SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
W1
Track Session
4/20/2016 10:00 AM
"Usability vs. Security: Find the
Right Balance in Mobile Apps"
Presented by:
Levent Gurses
Movel
Brought to you by:
340 Corporate Way, Suite 300, Orange Park, FL 32073
888-268-8770 ∙ 904-278-0524 ∙ info@techwell.com ∙ www.techwell.com
Levent Gurses
Movel
A developer, hacker, speaker, community organizer, and entrepreneur, Levent
Gurses is president of Movel, a Washington DC area-based mobile app design
and development company. Levent’s areas of expertise include mobile
development, mobile and cloud security, wearables and Internet of Things (IoT),
mobile user experience, maximizing the value of existing assets for hybrid and
mobile-first apps, startups and strategies for building minimum viable products,
mobile monetization, and enterprise mobility. Actively engaged in mobile and full-
stack development communities, Levent frequently speaks on mobile strategy,
user experience, and security at conferences, meetup groups, and user
communities and associations.
Levent Gurses, Movel
@gursesl
Mobile Dev + Test
2016
● The big idea
● Users will use, hackers will hack
● User experience
● Mobile security
● Wearables and IoT - usability vs. security
● Solution
○ The art
○ The science
● Usability and security do not have to compete
● Good usability can improve security
● What’s needed is more thought and better tools
○ Risk assessment
○ Impact analysis
○ Careful usability design
○ Usability testing
○ Usability & security analytics
● Total Protection →Point Protection
○ ID & secure areas of high risk and impact
● Does data security matter?
● Do users value good app experience?
● Do app store reviews matter?
● Users wouldn't have to authenticate - permanent,
automatic, biometric authentication
● Apps would have all data needed, at all times
● All data would be secure
● Servers would be protected
● No data would be stolen
● Stolen/lost devices
● Jailbreaking
● Rooting
● Man-in-the middle attacks
● Phishing attacks
● Passwords have caused more security issues
than probably any other factor
● Weak/ineffective passwords have caused most
of the hacks in recent years
● Spear phishing campaign can result in
administrator's username and password
● Non-admin user passwords are even harder to
keep track of
● Solution: Make passwords more complex
○ Mix of capital letters
○ Lowercase and alpha
○ Min length
● Drawbacks
○ 70% of users forget a password if too long and/or complex. (Source: Ponemon
Institute)
○ 90% of users would just leave a site if they have forgotten a password, instead
of recovering it. (Source: Janrain)
○ 40% of respondents at least sometimes, or often, write passwords down
(Source: Berkeley University Study)
○ 7.9 - number of unique passwords for an average user (Source: Janrain)
Most passwords are not strong enough: users tend to choose
meaningful, natural language words that they can remember
However, overzealous password rules can be annoying.
Password for the DHS E-file:
● Contain from 8 to 16 characters
● Contain at least 2 of the following 3 characters: uppercase alphabetic, lowercase
alphabetic, numeric
● Contain at least 1 special character (e.g., @, #, $, %, & *, +, =)
● Begin and end with an alphabetic character
● Not contain spaces
● Not contain all or part of your UserID
● Not use 2 identical characters consecutively
● Not be a recently used password
● Biometrics
○ Fingerprints
○ Iris recognition
○ Facial recognition
○ Voice recognition
● Tokens
○ Physical
○ Software
●
●
● Better user engagement
● More secure apps
● Better reviews in the app store, which leads to
○ Increased sales in the app store
○ Brand value
● Better compliance
● Solid user and community growth
A threat model focuses on the
intersection of likely attack vectors
with the points of human interaction.
The resulting area provides the
surface to what needs to be monitored
for user behavior and assessed for
vulnerabilities.
● User engagement - before & after sign up
● Drops in sign ups
● Password/PIN issues
● Forgot my password
● Response times to auth
● Usage of biometric devices
●
●
●
●
●
●
●
●
○
○
○
○
○
○
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● App authentication
● API authentication
● App authorization
● API authorization
● Cookie management
● Data/Input validation
● Encryption
● Local storage
● Error Handling/Information leakage
● Logging/Auditing
● Secure transport
● Certificate/key management
● Secure Code Environment
● Session Management
● Create UX metrics - e.g. sign up dropout rate
● Create A/B split tests
● Use app analytics to monitor user behavior
● Discover the balance point between security and usability
● Usability and security can coexist
● True security is an outcome of great user experience
● Cross-functional teams are key
● Model, measure, tweak.
● Repeat.
Resources
● http://www.movel.co
● http://www.movel.co/company/events
● http://www.ponemon.org/local/upload/file/NokNokWP_FINAL_3.pdf
● https://www.owasp.org/index.php/Application_Threat_Modeling
● http://passwordresearch.com/stats/statistic101.html
● http://www1.janrain.com/rs/janrain/images/Industry-Research-Consumer-
Perceptions-of-Online-Registration-and-Social-Login-2012.pdf

