Andrew Bragdon CS166: USABLE SECURITY

Size: px
Start display at page:

Download "Andrew Bragdon CS166: USABLE SECURITY"

Transcription

1 Andrew Bragdon CS166: USABLE SECURITY

2 WHY CRYPTOSYSTEMS FAIL (ANDERSON, 1993) Traditionally, it was assumed that the biggest security threat is from sophisticated cryptanalysis Assumes government (e.g. NSA)-level capabilities In practice, however, it is not the encryption products but how they are deployed that is the problem Using the wrong products Poor implementation/integration Sloppy operating procedures

3 WHY CRYPTOSYSTEMS FAIL (CONT.) Security groups are rarely well-integrated into corporate culture High turnover rate Companies selling security products overestimate the level of competence of their customers A new threat model is needed Need to concentrate on what is likely to happen rather than what could happen Features not getting used correctly Need to understand how security products are actually used

4 WHY JOHNNY CAN T ENCRYPT (TYGAR, 1999) Given no prior training Can users encrypt messages in an ecologically valid setting?

5 PGP

6 WHY JOHNNY CAN T ENCRYPT (CONT.) 12 participants were recruited from a political campaign office Users were given Eudora and PGP and asked to send internal messages regarding the campaign, in encrypted form Given an introduction to Eudora but not to PGP

7 WHY JOHNNY CAN T ENCRYPT (RESULTS) 1 participant was unable to figure out how to encrypt, and two participants took > 25 min to send the 1 st message 7 participants mistakenly used their public key to encrypt Only 2 participants correctly encrypted a message in the 90 minute session Conclusion: standard user interface design fails for security applications, such as encryption!

8 USABLE SECURITY Applying human-computer interaction (HCI) to computer security Understanding How security systems are used in practice How a better interface can improve user security Better practices Better understanding

9 PAPERS OVERVIEW Publication landscape In contrast to other fields Best work in CS is usually published first at conferences Later collected together into Journal articles CHI conference

10 Moncur, W. and Leplâtre, G Pictures at the ATM: exploring the usability of multiple graphical passwords. In Proceedings of CHI ' PICTURES AT THE ATM

11 ATM SECURITY Token Knowledge-based password, 4-digits Users have approx. 5 token/password combinations on average

12 IT S HARD TO REMEMBER PINS!

13 INSECURE MEMORY STRATEGIES Write down PINs Make them all the same Disclose them to friends and family (some studies suggest up to 30% of the time)

14 BACKGROUND Picture Superiority Effect: People remember images better than words, and other semantic or syntactic information Graphical Password Types Locimetric (salient points) Drawmetric (sketch a picture) Cognometric (recognize pictures)

15 THE SYSTEM

16 THE CONTROL

17 HYPOTHESES H1: Multiple graphical passwords are more memorable than multiple PIN numbers H2: Memorability of multiple graphical passwords can be improved using a mnemonic to aid recall H3: Memorability of multiple graphical passwords can be improved by showing password and distracter images against a signature colored background.

18 METHODOLOGY Web-based at home study, 172 participants Must remember five PIN/bank combinations Initial training, three tests spaced by two weeks Five groups: Control 0: 4-digit numeric PIN Experimental 1: Graphical passwords Experimental 2: Graphical passwords with signature color background to augment memorability Experimental 3: Graphical passwords with explicit mnemonic strategy Experimental 4: Graphical passwords with mnemonic strategy and color background

19 EMPIRICAL STUDY RESULTS

20 EMPIRICAL STUDY RESULTS

21 EMPIRICAL STUDY RESULTS

22 DISCUSSION Core hypothesis confirmed Users benefited from mnemonic, did not benefit from color Users frequently got the right set of images, but the wrong order Future work Larger sample size to examine large-scale patterns such as age Longer periods of time Semantically equivalent images

23 Stoll, J., Tashman, C. S., Edwards, W., and Spafford, K Sesame: informing user security decisions with system visualization. In Proceeding of CHI ' HELPING USERS UNDERSTAND SECURITY ISSUES THROUGH SYSTEM VISUALIZATION

24 SOME REAL SECURITY PROMPTS AVG Update downloader is trying to access the Internet The firewall has blocked Internet access to your computer [FTP] from [TCP Port 57796, Flags: S] [Your] AntiSpyware has detected that the Windows NetBIOS Messenger Service is currently running. (This service should not be confused with the peer-to-peer Windows Messenger service, or MSN Messenger service which are used for Internet Chat). Beginning with Windows XP Service Pack 2, the Windows NetBIOS Messenger service What would you like to do?

