Skip to main content

Lorrie Cranor on Bridging the Usability Gap in Cybersecurity

N2K NetworksDecember 30, 202522 min211 views
32 connections·40 entities in this video→

The Usability Gap in Security

  • πŸ’‘ Security tools often fail in practice because designers prioritize security over user workflows and human factors.
  • 🎯 CISOs commonly make the mistake of not thinking through security from a user's perspective, focusing instead on risk or environmental security.
  • πŸ”‘ While many CISOs are beginning to consider the user, this is a relatively new development in the field.

Challenges with Passwords and Authentication

  • πŸ”‘ The industry struggles to move beyond passwords because no single solution meets all criteria: security, ease of use, device compatibility, and legacy software support.
  • πŸ“± Biometrics on mobile phones are effective but not universally applicable and may not be secure enough for all contexts.
  • πŸ€” Passkeys, while conceptually good, are currently confusing for users, leading to uncertainty about success and cross-device access.
  • πŸš€ The ideal future involves truly passwordless authentication with an incredibly simple user experience.

Evolving Privacy Expectations

  • ⚠️ The perception that young people don't care about privacy is a mischaracterization; rather, they often feel powerless to protect it due to pervasive data collection and convenience.
  • 🚫 Users often feel they have no real choice but to give away data for service access, as workarounds are cumbersome, time-consuming, or expensive.
  • πŸ“ Terms of service are too complex; ideal solutions would include explicit summaries and real choices for users to access services without excessive data sharing.

Designing for Transparency and Trust

  • βœ… Compliance alone is insufficient; organizations must conduct user studies to understand how people interact with privacy features.
  • πŸ“Œ Designing for transparency involves keeping things simple, centralizing privacy settings, and providing just-in-time information where data is collected.
  • πŸ› οΈ Frameworks like Carnegie Mellon's 'Users First' help designers systematically review privacy interfaces by assessing comprehensibility and ease of choice.

Applying Behavioral Insights to Security

  • 🧠 CISOs should consult empirically tested research relevant to their specific security problems (e.g., password policies, access control).
  • πŸ“ˆ It's crucial to test potential solutions with real users (not just the security team) to ensure they work as intended.
  • πŸ’‘ Even simple methods like observing a handful of employees using a system before launch can provide valuable insights.

The Future of Usable Security

  • πŸš€ The obvious security control to redesign is passwords, as the current system of remembering unique passwords is not working.
  • ✨ Encryption in web browsers (HTTPS) is a great example of a security tool that gets usability right by working automatically and transparently.
  • πŸ“ˆ Significant progress has been made in usable security research and adoption over the past 25 years, with more researchers and companies focusing on user-centered solutions.
Knowledge graph40 entities Β· 32 connections

How they connect

An interactive map of every person, idea, and reference from this conversation. Hover to trace connections, click to explore.

Hover Β· drag to explore
40 entities
Chapters10 moments

Key Moments

Transcript83 segments

Full Transcript

Topics15 themes

What’s Discussed

Usable SecurityPrivacyPasswordsAuthenticationPasskeysBiometricsDigital IdentityData CollectionTransparencyTrustUser-Centered DesignBehavioral InsightsCISOsSecurity ControlsEncryption
Smart Objects40 Β· 32 links
PeopleΒ· 7
ConceptsΒ· 21
MediasΒ· 2
CompaniesΒ· 3
ProductsΒ· 7