Careers & People

Stop Blaming Users. Make Security User-Friendly.

50%
50%

Jelle Niemantsverdriet of Deloitte visits the Dark Reading News Desk at Black Hat to explain how security can be improved if security tools, error messages, and help desk calls educate users and 'put a smile on someone's face.'

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
bboink1
100%
0%
bboink1,
User Rank: Strategist
9/15/2016 | 10:09:50 AM
Users Still need the Blame
Users are the weakest link.  When the security measures are in place and the user still does the wrong thing because there are no consequences adapting the security to them is a futile effort.  The only fix to that is to hold the users accountable.  Case in point, trying to make cars that keep you in your lane or stop for you is needed because people are not paying attention.  How about when they cause an accident due to texting and driving they get rewarded with license revocation.

As far as taking the empathy approach with the user, it is difficult to build security around the "I am going to do what I am going to do regardless of what I am supposed to do" attitude. No matter how friendly you make the security if it inhibits the user from doing what they want they will ignore and find a way around.

Designing better error messages for the users is a good idea.  It is possible if the error message was informative it would help the tech that has to work on it.  .That being said most of the users do not read the error message so that would not help a user.  Just as they do not read the popup that downloads the cropto-ware on their system.  An example of this is when the help desk gets the call of "It just stopped working," and "I didn't do anything."  Of course the answer of "ummm....I don't know" when asked "What did the error message say?"  Users just click without reading.

The point of rewarding them for doing what they are supposed to do is like giving them a trophy for showing up.  Then they will expect a trophy all of the time and the value of the "incentive" will diminish.  This is what created the situation that we are in with the users not caring now.

I do agree that security must be made to be a bit more user friendly.  I also believe that the users will adapt in a downward direction to put us back in the same situation.  I think accountability is the direction that will produce a bigger bang for the buck.
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6978
PUBLISHED: 2018-12-18
vRealize Operations (7.x before 7.0.0.11287810, 6.7.x before 6.7.0.11286837 and 6.6.x before 6.6.1.11286876) contains a local privilege escalation vulnerability due to improper permissions of support scripts. Admin user of the vROps application with shell access may exploit this issue to elevate the...
CVE-2018-20213
PUBLISHED: 2018-12-18
wbook_addworksheet in workbook.c in libexcel.a in libexcel 0.01 allows attackers to cause a denial of service (SEGV) via a long name. NOTE: this is not a Microsoft product.
CVE-2017-15031
PUBLISHED: 2018-12-18
In all versions of ARM Trusted Firmware up to and including v1.4, not initializing or saving/restoring the PMCR_EL0 register can leak secure world timing information.
CVE-2018-19522
PUBLISHED: 2018-12-18
DriverAgent 2.2015.7.14, which includes DrvAgent64.sys 1.0.0.1, allows a user to send an IOCTL (0x800020F4) with a buffer containing user defined content. The driver's subroutine will execute a wrmsr instruction with the user's buffer for partial input.
CVE-2018-1833
PUBLISHED: 2018-12-18
IBM Event Streams 2018.3.0 could allow a remote attacker to submit an API request with a fake Host request header. An attacker, who has already gained authorised access via the CLI, could exploit this vulnerability to spoof the request header. IBM X-Force ID: 150507.