25 HOW DO YOU COMMUNICATE COMPLEX SECURITY CONCEPTS TO AN END USER? Information provided by security tools is technical, and difficult to interpret Users are in a hurry, and expect things to just work Must choose between dealing with more boxes in the future, and making a permanent decision

26 THE VISUALIZATION CHALLENGE

27 DESIGN (CONT.)

28 ZONE ALARM FIREWALL

29 METHODOLOGY 20 participants (9 female, 11 male) Undergraduates; no CS/Engineering None considered themselves to be experts 6 tasks 4 allow/forbid incoming connection 2 phishing site tasks Between-subjects, 2 conditions

30 EMPIRICAL STUDY RESULTS

31 EMPIRICAL STUDY RESULTS

32 DISCUSSION Users performed better (statistically significant) with Sesame Post-interviews indicate that: Most participants in the control did not know how to use information presented 5 participants allowed/denied all requests All participants in experimental group used information presented All users understood foreground processes, only 2 understood background processes Understood arrows, and remote computers

33 Egelman, S., Cranor, L. F., and Hong, J You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceeding of CHI ' AN EMPIRICAL STUDY OF PHISHING WARNINGS IN WEB BROWSERS

34 BANNER BLINDNESS

35 INTERNET EXPLORER 7

36 INTERNET EXPLORER 7

37 FIREFOX 2

38 STUDY METHODOLOGY 70 participants Assigned to conditions based on what browser (and version) they use: Internet Explorer, Active Internet Explorer, Passive Firefox, Active Control (no warning) Participants were told they were in an online shopping study; used their personal information to buy two items Amazon ebay

39 STUDY METHODOLOGY (CONT.) Bought from store Were sent a Spear Phishing message saying their purchase needed to be confirmed Checked to confirm Clicking link in the message produced Phishing warning message

40 EMPIRICAL STUDY FINDINGS

41 EMPIRICAL STUDY FINDINGS

42 DISCUSSION 50% of IE condition recognized warning, 20% for Firefox IE has a very similar warning for an expired cookie IE warning may have suffered from habituation: Oh, I always ignore those Looked like warnings I see at work which I know to ignore I see them daily Since it gave me the option of proceeding to the site, I figured it couldn t be that bad. Most participants did not appear to understand that can be faked; thus they were confused as to why they got this warning message

43 DESIGN REQUIREMENTS Interrupt the primary task Provide clear choices Failing safely Preventing habituation Altering the phishing website Users trust sites primarily based on its look and feel

44 Sankarpandian, K., Little, T., and Edwards, W. K Talc: using desktop graffiti to fight software vulnerability. In Proceeding of CHI ' PERSUADING USERS TO INSTALL SECURITY UPDATES

45 DON T INTERRUPT ME!

46 HOW DO YOU PERSUADE A USER TO INSTALL UPDATES? Ambient display Constant, non-intrusive reminder Allows users to respond at their own pace

47 THE GRAFFITI SOLUTION

48 THE GRAFFITI SOLUTION Allows users to respond at their own pace Size of graffiti denotes severity Images chosen randomly from a predetermined corpus In order to clear the graffiti off of their desktop, they must install the patches

49 METHODOLOGY 10 participants, recruited from outside the university context Used TALC at home, on their personal computers for a week TALC logged usage and patch data, and periodically uploaded it

50 EMPIRICAL STUDY RESULTS

51 EMPIRICAL STUDY RESULTS

52 DISCUSSION Users appear to return to address threats later Users appeared to become aware of the patches they needed to install Is this an appropriate solution for a business context? Are there issues interpreting this type of feedback across cultures?

