Chapter 3

Lectures

Clicking the print icon in the upper right will concatinate all the Lecture pages onto one page.

Lecture pages are designed around self study. They include required readings, points you should understand from the lecture, and one or more questions you can think about. Some lectures contain lecture note text. They also include links to additional materials if you find the topic intersting. As well as links to news articles and other materials referred to in the lecture.

Dec 4, 2024

Subsections of Lectures

Chapter 1

Introduction

Slides

Learning Outcomes

Understand

  • Course outline
  • What is Usable Security and Privacy (USEC)
  • How does USEC differ from Security/Privacy and Human Computer Interaction
  • CIAAA - definition of security
  • Definition of privacy

Apply

Lecture Notes: Usable Security and Privacy

Usable Security and Privacy is a field that looks at how people currently use security and privacy technologies as well as how to make those technologies more usable. USEC touches on many topic areas including: Human-Computer Interaction, Cybersecurity, Privacy, Law, Public Policy, Psychology, and Social Science.

Security and privacy tools that cannot be used are, well, useless. In fact they can be worse than useless because people will work very hard to circumvent the “annoying” technology potentially putting themselves in more danger.

XKCD Comic of two people trying to rent a car.

XKCD:Rental Car

Referenced in Lecture

Additional Resources

Dec 4, 2024
Chapter 2

Security/Advertising

Lecture looking at how we assess approaches like tools, policies, practices, and regulations from the perspective of security.

Slides

Required Reading

Learning Outcomes

Topics

  • CIAAA
  • Threat models
  • How websites are built
  • Man-in-the-middle - brief intro

Understand

  • Security requires specification to reason about
  • How websites are dynamically built
  • Advertising from a security perspective
  • A single web connection has many groups involved

Apply

  • Block third party content activity
  • What does “secure advertising” mean to you?
  • What are key actors in your threat model regarding advertising?

Referenced in lecture

Additional Resources

Recent News

Chapter 3

Privacy/Advertising

CPPA Ad: The ball is in your coourt. Exercise your privacy rights.

CPPA ad in the SF Chronicle on individual privacy rights. Photo by Paul Schwartz.

Slides

Required Reading

Read one of:

Learning Outcomes

Understand

  • Boundary management
  • Contextual privacy

Apply

  • Block third party content activity
  • What does “secure advertising” mean to you? s/hlr4&id=206&men_tab=srchresults))
  • The next time you run into an uncomfortable social situation that involves privacy, try and think back on this lecture to tease out what about the situation made you uncomfortable.

News

Additional Resources

Referenced in lecture

Privacy

Privacy for Developers

Books

Chapter 4

Human in the Loop

Figure showing the framework from the 'A framework for reasoning about the human in the loop' paper.

Human-in-the-loop security framework

Slides

Required Reading

Learning Outcomes

Topics

  • Human in the Loop Framework

Understand

  • How to break down why a security or privacy warning is failing to engage users as intented.

Apply

  • Screenshot a warning that you have seen and post it on the Piazza thread

Additional Resources

Papers on Advice

Chapter 5

Communicating Securely

Slides

Mentioned in class

Handouts

Required Reading

Not required - a good more modern similar study of encryption:

Learning Outcomes

Topics

  • Public/Private key cryptography
  • Encrypting modern communication
  • Cognitive walkthrough
  • Usability heuristics
  • Think aloud

Understand

  • Why Johnny Can’t Encrypt is so famous.

  • Encryption is only helpful if its security assumptions are met AND the properties it provides meet users needs.

  • Research often requires several rounds of study and the early rounds can be informal.

  • What a hard problem looks like in Usable Security and Privacy and what makes it so hard to solve.

  • How USEC relates to general security research.

  • HCI methodologies: think aloud, cognitive walkthrough

  • Public private key encryption

Apply

  • Think about a security or privacy technology that you often use and claims to be encrypted. How might you run a study like the Johnny paper on that technology and how would you expect the results to be the same or different?
  • Compare Telegram and Signal in terms of communication security.

Lecture Notes

Why Johnny Can’t Encrypt is one of the most famous studies in Usable Privacy and Security. It showed that even PhD students at Carnegie Mellon University could not accurately send and receive encrypted email messages without making very serious errors.

Additional Resources

Chapter 6

Study Design

Slides

Handounts

Required Reading

  • No required reading

We will continue discussing Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0

Learning Outcomes

Topics

  • Research questions
  • Methodologies
  • Causation vs coorliation
  • Qualitative vs quantitative
  • Study variables

Understand

  • How to read a research paper
  • Framing of research questions
  • Critique a study in terms of limitations and strengths

Apply

  • Select a research paper, read through the methodology section, note down what you think the limitations are. Then read through the limitations section and compare your notes against what the authors wrote.
Chapter 7

Survey Design

Slides

Handounts

Required Reading

Learning Outcomes

Understand

  • Research questions guide survey design.
  • Wording can have a large impact on answers.
  • How to apply study design lessons to surveys.

