was both product interface
    and the training/documentation
   Solution: Improved interaction and improved
    documentation and training to reduce errors
   Problem: System configuration taking too
    long and requiring repeated revisions
   UX Action: UX evaluation of configuration
    process
   Result: Total over 3,000 configuration
    options, 6 that system developers could not
    tell apart, detachment between desired
    outcome and configurations
   Solution: Reduced configuration complexity,
    options based on real use, aligned outcomes
    with options, created profiles, offered service
   Problem: Client with ~900,000 users globally;
    vendors, employees, on variety of devices, no
    easy way to see network security status
   UX Action: Reviewed current system, modeled
    pattern of monitoring workflow, prioritized
    events into semantic map for this audience
   Result: Needed situational awareness drill down
    from simple to detailed, not event alerts
   Solution: Created visualizations for quick overall
    system status with 4 layers of drill down to
    improve awareness
   Problem: Users relying on password customer
    support on failed logins
    ◦ Wanted to minimize user frustration
    ◦ Wanted to separate real users from non-users
    ◦ Wanted to minimize customer support costs
   UX Action: Researched a variety of real user
    behaviors to determine optimum design to
    meet goals
PSWD           PSWD            PSWD           PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt        attempt         attempt        attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average Success Trial of Forgetters with no Lock Out, No CS, and no Self Help


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average Abandon Trial of Forgetters with no Lock Out, No CS, and no Self Help


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average Call if have CS Link


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average Self Help if have Self Help Link


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average CS Call if have CS Link and Self Help Link


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Average Self Help if have Self Help Link and Lock Out @ 3


  PSWD            PSWD            PSWD          PSWD            PSWD             PSWD      PSWD      PSWD      PSWD      PSWD      PSWD      PSWD
 attempt         attempt         attempt       attempt         attempt          attempt   attempt   attempt   attempt   attempt   attempt   attempt


Purple add Self Help Link, Blue add CS link, Yellow you know you’ve got a hacker
   Problem: Client with some divisions having
    repeated auth setup issues while others didn’t
   UX Action: Compared SOP, reports of use, with
    actual use patterns
   Result: Some divisions had activity cycles of use
    and complete non-use based on business cycle.
    Start of each cycle users forgot and created
    issues
   Solution: Redesign system for infrequent use to
    make more intuitive, require users to have
    refresher when return
   UX approach is not a substitute for good
    security technology engineering, it is an
    addition
   You have to do both
   Keep advancing security technologies
   Add a UX approach to your security
    improvement plans

   If you have a specific UX-based security
    problem
    ◦ Develop a tailored UX initiative


   If you DO NOT have a specific UX-based
    security problem
    ◦ Introduce a UX approach in steps
   Start your UX approach today
    1. Implement: Start with the UX basics
    2. Design: Adopt and tailor known UX solutions to fit
       your situation
    3. Evaluation: Specifically evaluate your UX problems,
       your users, your environment of use, etc. and
       implement specific solutions
    4. Research: Invest in long-term research into the
       people in your system to drive deep UX
       understanding
 If
   we all take a UX
 approach to security
 system design and
 improvement, their
 real-world security
 value will increase
   Darren Kall
   darrenkall@kallconsulting.com
   http://www.linkedin.com/in/darrenkall
   @darrenkall
   +1 (937) 648-4966

SecUX: We’re glad to help your company
have more usable security.

Weitere ähnliche Inhalte

Was ist angesagt?

Interaction Design - Lecture 2 - Next Generation User Interfaces (4018166FNR)
Interaction Design - Lecture 2 - Next Generation User Interfaces (4018166FNR)Interaction Design - Lecture 2 - Next Generation User Interfaces (4018166FNR)
Interaction Design - Lecture 2 - Next Generation User Interfaces (4018166FNR)Beat Signer
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceHitoshi Kokumai
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
 
The difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityThe difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityAnup Narayanan
 
louise and lauren paper presentations development of guide assistive technology
louise and lauren paper presentations development of guide assistive technologylouise and lauren paper presentations development of guide assistive technology
louise and lauren paper presentations development of guide assistive technologyCOT SSNP
 
Raise of deep learning
Raise of deep learningRaise of deep learning
Raise of deep learningBill GU
 