53 THANK YOU

EECE 412, TERM PROJECT, DECEMBER 2009 1. EECE 412 Term Project: A Study on SSL Warning Effectiveness

EECE 412, TERM PROJECT, DECEMBER 2009 1. EECE 412 Term Project: A Study on SSL Warning Effectiveness EECE 412, TERM PROJECT, DECEMBER 2009 1 EECE 412 Term Project: A Study on SSL Warning Effectiveness Ildar Muslukhov Andreas Sotirakopoulos Levi Stoddard muslukhovi@gmail.com sotirakopoulos@gmail.com levi.stoddard@gmail.com

More information

Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization

Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization Max-Emanuel Maurer, Alexander De Luca, Tobias Stockinger University of Munich Media Informatics Group Amalienstr. 17

More information

Personal Firewall Usability-A Survey

Personal Firewall Usability-A Survey Personal Firewall Usability-A Survey Jiao Dapeng Helsinki University of Technology Jiao.Dapeng@hut.fi Abstract In this paper, we focus on the usability challenges presented by personal firewalls. Nowadays,

More information

Ad Hoc (Temporary) Accounts Instructions

Ad Hoc (Temporary) Accounts Instructions DLG/PDV SFTP Server Instructions 1. Ad Hoc (Temporary) Accounts. 2. LeadsGen (Permanent) Accounts. 3. Manually configuring SFTP Clients (WinSCP & FileZilla). 4. Uploading files into SFTP server. 5. Frequently

More information

MITA VPN Client Software Installation Guide

MITA VPN Client Software Installation Guide 01. Introduction Welcome to the Installation of MITA Virtual Private Network Installation Guide. The system allows access to the MAGNET services from your Internet connection in a secure manner. Before

More information

Student service user guide Version 1.0, July 2013

Student service user guide Version 1.0, July 2013 Student service user guide Version 1.0, July 2013 This guide is designed to help Exams Officers and teachers understand what students see when they log into the new enhanced version of ResultsPlus Direct,

More information

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM) Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email

More information

Information Security

Information Security Information Security Table of Contents Statement of Confidentiality and Responsibility... 2 Policy and Regulation... 2 Protect Our Information... 3 Protect Your Account... 4 To Change Your Password...

More information

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management

Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management Beyond Remote Control Features that Take Remote Control Capabilities to the Next Level of Network Management Remote control technologies can enable a system administrator to connect directly to the desktop

More information

ConnectIT. How to Connect and End a Remote Support Session. (for Windows & IE / Firefox)

ConnectIT. How to Connect and End a Remote Support Session. (for Windows & IE / Firefox) Information Technology Services Page 1 of 7 ConnectIT How to Connect and End a Remote Support Session (for Windows & IE / Firefox) This document shows how to respond to a remote support request from ITS

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

a. StarToken controls the loss due to you losing your Internet banking username and password.

a. StarToken controls the loss due to you losing your Internet banking username and password. 1. What is StarToken? StarToken is the next generation Internet banking security solution that is being offered by Bank of India to all its Internet Banking customers (Retail as well as Corporate). StarToken

More information

First Advisors Login Guide

First Advisors Login Guide WebLink Login Guide First Advisors Login Guide In order to conform to the Federal Financial Institutions Examination Council (FFIEC) Authentication Guidance, our First Advisors site requires you to step

More information

Topic 1 Lesson 1: Importance of network security

Topic 1 Lesson 1: Importance of network security Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you

More information

Human Behaviour and Security Compliance

Human Behaviour and Security Compliance Human Behaviour and Security Compliance M. Angela Sasse University College London, UK Research Institute for Science of Cyber Security www.ucl.ac.uk/cybersecurity/ Academic Centre of Excellence for Cyber

More information

Remote Online Support

Remote Online Support Remote Online Support STRONGVON Tournament Management System 1 Overview The Remote Online Support allow STRONGVON support personnel to log into your computer over the Internet to troubleshoot your system

More information

Countering and reducing ICT security risks 1. Physical and environmental risks

Countering and reducing ICT security risks 1. Physical and environmental risks Countering and reducing ICT security risks 1. Physical and environmental risks 1. Physical and environmental risks Theft of equipment from staff areas and Theft of equipment from public areas Theft of

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------

USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support

More information

Logging into Citrix (Epic) using an RSA Soft Token - New RSA User

Logging into Citrix (Epic) using an RSA Soft Token - New RSA User Logging into Citrix (Epic) using an RSA Soft Token - New RSA User Soft Token Installation and Logging into Citrix (Epic) using an RSA Soft Token A. For new RSA users: downloading & importing your RSA Soft