Mais conteúdo relacionado

Mais procurados

Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting Sina Manavi
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Sina Manavi
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacycdunk12
 
Addressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using XamarinAddressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using XamarinAlec Tucker
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceNowSecure
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsNowSecure
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A ReviewUmang Singh
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowNowSecure
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication schemeLeMeniz Infotech
 

Mais procurados (20)

Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
Android Application Security Awareness Talk, OWASP MEETUP Q3, 2015
 
Hacking Mobile Apps
Hacking Mobile AppsHacking Mobile Apps
Hacking Mobile Apps
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Cyber security
Cyber securityCyber security
Cyber security
 
Addressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using XamarinAddressing the OWASP Mobile Security Threats using Xamarin
Addressing the OWASP Mobile Security Threats using Xamarin
 
Mobile phone Data Hacking
Mobile phone Data HackingMobile phone Data Hacking
Mobile phone Data Hacking
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A Review
 
Leaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to KnowLeaky Mobile Apps: What You Need to Know
Leaky Mobile Apps: What You Need to Know
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 

Destaque

Presentation skills
Presentation skillsPresentation skills
Presentation skillsSatish Yadav
 
Dch Know Who
Dch Know WhoDch Know Who
Dch Know Whoesviro
 
Bases Tecnicas Bombas
Bases Tecnicas BombasBases Tecnicas Bombas
Bases Tecnicas Bombasluixdivx
 
ข่าวการศึกษา (สพฐ.) วันที่ 12 ม.ค.60
ข่าวการศึกษา (สพฐ.) วันที่ 12 ม.ค.60ข่าวการศึกษา (สพฐ.) วันที่ 12 ม.ค.60
ข่าวการศึกษา (สพฐ.) วันที่ 12 ม.ค.60PR OBEC
 
Mi Contexto de Formación Estacion 2 Evelin Hurtado
Mi Contexto de Formación Estacion 2 Evelin HurtadoMi Contexto de Formación Estacion 2 Evelin Hurtado
Mi Contexto de Formación Estacion 2 Evelin Hurtadojabaldiris
 
Caravillani lezione 3
Caravillani lezione 3Caravillani lezione 3
Caravillani lezione 3Anna Fetta
 
Testes O que são e para que servem? - LadyTalks
Testes O que são e para que servem? - LadyTalksTestes O que são e para que servem? - LadyTalks
Testes O que são e para que servem? - LadyTalksDiana Ungaro Arnos
 
Informe estadístico del comercio exterior de Brasil 2011 - 2015
Informe estadístico del comercio exterior de Brasil 2011 - 2015Informe estadístico del comercio exterior de Brasil 2011 - 2015
Informe estadístico del comercio exterior de Brasil 2011 - 2015Diario del Exportador
 
Introduction to Java 8
Introduction to Java 8Introduction to Java 8
Introduction to Java 8Knoldus Inc.
 