Artificial intelligence priti sajja spuniversity
Artificial intelligence priti sajja spuniversityArtificial intelligence priti sajja spuniversity
Artificial intelligence priti sajja spuniversityPriti Srinivas Sajja
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer InteractionBHAKTI PATIL
 
Mind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceMind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceStewart Kowalski
 
Van der kamp.2011.gaze and voice controlled drawing
Van der kamp.2011.gaze and voice controlled drawingVan der kamp.2011.gaze and voice controlled drawing
Van der kamp.2011.gaze and voice controlled drawingmrgazer
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware ComputingMOHIT DADU
 
Context Awareness in Mobile Computing
Context Awareness in Mobile ComputingContext Awareness in Mobile Computing
Context Awareness in Mobile ComputingBob Hardian
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518IJRAT
 

Was ist angesagt? (19)

590 599
590 599590 599
590 599
 
Interaction Design - Lecture 2 - Next Generation User Interfaces (4018166FNR)
Interaction Design - Lecture 2 - Next Generation User Interfaces (4018166FNR)Interaction Design - Lecture 2 - Next Generation User Interfaces (4018166FNR)
Interaction Design - Lecture 2 - Next Generation User Interfaces (4018166FNR)
 
1709 1715
1709 17151709 1715
1709 1715
 
Expanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity AssuranceExpanded password system - Reliable Identity Assurance
Expanded password system - Reliable Identity Assurance
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
The difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityThe difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of Security
 
louise and lauren paper presentations development of guide assistive technology
louise and lauren paper presentations development of guide assistive technologylouise and lauren paper presentations development of guide assistive technology
louise and lauren paper presentations development of guide assistive technology
 
Raise of deep learning
Raise of deep learningRaise of deep learning
Raise of deep learning
 
Cases
CasesCases
Cases
 
Varch use06
Varch use06Varch use06
Varch use06
 
Artificial intelligence priti sajja spuniversity
Artificial intelligence priti sajja spuniversityArtificial intelligence priti sajja spuniversity
Artificial intelligence priti sajja spuniversity
 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860
 
Human Computer Interaction
Human Computer InteractionHuman Computer Interaction
Human Computer Interaction
 
Intelligent web applications
Intelligent web applicationsIntelligent web applications
Intelligent web applications
 
Mind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber SpaceMind the gap : Is Norway Security Enough in Cyber Space
Mind the gap : Is Norway Security Enough in Cyber Space
 
Van der kamp.2011.gaze and voice controlled drawing
Van der kamp.2011.gaze and voice controlled drawingVan der kamp.2011.gaze and voice controlled drawing
Van der kamp.2011.gaze and voice controlled drawing
 
Context Aware Computing
Context Aware ComputingContext Aware Computing
Context Aware Computing
 
Context Awareness in Mobile Computing
Context Awareness in Mobile ComputingContext Awareness in Mobile Computing
Context Awareness in Mobile Computing
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 

Ähnlich wie Usable security- It isn't secure if people can't use it. O-ISC conference 14mar2012

ai-ruba.pptx presentation artificial intelligence
ai-ruba.pptx presentation artificial intelligenceai-ruba.pptx presentation artificial intelligence
ai-ruba.pptx presentation artificial intelligenceChellamuthuHaripriya
 
LxD - Learner Experience Design
LxD - Learner Experience DesignLxD - Learner Experience Design
LxD - Learner Experience DesignJulie Dirksen
 
Humane assessment on cards
Humane assessment on cardsHumane assessment on cards
Humane assessment on cardsTudor Girba
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
UX Workshop: How to design a product with great user experience
UX Workshop: How to design a product with great user experienceUX Workshop: How to design a product with great user experience
UX Workshop: How to design a product with great user experienceRaj Lal
 
Usability Presentation - IIS Brownbag 2013
Usability Presentation - IIS Brownbag 2013Usability Presentation - IIS Brownbag 2013
Usability Presentation - IIS Brownbag 2013Patrick Hays
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeDenim Group
 
Data security in practice
Data security in practiceData security in practice
Data security in practiceAndres Kütt
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work togetherWendy Knox Everette
 