More information

Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study

Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study Robert Biddle, P.C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen Carleton University, Ottawa, ON, Canada

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

Authentication Part 4: Issues and Implications. People and Security Lecture 8

Authentication Part 4: Issues and Implications. People and Security Lecture 8 Authentication Part 4: Issues and Implications People and Security Lecture 8 The great authentication fatigue (1) 23 knowledge workers asked to keep a diary of all their authentication events for 24 hours

More information

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 Alma Whitten and J. D. Tygar Presentation by Jukka Valkonen jukka.valkonen@tkk.fi 25.10.2006 Outline 1. Background 2. Test methods and results

More information

USING TEAMVIEWER QUICKSUPPORT FOR REMOTE ASSISTANCE FEBRUARY 2013

USING TEAMVIEWER QUICKSUPPORT FOR REMOTE ASSISTANCE FEBRUARY 2013 USING TEAMVIEWER QUICKSUPPORT FOR REMOTE ASSISTANCE FEBRUARY 2013 Table of Contents Introduction...3 Arrange a remote support session...3 Download and run the TeamViewer QuickSupport application...3 Start

More information

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.

FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators

More information

GLOBAL PAYMENTS AND CASH MANAGEMENT. HSBCnet Application Guide August 2006

GLOBAL PAYMENTS AND CASH MANAGEMENT. HSBCnet Application Guide August 2006 GLOBAL PAYMENTS AND CASH MANAGEMENT HSBCnet Application Guide August 2006 HSBCnet Application Guide TABLE OF CONTENT Page Overview 1 Step 1 Verifying the Minimum System Requirements 2 1.1 Operating System

More information

Firewall Rules (Outbound)

Firewall Rules (Outbound) Secure File Sharing FAQ & Troubleshooting Tips Q: I am accessing Secure File Sharing through a firewall. What should I do? A: Provide the following firewall rules to your IT Professional. Firewall Rules

More information

CITRIX TROUBLESHOOTING TIPS

CITRIX TROUBLESHOOTING TIPS CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:

More information

General tips for increasing the security of using First Investment Bank's internet banking

General tips for increasing the security of using First Investment Bank's internet banking General tips for increasing the security of using First Investment Bank's internet banking Dear Clients, First Investment Bank (Fibank, the Bank) provides you with high level of protection and security

More information

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software

More information

WebEx Remote Access White Paper. The CBORD Group, Inc.

WebEx Remote Access White Paper. The CBORD Group, Inc. WebEx Remote Access White Paper The CBORD Group, Inc. Document Revision: 1 Last revised: October 30, 2007 Changes are periodically made to the information contained in this document. While every effort

More information

UHC-iEnroll Offline Software Frequently Asked Questions

UHC-iEnroll Offline Software Frequently Asked Questions UHC-iEnroll Offline Software Frequently Asked Questions Q. How do I know if I am picking the right application from the drop down my paper form doesn t look like this? Please contact the Producer Help

More information

These instructions will allow you to configure your computer to install necessary software to access mystanwell.com.

These instructions will allow you to configure your computer to install necessary software to access mystanwell.com. HOW TO: ACCESS MYSTANWELL.COM USING WINDOWS WITH MOZILLA FIREFOX What is mystanwell.com? The remote access web site called mystanwell.com allows staff to access Stanwell applications via the Internet using

More information

Installing Remote Desktop Connection

Installing Remote Desktop Connection SETTING UP YOUR REMOTE DESKTOP This section will assist you in setting you Remote Desktop Connection. This will allow you to create an icon for easy access to your virtual desktop. DISCLAIMER: All images

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

Network Connect Installation and Usage Guide

Network Connect Installation and Usage Guide Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing

More information

An Introduction to UC-Monitor

An Introduction to UC-Monitor An Introduction to UC- UC----, based upon the Internet application services, is a new generation of large-scale Distributive real time monitor system, as well as a server administration system which has

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Frequently Asked Questions:

Frequently Asked Questions: Frequently Asked Questions: What is new in Community Online? What do I have to do to use the new system? How do I devise a Password to access Community Online? Forgotten your Community Online Password?

More information

Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees.

Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. Proofpoint provides the capability for external users to send secure/encrypted emails to EBS-RMSCO employees. To create a new email message to be sent securely to an EBS-RMSCO employee: 1. Click on the

More information

Data protection. Protecting your personal information online

Data protection. Protecting your personal information online Data protection Protecting your personal information online 3 Introduction More and more people are conducting their personal affairs online. Online shopping, social networking, job hunting and the ability

More information

Firewall Access Request Form

Firewall Access Request Form SECTION 1 TO BE COMPLETED BY THE APPLICANT By completing the below information the requestor/applicant acknowledges and agrees that he/she has read, understood and will comply with the following: CHECK

More information

Getting Started in the Cambridge LMS - Students

Getting Started in the Cambridge LMS - Students Getting Started in the Cambridge LMS - Students Getting Started with the Cambridge LMS v2.0 Cambridge University Press 2012 1. Before you Start Before you start using the LMS you need to check whether

More information

Securing Your Business s Bank Account

Securing Your Business s Bank Account Commercial Banking Customers Securing Your Business s Bank Account Trusteer Rapport Resource Guide For Business Banking January 2014 Table of Contents 1. Introduction 3 Who is Trusteer? 3 2. What is Trusteer

More information

NAS 225 Introduction to FTP Explorer

NAS 225 Introduction to FTP Explorer NAS 225 Introduction to FTP Explorer Connect to FTP sites and transfer files A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use FTP Explorer to connect

More information

Technical Report - Practical measurements of Security Systems

Technical Report - Practical measurements of Security Systems A Short Study on Security Indicator Interfaces Technical Report UCSC-WASP-15-04 November 2015 D J Capelis mail@capelis.dj Working-group on Applied Security and Privacy Storage Systems Research Center University

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION Mobile Backup Web Application Using Image Processing Authentication 1 Walse Reshma S. 2 Khemnar Archana M. 3 Padir Maya S. 4 Prof.K.P.Somase Department Of Computer Engineering, Jcoe(Kuran),Tal:Junnar,Dist:Pune

More information

Network Security. Demo: Web browser

Network Security. Demo: Web browser Network Security Demo: Web browser Email Messages An email message can be instantly forwarded around the globe, even if accidentally. Do not write anything in a message that you will later regret! Read

More information

This guide will go through the common ways that a user can make their computer more secure.

This guide will go through the common ways that a user can make their computer more secure. A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

APT Advanced Persistent Threat Time to rethink?

APT Advanced Persistent Threat Time to rethink? APT Advanced Persistent Threat Time to rethink? 23 November 2012 Gergely Tóth Senior Manager, Security & Privacy Agenda APT examples How to get inside? Remote control Once we are inside Conclusion 2 APT

More information

Why Johnny Can't Encrypt: A Usability Study of PGP

Why Johnny Can't Encrypt: A Usability Study of PGP Why Johnny Can't Encrypt: A Usability Study of PGP Jan Sousedek Technische Universität Berlin, Germany Erasmus program Summer semester 2008 Seminar: Internet Security jan.sousedek@seznam.cz Abstract Interfaces

More information

http://connectwise.reflexion.net/login?domain=connectwise.net

http://connectwise.reflexion.net/login?domain=connectwise.net ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.

More information

FTP-Stream Module: InstantShare End User Guide

FTP-Stream Module: InstantShare End User Guide FTP-Stream Module: InstantShare End User Guide InstantShare Overview InstantShare is an easy way to quickly share large files to external partners and to request them to send files back to you. But unlike

More information

The LRS File Transfer Service offers a way to send and receive files in a secured environment

The LRS File Transfer Service offers a way to send and receive files in a secured environment File Transfer Service The LRS File Transfer Service offers a way to send and receive files in a secured environment using HTTPS or FTPS. It also supports unsecured standard FTP transfers. The service supports

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

CU AnyHour+ Online Banking FAQ's

CU AnyHour+ Online Banking FAQ's CU AnyHour+ Online Banking FAQ's GENERAL Q. What can I do with CU AnyHour+? A. CU AnyHour+, USSFCU s enhanced online banking service, is the real-time way to log on to your credit union accounts directly

More information

Connecting to Remote Desktop Windows Users

Connecting to Remote Desktop Windows Users Connecting to Remote Desktop Windows Users How to log into the College Network from Home 1. Start the Remote Desktop Connection For Windows XP, Vista and Windows 7 this is found at:- Star t > All Programs

