Tuesday, 23 December 2014

Security vs. User Experience


It took me three hours in total to go to my friend’s place and return back. In three hours I actually just spent an hour at her place and rest of the time I was stuck in bad traffic jam; counting cars passing by, observing stalls displayed in the surroundings of commercial site nearby.  It was later revealed that there was a police check post meant for thoroughly investigating every vehicle passing by. It was simply headache. Huh!!  

Traffic jams are not a big deal for us now. We are getting immune to it time by time. But have we ever thought why this measure has been taken? Certainly, to facilitate people and to prevent us from any unfortunate happening. However such physical controls add to user inconvenience.




The point I want to highlight here is that most of the deployed security checks bring user inconvenience. Even for simple administrative tasks, one has to bear the pain of visiting one office to another office taking approval starting from lower hierarchy till he reaches the office of higher authority. The best example to quote here is how we go through clearance thing after graduation.

Let’s come to the cyber world from this physical world. Normally security professionals quote this example… how much thought we put when we key in username and password while making some transaction? Not much; I must say. We look for the easy way and give easy to remember passwords. We trust the service provider and believe that application we are using is safe. However, speaking of the real scenario; the Internet is facing growing security breaches, transaction frauds, information misuse and phishing attacks. Word Wide Web is most vulnerable platform that can put massive amount of personal information in the wrong hands. Internet hackers are using sophisticated tools to find their way into computer systems all over the globe.

Take another example in which you need to choose one from two email services. Service#1 requires you to enter login credentials and check your email. It has clearly labelled tool bar, suggest you different controls and give you customization option in easy to understand language. On the other hand, Service#2 requires you to authenticate yourself and enter CAPTCHA codes after every second. The first service is pleasant from user point of view but the second service provides rational security and keeps valuable information from falling into wrong hands. This is where we need to learn how to balance security with user experience. Most of the application developers overlook user experience while designing applications for users which ultimately end up with security incident. Security professionals should be fully aware of the fact that they should give priority to security but nevertheless they should not keep aside user viability.

There is nothing like 100 percent security. Security needs implementation but with proper management; only in this way one can ensure that security and user experience are working in harmony with each other. Introducing too many controls and permission do no good rather just create poor user experience and loss in number of potential customers. 

The cartoon below illustrate this plain truth in humorous way


How user experience can be aligned with security?

Having realized that there is a trade-off existing between security and user experience; what approach should be followed in order to balance both sides successfully. For most systems, adhering to user experience best practices, principles and guidelines can actually improve their security. The MAKE IT SIMPLE rule gives three easy steps which may align user experience with security requirements


  1.  Reduce: Provide everything that your user needs and nothing more than that. Disclose the important information in progressive manner and don’t throw things at user
  2. Organize:  Suggest structure without enforcing it. e.g. when you login into your Gmail account the user is suggested to submit mobile number but this is additional requirement for security and doesn't enforce 
  3.  Prioritize: Offer the common and important information first


Requesting too much permissions from the user upon authorization create a bad user experience. Establish trust between your users and application. Layered architecture of security is preferred but that again needs to be properly manages keeping user friendly approach.

The art of achieving right proportion between usability and security is still evolving. Users are also getting security aware, and most of them don't mind adding extra layers of security before they can access the personal information. However proper awareness and training need to be done. Users should be trained to accept security checks because they are means of providing them ease. Developer need to realize the fact that adding usability in the application is as important as developing an application and no doubt with little consideration we can ensure that security remains coupled with pleasant user experience.

So What do you think? Please leave your comment below :)

*********************************************************************************
Author: Rabeea Imran

Eve's Plan-D : Sneak a Peak!


Image from SATAN'S SOCK PUPPETS BY
Bro kirk Luehrs

Eve: So now, What's plan-D, Boss!?
Boss:Well, we are going to try phishing! We will have to create a webpage that looks exactly like the bank site!
Eve:Ah Okay. So last time when we hacked facebook passwords, we created a webpage similar to Facebook.This time our target is credit card numbers, so we'll be creating a ditto of the bank's login webpage!
Boss: Right! And then we will send emails to random users asking them to login!
Eve: And they are going to fall for the bait ? !Tut-tut, I wonder when these fools will get some sense and start looking for the sender's complete email ID and the login page's complete URL!
Boss:What would become of us if that starts happening! Stop thinking of it now and get to work. Remember, the fake webpage should have a script that saves all entered credentials onto our system!
Eve: Errr... I have drafted an email, Boss! Take a look!
Image from Wikipedia


















*********************************************************************************
Author: Haleemah Zia



Sarah is phishing-aware now!