Agefac présentation
Agefac présentationAgefac présentation
Agefac présentationSarah Instar
 

Destaque (18)

Presenta murcia
Presenta murciaPresenta murcia
Presenta murcia
 
Un dia de supermercado
Un dia de supermercadoUn dia de supermercado
Un dia de supermercado
 
Presentation skills
Presentation skillsPresentation skills
Presentation skills
 
Dch Know Who
Dch Know WhoDch Know Who
Dch Know Who
 
Cinema na escola
Cinema na escolaCinema na escola
Cinema na escola
 
Bases Tecnicas Bombas
Bases Tecnicas BombasBases Tecnicas Bombas
Bases Tecnicas Bombas
 
Virus 130109070414-phpapp02
Virus 130109070414-phpapp02Virus 130109070414-phpapp02
Virus 130109070414-phpapp02
 
PHP e Redis
PHP e RedisPHP e Redis
PHP e Redis
 
ข่าวการศึกษา (สพฐ.) วันที่ 12 ม.ค.60
ข่าวการศึกษา (สพฐ.) วันที่ 12 ม.ค.60ข่าวการศึกษา (สพฐ.) วันที่ 12 ม.ค.60
ข่าวการศึกษา (สพฐ.) วันที่ 12 ม.ค.60
 
Mi Contexto de Formación Estacion 2 Evelin Hurtado
Mi Contexto de Formación Estacion 2 Evelin HurtadoMi Contexto de Formación Estacion 2 Evelin Hurtado
Mi Contexto de Formación Estacion 2 Evelin Hurtado
 
Caravillani lezione 3
Caravillani lezione 3Caravillani lezione 3
Caravillani lezione 3
 
Workshop Advance CSS3 animation
Workshop Advance CSS3 animationWorkshop Advance CSS3 animation
Workshop Advance CSS3 animation
 
Testes O que são e para que servem? - LadyTalks
Testes O que são e para que servem? - LadyTalksTestes O que são e para que servem? - LadyTalks
Testes O que são e para que servem? - LadyTalks
 
Ui live資料
Ui live資料Ui live資料
Ui live資料
 
Informe estadístico del comercio exterior de Brasil 2011 - 2015
Informe estadístico del comercio exterior de Brasil 2011 - 2015Informe estadístico del comercio exterior de Brasil 2011 - 2015
Informe estadístico del comercio exterior de Brasil 2011 - 2015
 
Introduction to Java 8
Introduction to Java 8Introduction to Java 8
Introduction to Java 8
 
Da
DaDa
Da
 
Agefac présentation
Agefac présentationAgefac présentation
Agefac présentation
 

Semelhante a Mobile App Usability vs Security Balance

The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of SecurityRandy Earl
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesSkycure
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...ADEIJ Journal
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)Artur Barseghyan
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market TrendsForgeRock
 
UX Workshop: How to design a product with great user experience
UX Workshop: How to design a product with great user experienceUX Workshop: How to design a product with great user experience
UX Workshop: How to design a product with great user experienceRaj Lal
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Techugo
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017TecsyntSolutions
 
Securing the Cloud for a Connected Society
Securing the Cloud for a Connected SocietySecuring the Cloud for a Connected Society
Securing the Cloud for a Connected SocietyCOMPUTEX TAIPEI
 
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...madhuri871014
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2Conf
 

Semelhante a Mobile App Usability vs Security Balance (20)

The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
 
Smartphones' Security
Smartphones' SecuritySmartphones' Security
Smartphones' Security
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
 
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
A Novel Passwordless Authentication Scheme for Smart Phones Using Elliptic Cu...
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
UX Workshop: How to design a product with great user experience
UX Workshop: How to design a product with great user experienceUX Workshop: How to design a product with great user experience
UX Workshop: How to design a product with great user experience
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.Top Practices You Need To Develop Secure Mobile Apps.
Top Practices You Need To Develop Secure Mobile Apps.
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
Securing the Cloud for a Connected Society
Securing the Cloud for a Connected SocietySecuring the Cloud for a Connected Society
Securing the Cloud for a Connected Society
 
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
Mobile App Security How Bahrain Development Companies Ensure Protection.edite...
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
Internet 2.0 Reviews The Future Of Software Development: Trends In AI, Cloud ...
 