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

Secure Email and Web Browsing. Sébastien Dellabella Computer Security Team

Secure Email and Web Browsing. Sébastien Dellabella Computer Security Team Secure Email and Web Browsing Sébastien Dellabella Computer Security Team Overview Main attack types Consequences of a successful attack Survival guide on the wild Internet Understanding the details Examples

More information

Unipass Securemail Client. User Guide v1.2

Unipass Securemail Client. User Guide v1.2 Unipass Securemail Client User Guide v1.2 This document provides a step by step illustrated user guide for the Unipass Securemail desktop software client / plug-in. UIdP Project Team 28/06/2015 Contents

More information

Layered security in authentication. An effective defense against Phishing and Pharming

Layered security in authentication. An effective defense against Phishing and Pharming 1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered

More information

Accessing your Staff (N and O drive) files from off campus

Accessing your Staff (N and O drive) files from off campus Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document

More information

DEG Web User Guide State of Michigan Data Exchange Gateway Web

DEG Web User Guide State of Michigan Data Exchange Gateway Web DEG Web User Guide State of Michigan Data Exchange Gateway Web PC-SETUP For Data Exchange Gateway (DEG) Web--https Secure Internet File Transfer... 2 BASIC OPERATIONS... 6 Logging In... 6 Downloading...

More information

Working Together - Your Apple Mac and Microsoft Windows

Working Together - Your Apple Mac and Microsoft Windows Contains information about complex concepts and /or requires technical knowledge to get the most out of the article. Aimed at the more experienced / ambitious ICT manager or accidental techie. Working

More information

Trusteer Rapport. User Guide. Version 3.5.1307 April 2014

Trusteer Rapport. User Guide. Version 3.5.1307 April 2014 Trusteer Rapport User Guide Version 3.5.1307 April 2014 Contents About this Guide 1 Need More Information about Trusteer Rapport? 1 Sending us Feedback 1 1. What is Trusteer Rapport? 3 Antivirus: A False

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

Protecting Yourself from Identity Theft

Protecting Yourself from Identity Theft Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

More information

Terminal Server Guide

Terminal Server Guide Terminal Server Guide Contents What is Terminal Server?... 2 How to use Terminal Server... 2 Remote Desktop Connection Client... 2 Logging in... 3 Important Security Information... 4 Logging Out... 4 Closing

More information

Helping you to protect yourself against fraud and financial crime

Helping you to protect yourself against fraud and financial crime Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you

More information

HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations

HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations Security Considerations for VPM and HP SIM Servers Introduction... 3 External patch acquisition... 4 Comparing

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

The Importance of Being Earnest [in Security Warnings]

The Importance of Being Earnest [in Security Warnings] The Importance of Being Earnest [in Security Warnings] Serge Egelman a and Stuart Schechter b a University of California, Berkeley b Microsoft Research, Redmond egelman@cs.berkeley.edu stuart.schechter@microsoft.com

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

FireBLAST Email Marketing Solution v2

FireBLAST Email Marketing Solution v2 Installation Guide WELCOME to fireblast, one of the Industry s leading Email Marketing Software Solutions for your business. Whether you are creating a small email campaign, or you are looking to upgrade

More information

join.me architecture whitepaper

join.me architecture whitepaper join.me architecture whitepaper 2 join.me architecture whitepaper Table of Contents Introduction 3 Architecture Overview 3 Data Security 6 Session and Website Security 7 Hosting Overview 8 Conclusion 8

More information

State Health Repository Tool (SHRT) Testing Instructions

State Health Repository Tool (SHRT) Testing Instructions Step 1 - Access the SHRT State Health Repository Tool (SHRT) Testing Instructions 1. Close out any other open browsers. 2. Enter https://shrt.adp.com in the Address field of your browser and press Enter

More information

Connecting to Another PC with Remote Assistance

Connecting to Another PC with Remote Assistance NOTE: ALL OF THE MATERIAL IN THIS DOCUMENT IS FROM WINDOWS XP INSIDE OUT by ED BOTT & CARL SIECHERT PUBLISHED by MICROSOFT PRESS Connecting to Another PC with Remote Assistance If you ve ever tried to