Sarah's favourite pastime is reading blogs. Today she has found a new one, titled "Secure and Secure with Ease". It's about securing users on the web. "Wow ! I need to learn this", she says to herself.
Scrolling down the page , she comes across the post "Eve's Plan-D: Sneak a peek". She reads it and finds herself in awe!
So this is how people get deceived. And what's more, she just recalls a recent email she had apparently  received from Facebook. Curious to dig deeper, she opens it up again and clicks on the link provided. The page looks exactly like facebook. But what is the url? Oh!
Screenshot from Techcrunch



"So! I should always check complete URLs whenever entering my login details and complete sender's ID whenever I receive an email", she makes a mental note. "You must never enter your credentials on a page except that which you have opened yourself with the correct URL", says a voice in her head.

"An investment in knowledge pays the best interest" - Benjamin Franklin

*********************************************************************************
Author: Haleemah Zia

Before leaving the scene, clear your desk and your screen!

(*Sarah and Zarmeena working at their office*)
Sarah: "I'm off for lunch"
Zarmeena:*shooting a glance at Sarah's laptop screen* " Okay! I'm coming too . Oh , But wait! You haven't locked your screen. Infact, you haven't even closed all your tabs. What a treasure!"
Sarah:"Oh come on Zarmeena! No body is going to come after my laptop!"
Zarmeena: "Hmm okay! Don't lock the doors of your house either ! "Nobody's going to enter it, right!?"
Sarah: "Okay okay man! Just wait a sec ..."

*********************************************************************************
Author : Haleemah Zia

In God we trust, In all others we Virus Scan!

(Image from webpage: "How to uninstall malware")


*Simpson visits his best friend Joe*

Hey Joe! Whats up!?
Don't ask bro, Down in the dungeons....
Why?What happened.
Well , I was working on my thesis, was almost done...and all of a sudden , I try to access the document but it's no more there on my laptop!
What!? How come ?
Well the last thing I remember doing before this happened is, I opened a link on Facebook that apparently contained some really interesting video leak of a famous politician. I clicked on it but the link was broken. 
That looks like you downloaded some sort of malware! Which antivirus were you using? I told you to always use an updated one!
Ermm...none actually...I was lazy enough not to have installed one :0 plus I didn't really think it was needed.
Well now you know how much it is needed. Give me your laptop. Let us first disinfect it and then we'll try recovering your documents through a file recovery program! And by the way, you should always maintain backups of your work!
Oh ! And apparently I need to be browsing with caution too! I should'nt be clicking on every other link !

*********************************************************************************
Author : Haleemah Zia


Inside Emma's Classroom.......

They were learning about password security today. Emma's attention span was much better now that the topic was of her interest. She couldn't wait to get home and let her siblings know the importance of secure passwords. She started making notes of all that she had to relay.

1)Must never keep dictionary words as passwords. Yes , because they can easily be guessed. Dictionary attacks are possible where an attacker tries random dictionary words as passwords.
Passwords are stored in the form of hashes (which are one-way functions) but an attacker can hash all dictionary words randomly and compare them with the ones stored. So yeah, cross out all dictionary words for passwords.
2)Passwords should be as long and random as possible. "How are we supposed to remember them , then", would be her younger sister's question , she knew. For that , she had a well though-out solution. One could select an easy-to-remember sentence and construct a password from the first alphabets of all words put together.For instance, the famous quotation ,"Always prefer to believe the best of everybody - it saves so much trouble" could be used to form the password  "APTBTBOE-ISSMT"  ". Special characters could be added to make it more random eg "A*TTBOS-ISSMT"
3)Must never write down passwords in order to remember them.
4)Must never keep passwords based on personal information. For example, One's registration number or relative's name should make bad bad passwords.
5)Must never use the same password for multiple accounts.

Yes yes, all this needed to be told...

*********************************************************************************
Author : Haleemah Zia

A secure system is one that does what it's supposed to do , and nothing more" ,John B Ippolito



Imagine the cons of a messy closet. How much time does it take to locate stuff when needed? What happens when an item goes missing? Would it be too late when one realizes it's absence? And what happens if somebody decides to place a stolen item deep inside the mess just so that the owner of the closet gets the blame? The answers are obvious.

The analogy applies to a computer system as well. Saving or installing unnecessary files and applications does nothing except make the PC more vulnerable. Any software package running on a system is prone to be targeted. The fewer the packages available to run, the lesser the risk.

Being a computer user, one must be aware of the security challenges they face. They should clearly identify what's needed in their system and what's not. Previously installed software should be removed once their need is over.
Even while installing a software, the default configuration usually installs some extra packages. Many of them might not be required. One should keep their eyes open while installing any application. Click check only those packages that are required.
If additional packages are needed later they can be installed when required.
It says these days, "80% of cyber attacks can be prevented with basic cyber hygiene" . (National Audit Office, itgovernance.co.uk)

*********************************************************************************
Author: Haleemah Zia