The Essentials of Great Search Design (ECIR 2010)
The Essentials of Great Search Design (ECIR 2010)The Essentials of Great Search Design (ECIR 2010)
The Essentials of Great Search Design (ECIR 2010)Vegard Sandvold
 
Hardware is hard(er)
Hardware is hard(er)Hardware is hard(er)
Hardware is hard(er)Thoughtworks
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Processphanleson
 
MCC Technology Class (April 2012)
MCC Technology Class (April 2012) MCC Technology Class (April 2012)
MCC Technology Class (April 2012) Michael Rawlins
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Decision support n system management
Decision support n system managementDecision support n system management
Decision support n system managementkrishna_v111
 
Decision support n system management
Decision support n system managementDecision support n system management
Decision support n system managementkrishna_v111
 
Chapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support SystemChapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support Systemmanagement 2
 
User Experience Design - Designing for others
User Experience Design - Designing for othersUser Experience Design - Designing for others
User Experience Design - Designing for othersBART RADKA
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"Aaron Rinehart
 
Lecture4 requirement engineering
Lecture4 requirement engineeringLecture4 requirement engineering
Lecture4 requirement engineeringShahid Riaz
 

Ähnlich wie Usable security- It isn't secure if people can't use it. O-ISC conference 14mar2012 (20)

ai-ruba.pptx presentation artificial intelligence
ai-ruba.pptx presentation artificial intelligenceai-ruba.pptx presentation artificial intelligence
ai-ruba.pptx presentation artificial intelligence
 
LxD - Learner Experience Design
LxD - Learner Experience DesignLxD - Learner Experience Design
LxD - Learner Experience Design
 
Humane assessment on cards
Humane assessment on cardsHumane assessment on cards
Humane assessment on cards
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
UX Workshop: How to design a product with great user experience
UX Workshop: How to design a product with great user experienceUX Workshop: How to design a product with great user experience
UX Workshop: How to design a product with great user experience
 
Usability Presentation - IIS Brownbag 2013
Usability Presentation - IIS Brownbag 2013Usability Presentation - IIS Brownbag 2013
Usability Presentation - IIS Brownbag 2013
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security Knowledge
 
Data security in practice
Data security in practiceData security in practice
Data security in practice
 
Security engineering 101 when good design & security work together
Security engineering 101  when good design & security work togetherSecurity engineering 101  when good design & security work together
Security engineering 101 when good design & security work together
 
The Essentials of Great Search Design (ECIR 2010)
The Essentials of Great Search Design (ECIR 2010)The Essentials of Great Search Design (ECIR 2010)
The Essentials of Great Search Design (ECIR 2010)
 
Hardware is hard(er)
Hardware is hard(er)Hardware is hard(er)
Hardware is hard(er)
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
 
MCC Technology Class (April 2012)
MCC Technology Class (April 2012) MCC Technology Class (April 2012)
MCC Technology Class (April 2012)
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Decision support n system management
Decision support n system managementDecision support n system management
Decision support n system management
 
Decision support n system management
Decision support n system managementDecision support n system management
Decision support n system management
 
Chapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support SystemChapter 8 Mis Decision Support System
Chapter 8 Mis Decision Support System
 
User Experience Design - Designing for others
User Experience Design - Designing for othersUser Experience Design - Designing for others
User Experience Design - Designing for others
 
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
VMWare Tech Talk: "The Road from Rugged DevOps to Security Chaos Engineering"
 
Lecture4 requirement engineering
Lecture4 requirement engineeringLecture4 requirement engineering
Lecture4 requirement engineering
 

Mehr von Darren Kall

Harvesting user insights revolve conf v09
Harvesting user insights revolve conf v09Harvesting user insights revolve conf v09
Harvesting user insights revolve conf v09Darren Kall
 
Workshop: Gathering User Insight
Workshop: Gathering User InsightWorkshop: Gathering User Insight
Workshop: Gathering User InsightDarren Kall
 
You learn more from talking with angry customers
You learn more from talking with angry customersYou learn more from talking with angry customers
You learn more from talking with angry customersDarren Kall
 
Flowcharting: The UX Socket Wrench
Flowcharting: The UX Socket WrenchFlowcharting: The UX Socket Wrench
Flowcharting: The UX Socket WrenchDarren Kall
 