Mais de Movel

The Art of the Minimum Viable Product (MVP)
The Art of the Minimum Viable Product (MVP)The Art of the Minimum Viable Product (MVP)
The Art of the Minimum Viable Product (MVP)Movel
 
Trends in Mobile FinTech
Trends in Mobile FinTechTrends in Mobile FinTech
Trends in Mobile FinTechMovel
 
Cross-Functional Teams: A Product Manager's Nirvana
Cross-Functional Teams: A Product Manager's NirvanaCross-Functional Teams: A Product Manager's Nirvana
Cross-Functional Teams: A Product Manager's NirvanaMovel
 
Continuous Delivery for Cross-Platform Mobile Apps
Continuous Delivery for Cross-Platform Mobile AppsContinuous Delivery for Cross-Platform Mobile Apps
Continuous Delivery for Cross-Platform Mobile AppsMovel
 
Extreme Swift
Extreme SwiftExtreme Swift
Extreme SwiftMovel
 
Scaling AngularJS: Enterprise SOA on the MEAN Stack (Responsive Web & Mobile)
Scaling AngularJS: Enterprise SOA on the MEAN Stack (Responsive Web & Mobile)Scaling AngularJS: Enterprise SOA on the MEAN Stack (Responsive Web & Mobile)
Scaling AngularJS: Enterprise SOA on the MEAN Stack (Responsive Web & Mobile)Movel
 
Functional Prototyping For Mobile Apps
Functional Prototyping For Mobile AppsFunctional Prototyping For Mobile Apps
Functional Prototyping For Mobile AppsMovel
 
Cross-Platform Mobile Development with Ionic Framework and Angular
Cross-Platform Mobile Development with Ionic Framework and AngularCross-Platform Mobile Development with Ionic Framework and Angular
Cross-Platform Mobile Development with Ionic Framework and AngularMovel
 
Introduction to ES6 with Tommy Cresine
Introduction to ES6 with Tommy CresineIntroduction to ES6 with Tommy Cresine
Introduction to ES6 with Tommy CresineMovel
 

Mais de Movel (9)

The Art of the Minimum Viable Product (MVP)
The Art of the Minimum Viable Product (MVP)The Art of the Minimum Viable Product (MVP)
The Art of the Minimum Viable Product (MVP)
 
Trends in Mobile FinTech
Trends in Mobile FinTechTrends in Mobile FinTech
Trends in Mobile FinTech
 
Cross-Functional Teams: A Product Manager's Nirvana
Cross-Functional Teams: A Product Manager's NirvanaCross-Functional Teams: A Product Manager's Nirvana
Cross-Functional Teams: A Product Manager's Nirvana
 
Continuous Delivery for Cross-Platform Mobile Apps
Continuous Delivery for Cross-Platform Mobile AppsContinuous Delivery for Cross-Platform Mobile Apps
Continuous Delivery for Cross-Platform Mobile Apps
 
Extreme Swift
Extreme SwiftExtreme Swift
Extreme Swift
 
Scaling AngularJS: Enterprise SOA on the MEAN Stack (Responsive Web & Mobile)
Scaling AngularJS: Enterprise SOA on the MEAN Stack (Responsive Web & Mobile)Scaling AngularJS: Enterprise SOA on the MEAN Stack (Responsive Web & Mobile)
Scaling AngularJS: Enterprise SOA on the MEAN Stack (Responsive Web & Mobile)
 
Functional Prototyping For Mobile Apps
Functional Prototyping For Mobile AppsFunctional Prototyping For Mobile Apps
Functional Prototyping For Mobile Apps
 
Cross-Platform Mobile Development with Ionic Framework and Angular
Cross-Platform Mobile Development with Ionic Framework and AngularCross-Platform Mobile Development with Ionic Framework and Angular
Cross-Platform Mobile Development with Ionic Framework and Angular
 
Introduction to ES6 with Tommy Cresine
Introduction to ES6 with Tommy CresineIntroduction to ES6 with Tommy Cresine
Introduction to ES6 with Tommy Cresine
 

