Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Design for Security — Web Directions Summit 2019

Serena Chen
October 31, 2019

Design for Security — Web Directions Summit 2019

Serena Chen

October 31, 2019
Tweet

More Decks by Serena Chen

Other Decks in Technology

Transcript

  1. it’s always 1989 in security • Security through obfuscation •

    Security through excessive complexity • Password rotation
  2. look at journey maps • determine likely paths • what

    is the easiest path? • what is the most secure / ideal path? • can you merge the two?
  3. we fall back on patterns everything needs to be easy

    usability is my responsibility Illustration by Chloe Cathcart
  4. Our job is to make legitimate actions • that legitimate

    users want to take • at that time • in that place … easy Everything else we can lock down.
  5. design model user model system image Source: The Design of

    Everyday Things, Don Norman designers users
  6. design model user model system image Source: The Design of

    Everyday Things, Don Norman designers users
  7. A system is secure when the user expectations match the

    design intentions and the system itself A system is secure when the user expectations match the design intentions and the system itself A system is secure when the users’ expectations match the design intentions and the system itself A system is secure when the users’ expectations match the design intentions and the system itself A system is secure when the users’ expectations match the design intentions and the system itself
  8. • observe non-tech users, customer sessions • ask them what

    they expect • infer intent through context 1 understand their model
  9. 2 influence their model • when we make, we teach

    • whenever someone interacts
 a thing we made, they learn. • path of least resistance becomes the default “way to do things”.
  10. take take take take take take • cross-pollination is a

    missed opportunity • our jobs are about outcomes, 
 not “what we’re supposed to do” • align user goals to your security goals
  11. take take take take take take • aim to know

    their intent • craft a path of least resistance • understand their mental model • communicate accurately to that model