Unbiased customer interviews v022 for slideshare kall consulting
Unbiased customer interviews v022 for slideshare   kall consultingUnbiased customer interviews v022 for slideshare   kall consulting
Unbiased customer interviews v022 for slideshare kall consultingDarren Kall
 
"This Product Sucks!" Better Experiences, Better Business, Better World
"This Product Sucks!" Better Experiences, Better Business, Better World"This Product Sucks!" Better Experiences, Better Business, Better World
"This Product Sucks!" Better Experiences, Better Business, Better WorldDarren Kall
 
"This Product Sucks!" Better Experiences, Better Business, Better World
"This Product Sucks!" Better Experiences, Better Business, Better World"This Product Sucks!" Better Experiences, Better Business, Better World
"This Product Sucks!" Better Experiences, Better Business, Better WorldDarren Kall
 
This Product Sucks: The Business Impacts of User Experience Breakdowns
This Product Sucks: The Business Impacts of User Experience BreakdownsThis Product Sucks: The Business Impacts of User Experience Breakdowns
This Product Sucks: The Business Impacts of User Experience BreakdownsDarren Kall
 
You Learn More from Talking with Angry Customers: Transforming Customer Anger...
You Learn More from Talking with Angry Customers: Transforming Customer Anger...You Learn More from Talking with Angry Customers: Transforming Customer Anger...
You Learn More from Talking with Angry Customers: Transforming Customer Anger...Darren Kall
 
This Product Sucks! for Midwest UX Conference
This Product Sucks! for Midwest UX ConferenceThis Product Sucks! for Midwest UX Conference
This Product Sucks! for Midwest UX ConferenceDarren Kall
 

Mehr von Darren Kall (10)

Harvesting user insights revolve conf v09
Harvesting user insights revolve conf v09Harvesting user insights revolve conf v09
Harvesting user insights revolve conf v09
 
Workshop: Gathering User Insight
Workshop: Gathering User InsightWorkshop: Gathering User Insight
Workshop: Gathering User Insight
 
You learn more from talking with angry customers
You learn more from talking with angry customersYou learn more from talking with angry customers
You learn more from talking with angry customers
 
Flowcharting: The UX Socket Wrench
Flowcharting: The UX Socket WrenchFlowcharting: The UX Socket Wrench
Flowcharting: The UX Socket Wrench
 
Unbiased customer interviews v022 for slideshare kall consulting
Unbiased customer interviews v022 for slideshare   kall consultingUnbiased customer interviews v022 for slideshare   kall consulting
Unbiased customer interviews v022 for slideshare kall consulting
 
"This Product Sucks!" Better Experiences, Better Business, Better World
"This Product Sucks!" Better Experiences, Better Business, Better World"This Product Sucks!" Better Experiences, Better Business, Better World
"This Product Sucks!" Better Experiences, Better Business, Better World
 
"This Product Sucks!" Better Experiences, Better Business, Better World
"This Product Sucks!" Better Experiences, Better Business, Better World"This Product Sucks!" Better Experiences, Better Business, Better World
"This Product Sucks!" Better Experiences, Better Business, Better World
 
This Product Sucks: The Business Impacts of User Experience Breakdowns
This Product Sucks: The Business Impacts of User Experience BreakdownsThis Product Sucks: The Business Impacts of User Experience Breakdowns
This Product Sucks: The Business Impacts of User Experience Breakdowns
 
You Learn More from Talking with Angry Customers: Transforming Customer Anger...
You Learn More from Talking with Angry Customers: Transforming Customer Anger...You Learn More from Talking with Angry Customers: Transforming Customer Anger...
You Learn More from Talking with Angry Customers: Transforming Customer Anger...
 
