Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Like Share and Subscribe: Effective Communicati...

Like Share and Subscribe: Effective Communication of Security Advice

For everyday people, security advice is confusing, boring, and ever changing. In response, we’ve developed what essentially are superstitious habits — theatrical, security-flavoured actions that we repeat in hopes of protecting ourselves from “the hackers”.

There are two big problems here. First, how do we effectively communicate relevant security advice to non-experts? And secondly, is that advice even persuasive enough to encourage real behavioural change? What kind of advice should we be conveying, and to whom?

In this talk we cover why everyday people don’t follow security advice. To help us come up with some solutions, we introduce concepts from behavioural design, psychology and medicine. And I put the theory to the test by trialing some unconventional ways of communicating security to the masses.

Serena Chen

January 15, 2020
Tweet

More Decks by Serena Chen

Other Decks in Technology

Transcript

  1. People who do the “right” things People who do the

    “wrong” things supply chain 0days XSS vulns lack of 2FA adoption old operating systems password reuse
  2. “I don’t think about security” ↓ “I’m used to insecurity

    and lack of privacy” ↓ “I consume tech but don’t demand privacy or security” ↓ “I make tech but security isn’t top of mind” ↓ “I care about security but no one else cares… no funding/support” ↓ “Why are there bugs and vulns everywhere???” The system enables security problems
  3. 1. Who are these people? 2. What advice should we

    be giving them? 3. How do we communicate this advice?
  4. PART ONE PART ONE PART ONE PART ONE PART ONE

    WHO IS “EVERYONE ELSE”?
  5. I Ion, R Reeder, S Consolvo. “...No one Can Hack

    My Mind”: Comparing Expert and Non-Expert Security Practices. In Proceedings of SOUPS, 2015. “Visit only websites you know” “Change passwords often” “Use antivirus”
  6. –“Sally” “I know I shouldn’t do this, but I cycle

    through two or three passwords for all of my accounts.”
  7. –“Sally” “I know about password managers, I just haven’t gotten

    around to it yet. It seems like a big time investment.”
  8. –“Sally” “I’ve been meaning to change my passwords, but my

    current password system is just so memorised.”
  9. Our (rough) personas • Those who are confused about what

    to do • Those who know what to do but not how to implement it
  10. Security is like exercise • There is always room for

    improvement • Must be customised to the individual’s needs • Must be habitual and ongoing
  11. Technological capability Privacy needs Likely adversaries Not comfortable with technology

    “I am in hiding” Script kiddies Can quit vim “I need to be visible” Nation state
  12. Lean on the familiar • Store passwords in browser …

    or a notebook • Rely on smartphone • End-to-end encrypted chat apps Technological capability Not comfortable with technology Can quit vim
  13. Technological capability Not comfortable with technology Can quit vim Customise,

    try new stuff • Independent password manager • U2F keys • Ok, fine, you can tell them about PGP
  14. Be a minimalist • Turn off location permissions • Strict

    privacy settings • Compartmentalise • Regular follower/friend purging Privacy needs “I am in hiding” “I need to be visible”
  15. Obfuscate • Remove metadata / information in the background of

    photos • Use scheduling to hide activity patterns • Separate public / private personas “I am in hiding” “I need to be visible” Privacy needs
  16. Get specialist advice • Don’t take advice from a talk

    slide • Introduce them to someone who knows what they are doing • Seek !! professional !! help !! Likely adversaries Script kiddies Nation state
  17. Technological capability Privacy needs Likely adversaries Not comfortable with technology

    “I am in hiding” Script kiddies Can quit vim “I need to be visible” Nation state
  18. Update your email password Get a password manager Turn 2FA

    on for your email Turn 2FA on for Facebook, Twitter, LinkedIn Save current passwords to manager Update passwords with manager Put a passcode on your phone Update passwords with manager
  19. A. PERUSCO, N. PODER, M. MOHSIN, G. RIKARD-BELL, C. RISSEL,

    M. WILLIAMS, M. HUA, E. MILLEN, M. SABRY and S. GUIRGUIS, Evaluation of a comprehensive tobacco control project targeting Arabic-speakers residing in south west Sydney, Australia, Health Promotion International, Vol. 25 No. 2, 2010
  20. A. PERUSCO, N. PODER, M. MOHSIN, G. RIKARD-BELL, C. RISSEL,

    M. WILLIAMS, M. HUA, E. MILLEN, M. SABRY and S. GUIRGUIS, Evaluation of a comprehensive tobacco control project targeting Arabic-speakers residing in south west Sydney, Australia, Health Promotion International, Vol. 25 No. 2, 2010
  21. 5.3% decrease in smoking prevalence 7.8% increase in smoke free

    homes A. PERUSCO, N. PODER, M. MOHSIN, G. RIKARD-BELL, C. RISSEL, M. WILLIAMS, M. HUA, E. MILLEN, M. SABRY and S. GUIRGUIS, Evaluation of a comprehensive tobacco control project targeting Arabic-speakers residing in south west Sydney, Australia, Health Promotion International, Vol. 25 No. 2, 2010
  22. How to communicate • Veer away from the culture of

    shame • “Can I show you a better way?” • Show, don’t tell • Lead by example • Give people a script to navigate social situations
  23. “influencers” • Showing, not telling • Gives people the choice

    to opt in (or out) • Shows their mistakes, imperfections • Outlines routines, gives people steps/script to follow • Lots of different people to follow, can find one you relate to
  24. I made a security YT channel, AMA • I made

    some average videos • They were cringeworthy • The experiment lasted 3 months • YouTube + full time work is HARD, how does SimplyNailogical do it???
  25. I made a security YT channel, AMA • Immediately fell

    back into the habit of TELL, SELL and SHAME • Most successful video was me going through my conference bag before Kiwicon
  26. What I learned • To reach and connect with people

    requires vulnerability • My brain was screaming, “BUT OPSEC”
  27. What else happened • Friends and colleagues started asking me

    about security • I got over myself • I showed people, IRL, my personal setup, and how I got there • I was honest about how hard it was
  28. What else happened • A lot of them were already

    clued up about what to do • Seeing someone they knew IRL do the Good Security allowed them to make the leap
  29. I SWEAR THIS IS ALMOST OVER I SWEAR THIS IS

    ALMOST OVER I SWEAR THIS IS ALMOST OVER I SWEAR THIS IS ALMOST OVER I SWEAR THIS IS ALMOST OVER SUMMARY
  30. “I don’t think about security” ↓ “I’m used to insecurity

    and lack of privacy” ↓ “I consume tech but don’t demand privacy or security” ↓ “I make tech but security isn’t top of mind” ↓ “I care about security but no one else cares… no funding/support” ↓ “Why are there bugs and vulns everywhere???” The system enables security problems
  31. Update your email password Get a password manager Turn 2FA

    on for your email Turn 2FA on for Facebook, Twitter, LinkedIn Save current passwords to manager Update passwords with manager Put a passcode on your phone Update passwords with manager
  32. Technological capability Privacy needs Likely adversaries Not comfortable with technology

    “I am in hiding” Script kiddies Can quit vim “I need to be visible” National state