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

Upgrading Client Security and Policy Manager in 4 easy steps

Upgrading Client Security and Policy Manager in 4 easy steps Page 1 of 13 F-Secure White Paper Upgrading Client Security and Policy Manager in 4 easy steps Purpose This white paper describes how to easily upgrade your existing environment running Client Security

More information

SiteRemote 4 Cloud. Remote Monitoring. SaaS - Kiosk Remote Monitoring & Management Software

SiteRemote 4 Cloud. Remote Monitoring. SaaS - Kiosk Remote Monitoring & Management Software SiteRemote 4 Cloud Remote Monitoring SaaS - Kiosk Remote Monitoring & Management Software SiteRemote is a software solution used for remotely monitoring and maintaining client terminals running a Provisio

More information

Using Microsoft Expression Web to Upload Your Site

Using Microsoft Expression Web to Upload Your Site Using Microsoft Expression Web to Upload Your Site Using Microsoft Expression Web to Upload Your Web Site This article briefly describes how to use Microsoft Expression Web to connect to your Web server

More information

Security aspects of e-tailing. Chapter 7

Security aspects of e-tailing. Chapter 7 Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing

More information

Protected PDF Common Installation Issues

Protected PDF Common Installation Issues Protected PDF Common Installation Issues July 14, 2011 Version 1.1 TABLE OF CONTENTS Basic Instructions for Readers ------------------------------------------------------------------------- 2 Common Questions

More information

BUT. Before you start shopping on the Internet, there are a number of questions you need to ask yourself.

BUT. Before you start shopping on the Internet, there are a number of questions you need to ask yourself. We've all heard how great Internet Shopping can be; some say you can find goods at prices far cheaper than at traditional stores, as online platforms don t have to manage expensive overheads. Online shoppers

More information

Web attacks and security: SQL injection and cross-site scripting (XSS)

Web attacks and security: SQL injection and cross-site scripting (XSS) Web attacks and security: SQL injection and cross-site scripting (XSS) License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike

More information

Reading Kindle titles on your PC or Mac

Reading Kindle titles on your PC or Mac Reading Kindle titles on your PC or Mac If you do not own a Kindle device (or an ipad, Android, or iphone with the Kindle app installed), you have two options for reading a Kindle title: A) Kindle Cloud

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

NewNet 66 Network Security

NewNet 66 Network Security NewNet 66 Network Security Spyware... Understanding the Threat What is Spyware? Spyware is an evolved term. In the mid 90s, it was used to refer to high-tech espionage gadgets. By the late 90s, it became

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Directory and File Transfer Services. Chapter 7

Directory and File Transfer Services. Chapter 7 Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major

More information

Security And Backups. Topic Website Tutorial 18

Security And Backups. Topic Website Tutorial 18 Topic Website Tutorial 18 Security And Backups Since your online strategy is a core component of your business plan, you need to ensure that you are able to recover all your files should your website crash

More information

CitiDirect BE. Getting Started Kit. Solution Corporate and Public Sector Clients in Singapore. Welcome to CitiDirect BE!

CitiDirect BE. Getting Started Kit. Solution Corporate and Public Sector Clients in Singapore. Welcome to CitiDirect BE! SM CitiDirect BE Getting Started Kit Solution Corporate and Public Sector Clients in Singapore Welcome to CitiDirect BE! CitiDirect BE is the evolution of CitiDirect Online Banking (CitiDirect). New user-friendly

More information

DiamondStream Data Security Policy Summary

DiamondStream Data Security Policy Summary DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Ad-Aware Antivirus Overview

Ad-Aware Antivirus Overview Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day

More information

How To Encrypt A Mail From Apa With A Keypress On Auntorom (For A Freebie) On A Pc Or Macbook Or Ipa (For Free) On An Ipa Or Ipam (For Cheap) On Your

How To Encrypt A Mail From Apa With A Keypress On Auntorom (For A Freebie) On A Pc Or Macbook Or Ipa (For Free) On An Ipa Or Ipam (For Cheap) On Your Internetbrowser How to set up Everything There are no trustworthy browsers. Face it. Use Tor if possible. Install Tor Browser Simply defaults: Seite 1 Have fun. If you think you will need Firefox, you

More information