This Product Sucks! for Midwest UX Conference
This Product Sucks! for Midwest UX ConferenceThis Product Sucks! for Midwest UX Conference
This Product Sucks! for Midwest UX Conference
 

Kürzlich hochgeladen

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Usable security- It isn't secure if people can't use it. O-ISC conference 14mar2012

  • 2. Employment  KALL Consulting  Microsoft ◦ Windows Security User Experience team: founder ◦ Windows Security Assurance team: founder ◦ Windows Core Security: group program manager ◦ Microsoft Passport: group program manager ◦ Microsoft Passport User Experience team: manager ◦ MSN-client: security and privacy team founder  AT&T Bell Laboratories, IBM, H.E.L.P., LexisNexis Patents  11 US patents, 6 international patents,104 patent citations Education  Dartmouth College, Rutgers College
  • 3. User Experience (UX) Insight Innovation Impact Research Design Evaluation Product UX Design & Improve Product UX Sec UX M&A UX Security Merger & Acquisition User Experience User Experience PI UX Strategic UX Product Integration Strategic UX User Experience Management
  • 4. Problem: If a security system wasn’t designed to be usable by each person who touches it, then the people create vulnerabilities  Solution: An end-to-end UX approach that merges technology possibilities, business imperatives, and a deep knowledge of users to improve security  Next Steps: Practical steps to a UX approach
  • 5.
  • 6. Limited “Imperfect” Memory cognitive Lazy models Don’t respond quickly Limited number enough crunching Don’t Emotional understand responses security Limited ability to visualize Fear Limited decision negative making skill outcomes Too Not busy tech Limits to savvy vigilance Cognitive biases Easily deceived
  • 7. “The system would be secure if we just got rid of the people.” Every IT person who ever worked on security
  • 8.  That is not an option  It is a lot easier to change the system than to change people
  • 9.  If a system is not designed to be usable by the people who have to use it, the people are not to blame  The system is
  • 10. Dialog boxes and vigilance  If an end-user sees a security dialog 100 times, they agree without reading the 101st time  Passwords and memory  If a person has to have a 15 character password that must change every 30 days and must contain special characters, they write the password on a Post-it note  Trojans and decision making  If a user opens an Excel spreadsheet without questioning the source, they invite hidden exploits
  • 11.  It is not just end-users but every human in the end-to-end system
  • 12. End-users  Installers  Product Managers  Administrators  Business Analysts  Hackers  System Designers  Trainers  Program Managers  Maintenance  Project Managers  Developers  Monitoring  Testers  Forensics  Marketing  Deprecation  Sales  etc.
  • 13. Developer  If a developer does not have insight into the security skills of the user, they assume the user is like them  Installer  If it is too hard for an installer to figure out how to configure security, it goes in with a risky default  Sales  If a sales person can’t model a customer’s security needs sufficiently, they sell them the wrong system
  • 14.  Am I exaggerating?
  • 15.  Comodo Cert Auth ◦ Problem: tricked into issuing fraudulent certs ◦ UX: people are easily deceived ◦ Result: employees were socially engineered
  • 16. DigiNotar ◦ Problem: hacker access to cert issuing ◦ UX: people can’t perceive patterns over broad data ◦ Result: breach not in admin awareness ◦ UX: people susceptible to impact bias; a cognitive bias of estimation ◦ Result: did not prepare a user scenario for cert revocation
  • 17. Sony ◦ Problem: data breach 77 Million ID thefts ◦ UX: people susceptible to confirmation bias ◦ Result: did not perceive risk and made poor security choices, insufficient maintenance of patches ◦ UX: overconfidence in decision making ◦ Result: provoked the hacker community
  • 18.  RSA ◦ Problem: token information hacked ◦ UX: limited ability to predict consequences ◦ Result: people post info in social media ◦ UX: people are easily deceived ◦ Result: fooled by phishing attack with Adobe-Excel exploit
  • 19. H.323 Protocol ◦ Problem: ~150,000 corporate video systems set to auto-answer allowing spying ◦ UX: status quo bias ◦ Result: system default configuration implications overlooked ◦ UX: risk assessment skills ◦ Result: not deployed within secure corporate networks
  • 20.
  • 21.  Improveend-to-end system security by taking a UX approach to design and development
  • 22. Insight Innovation Impact Research Design Evaluation Customer Insight Design Usability testing User Research User-friendly A/B testing Ideation Interaction design Customer validation Workflow Information Arch Beta testing Task flow Transformation Analytics Activity Cycles Specification Evaluation Pain points Design guidelines Measurements Touch points Look and Feel Iterations Journey map Development Etc. Etc. Etc.
  • 23. Insight Research: Detailed attention to the needs, limitations, and behaviors of people in a system to gain insights  Innovation Design: Apply this insight to intentional design in all stages of development, implementation, and use for specific user types  Impact Evaluation: A multi-stage approach requiring analysis, design, and evaluation iterations to ensure successful improvement
