1 / 10

Cybersecurity and People: Challenges in Predicting User Actions

Cybersecurity and People: Challenges in Predicting User Actions. Joachim Meyer Dept. of Industrial Engineering Fleischman School of Engineering Tel Aviv University. Humans.

Télécharger la présentation

Cybersecurity and People: Challenges in Predicting User Actions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybersecurity and People: Challenges in Predicting User Actions Joachim Meyer Dept. of Industrial Engineering Fleischman School of Engineering Tel Aviv University

  2. Humans “Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations. (They are also large, expensive to maintain, difficult to manage, and they pollute the environment. It is astonishing that these devices continue to be manufactured and deployed. But they are sufficiently pervasive that we must design our protocols around their limitations.)” −− C. Kaufman, R. Perlman, and M. Speciner. Network Security: PRIVATE Communication in a PUBLIC World.2nd edition. Prentice Hall, page 237, 2002.

  3. Some topics we study … • Risk taking in system use • There are several interrelated behaviors • Adjusting of system settings • People aren’t good at it • Responses to alerts and advice • Alerts are often ignored • Authentication

  4. System Dynamics Cost Benefit Analyses Reinforcement Learning ??? Control Theory Etc.

  5. The Challenge of Access Control Bank = b3aYZ Amazon = aa66x! Phonebill = p$2$ta1

  6. What affects authentication behavior? • Authentication method • (password, graphic, biometric) • Authentication complexity • (e.g., password length, required accuracy of movements) • Authentication frequency • Importance of protection • (likelihood and severity of threats) • Situation • (stress, time pressure, etc.)

  7. The big problem – matters are messy.Intentions, feedback, learning, communication

More Related