Apply

  • Take a survey and pay attention to the questions you are being asked. Are any of them leading? Do they accurately allow you to express your skills or opinions?
    • Most in-store receipts have links to take a survey
    • Phone surveys sometimes happen
    • If you call a service center you may be asked to take a survey
    • Fill out a product review, it normally includes a mini survey

Lecture Notes: Survey Scales

Survey Scales about Security and Privacy

Writing good survey questions requires careful thought and a good knowledge of the information you are trying to measure. Some concepts are also challenging to measure like “security attitude”. To solve this problem, research teams create what are known as “survey scales”. A scale is a set of questions that are well written and have been shown to reliably measure a concept.

Scales have several useful properties. First off, writing good survey questions is challenging, so a pre-written scale is just easier to use. Secondly, if multiple researchers all ask the exact same questions, it becomes possible to compare answers across research studies. Finally, researchers using a scale can assume (and cite) that it reliably measures a concept.

Below are four scales from usable privacy and security. Each measures a different set of concepts.

  • IUIPC

    • Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15, 4 (2004), 336–355.
    • https://doi.org/10.1287/isre.1040.0032
  • SSDSES

    • Daniel Votipka, Desiree Abrokwa, and Michelle L. Mazurek. 2020. Building and Validating a Scale for Secure Software Development Self-Efficacy. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–20.
    • https://doi.org/10.1145/3313831.3376754
  • SeBIS

    • Serge Egelman and Eyal Peer. 2015. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 2873–2882.
    • https://doi.org/10.1145/2702123.2702249
  • SE-6

Other Useful Scales

Chapter 8

Authentication

Slides

Handout

Required Reading

One of:

Also, one of:

Learning Outcomes

Topics

  • Passwords
  • Types of authentication
  • Entropy

Understand

  • Authentication is not just about identity
  • Entropy as a measure of security
  • How people and computers authenticate differently

Apply

  • Look up the password rules for a website you use often. How do those rules match what we learned in class?

Additional Resources

News

Laws, regulations, and guidance

Research Papers

Chapter 10

Phishing

Slides

Required Reading

Learning Outcomes

Topics

  • Phishing
  • Psychology around risk
  • Teachable moments

Understand

  • Phishing is actually an authentication problem.
  • Training users involves thinking about what they need and when.

Apply

  • Try reading the University of Waterloo’s anit-phishing guidance.

Additional Resources

Cases where skilled people fell for phishing

Cases/news mentioned in lecture

Videos

Papers

Access Control

Access Control is how security systems control what resources can be acted upon by which entities.

Required Reading

None

Learning Outcomes

Topics

  • Access control policies
  • Social media permissions

Understand

  • What “actions”, “resources”, and “enttities” are.
  • People prefer actions over configuration.

Apply

  • Look at the access control policy associated with a social media post. Try properly listing out who can and cannot see it.
  • Think about your own social media threat model.

Additional Readings

Dec 4, 2024
Chapter 12

Staying Safe Online

Required Reading

Learning Outcomes

Understand

  • Your own security posture
  • Its easy to impact the views of others just by how a question is asked.
  • Match approaches to the type of information you want to know

Apply

  • Try asking friends or family what three things they would suggest other people do to stay safe online. Do their suggestions match the common suggestions?

Referenced in class

Lecture Notes

For this module you will start by thinking about how you yourself think about and act in regards to security. People rarely take the time to think about their security and therefore you may find yourself forming opinions as you think. The various activities in this module are inteded to ellicit preferences, attitudes, opinions, knowledge, and intended behavior from people.

Security is known as a “secondary task” that is something that has to be done in order to complete other tasks. For example, people rarely have the goal of unlocking the door to their home, instead they have a goal like “go inside” which has a sub-task of “unlock the door”. Similarly people rarely go to the Facebook homepage to login, instead they go to view their feed or post. Logging in is a sub-task of gaining further access.

Staying safe online Online safety is a deceptively complex task for most users. It involves everything from their understanding of the threats, to their models of how computers work, and even their expectations around how effective different mitigation strategies are. In this module we will be discussing how people go about keeping themselves safe and what they define “safe” as. Towards the end of the module we will also discuss the widely accepted definiton of security and how that aligns with what we have learned about people.

Eliciting views and preferences Asking people about security views, preferences, attitudes, and behaviors can be supprisingly complex. There are two main problems. 1) There is a known “correct” answer which is that they are as secure as possible. People like to look like they are doing the right thing, so when you ask them they may answer as if they are doing the best thing even if they are not. 2) People don’t think about security very often and as people we develop opinions by talking and thinking about things. So when you ask them about security they start thinking about the problem and generate opinons as they are talking. For example, most Canadians can easily answer questions like “what is your favorite type of music” or “which hocky team do you support” because they have thought about these issues before. Compare that to “What door in Davis Center do you most enjoy walking through?” You probably never thought about the issue of Davis Center doors before, but you are now thinking about the issue and developing an opinion. Perhapse you are recalling the experience of walking through the door nearest the Tim Hortons and smelling the coffee. Or the sound of library wispers when you walk through the library entrance door. Asking about security is somewhat similar to asking about Davis Center doors. Most people have at best a vauge opinion before being asked and then develop an opinion as they answer the question.

Elliciting views and preferences in security can be challenging but there are a range of ways to do it that minimize bias. There are also a range of methods meant to help with self-reflection that allows people to assess and possibly improve their own security approaches.

Additional Resources

Papers linked to survey scales