  • 24. Deeply studying the people in the system  Gathering insight into their skills, motivations, limitations, behaviors, etc.  Using that information to drive innovative designs for security problems
  • 25. Keep all users in mind when designing systems  Use the deep insights about users to match design to their limitations and behaviors  Designing to address user pain points and limitations
  • 26. Test with people in the real world not theoretical ideal world conditions  Iterate improvement, evaluate, insight, design cycles ◦ UX is an ongoing, incremental approach that depends on data
  • 27. Problem: A security IT tool was not being adopted  UX Action: Ethnographic research and contextual inquiry on the variety of IT people using this security system to determine root cause  Result: Identified 4-5 distinct IT persona types for each of four company IT segments: enterprise, large, medium, and small groups  Separated roles from titles, skills, motivations, and activity/behaviors  Solution: One-size fits all was not working for any group, segmented core product into company/role specific products
  • 28. Problem: Significant implementation and customization errors on install and administration  UX Action: Usability study of system with representative users. Included a UX assessment of technical writing.  Result: Root cause was both product interface and the training/documentation  Solution: Improved interaction and improved documentation and training to reduce errors
  • 29. Problem: System configuration taking too long and requiring repeated revisions  UX Action: UX evaluation of configuration process  Result: Total over 3,000 configuration options, 6 that system developers could not tell apart, detachment between desired outcome and configurations  Solution: Reduced configuration complexity, options based on real use, aligned outcomes with options, created profiles, offered service
  • 30. Problem: Client with ~900,000 users globally; vendors, employees, on variety of devices, no easy way to see network security status  UX Action: Reviewed current system, modeled pattern of monitoring workflow, prioritized events into semantic map for this audience  Result: Needed situational awareness drill down from simple to detailed, not event alerts  Solution: Created visualizations for quick overall system status with 4 layers of drill down to improve awareness
  • 31. Problem: Users relying on password customer support on failed logins ◦ Wanted to minimize user frustration ◦ Wanted to separate real users from non-users ◦ Wanted to minimize customer support costs  UX Action: Researched a variety of real user behaviors to determine optimum design to meet goals
  • 32. PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average Success Trial of Forgetters with no Lock Out, No CS, and no Self Help PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average Abandon Trial of Forgetters with no Lock Out, No CS, and no Self Help PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average Call if have CS Link PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average Self Help if have Self Help Link PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average CS Call if have CS Link and Self Help Link PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Average Self Help if have Self Help Link and Lock Out @ 3 PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD PSWD attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt attempt Purple add Self Help Link, Blue add CS link, Yellow you know you’ve got a hacker
  • 33. Problem: Client with some divisions having repeated auth setup issues while others didn’t  UX Action: Compared SOP, reports of use, with actual use patterns  Result: Some divisions had activity cycles of use and complete non-use based on business cycle. Start of each cycle users forgot and created issues  Solution: Redesign system for infrequent use to make more intuitive, require users to have refresher when return
  • 34. UX approach is not a substitute for good security technology engineering, it is an addition  You have to do both  Keep advancing security technologies
  • 35.
  • 36. Add a UX approach to your security improvement plans  If you have a specific UX-based security problem ◦ Develop a tailored UX initiative  If you DO NOT have a specific UX-based security problem ◦ Introduce a UX approach in steps
  • 37. Start your UX approach today 1. Implement: Start with the UX basics 2. Design: Adopt and tailor known UX solutions to fit your situation 3. Evaluation: Specifically evaluate your UX problems, your users, your environment of use, etc. and implement specific solutions 4. Research: Invest in long-term research into the people in your system to drive deep UX understanding
  • 38.  If we all take a UX approach to security system design and improvement, their real-world security value will increase
  • 39. Darren Kall  darrenkall@kallconsulting.com  http://www.linkedin.com/in/darrenkall  @darrenkall  +1 (937) 648-4966 SecUX: We’re glad to help your company have more usable security.