Mobile App Usability vs Security Balance

  • 1. W1 Track Session 4/20/2016 10:00 AM "Usability vs. Security: Find the Right Balance in Mobile Apps" Presented by: Levent Gurses Movel Brought to you by: 340 Corporate Way, Suite 300, Orange Park, FL 32073 888-268-8770 ∙ 904-278-0524 ∙ info@techwell.com ∙ www.techwell.com
  • 2. Levent Gurses Movel A developer, hacker, speaker, community organizer, and entrepreneur, Levent Gurses is president of Movel, a Washington DC area-based mobile app design and development company. Levent’s areas of expertise include mobile development, mobile and cloud security, wearables and Internet of Things (IoT), mobile user experience, maximizing the value of existing assets for hybrid and mobile-first apps, startups and strategies for building minimum viable products, mobile monetization, and enterprise mobility. Actively engaged in mobile and full- stack development communities, Levent frequently speaks on mobile strategy, user experience, and security at conferences, meetup groups, and user communities and associations.
  • 3. Levent Gurses, Movel @gursesl Mobile Dev + Test 2016 ● The big idea ● Users will use, hackers will hack ● User experience ● Mobile security ● Wearables and IoT - usability vs. security ● Solution ○ The art ○ The science
  • 4.
  • 5.
  • 6. ● Usability and security do not have to compete ● Good usability can improve security ● What’s needed is more thought and better tools ○ Risk assessment ○ Impact analysis ○ Careful usability design ○ Usability testing ○ Usability & security analytics ● Total Protection →Point Protection ○ ID & secure areas of high risk and impact
  • 7. ● Does data security matter? ● Do users value good app experience? ● Do app store reviews matter?
  • 8.
  • 9.
  • 10. ● Users wouldn't have to authenticate - permanent, automatic, biometric authentication ● Apps would have all data needed, at all times ● All data would be secure ● Servers would be protected ● No data would be stolen ● Stolen/lost devices ● Jailbreaking ● Rooting ● Man-in-the middle attacks ● Phishing attacks
  • 11. ● Passwords have caused more security issues than probably any other factor ● Weak/ineffective passwords have caused most of the hacks in recent years ● Spear phishing campaign can result in administrator's username and password ● Non-admin user passwords are even harder to keep track of ● Solution: Make passwords more complex ○ Mix of capital letters ○ Lowercase and alpha ○ Min length ● Drawbacks ○ 70% of users forget a password if too long and/or complex. (Source: Ponemon Institute) ○ 90% of users would just leave a site if they have forgotten a password, instead of recovering it. (Source: Janrain) ○ 40% of respondents at least sometimes, or often, write passwords down (Source: Berkeley University Study) ○ 7.9 - number of unique passwords for an average user (Source: Janrain)
  • 12. Most passwords are not strong enough: users tend to choose meaningful, natural language words that they can remember However, overzealous password rules can be annoying. Password for the DHS E-file: ● Contain from 8 to 16 characters ● Contain at least 2 of the following 3 characters: uppercase alphabetic, lowercase alphabetic, numeric ● Contain at least 1 special character (e.g., @, #, $, %, & *, +, =) ● Begin and end with an alphabetic character ● Not contain spaces ● Not contain all or part of your UserID ● Not use 2 identical characters consecutively ● Not be a recently used password
  • 13. ● Biometrics ○ Fingerprints ○ Iris recognition ○ Facial recognition ○ Voice recognition ● Tokens ○ Physical ○ Software
  • 14. ● ● ● Better user engagement ● More secure apps ● Better reviews in the app store, which leads to ○ Increased sales in the app store ○ Brand value ● Better compliance ● Solid user and community growth
  • 15. A threat model focuses on the intersection of likely attack vectors with the points of human interaction. The resulting area provides the surface to what needs to be monitored for user behavior and assessed for vulnerabilities.
  • 16. ● User engagement - before & after sign up ● Drops in sign ups ● Password/PIN issues ● Forgot my password ● Response times to auth ● Usage of biometric devices ● ● ● ● ●
  • 22. ● App authentication ● API authentication ● App authorization ● API authorization ● Cookie management ● Data/Input validation ● Encryption ● Local storage ● Error Handling/Information leakage ● Logging/Auditing ● Secure transport ● Certificate/key management ● Secure Code Environment ● Session Management
  • 23. ● Create UX metrics - e.g. sign up dropout rate ● Create A/B split tests ● Use app analytics to monitor user behavior ● Discover the balance point between security and usability ● Usability and security can coexist ● True security is an outcome of great user experience ● Cross-functional teams are key ● Model, measure, tweak. ● Repeat.
  • 24. Resources ● http://www.movel.co ● http://www.movel.co/company/events ● http://www.ponemon.org/local/upload/file/NokNokWP_FINAL_3.pdf ● https://www.owasp.org/index.php/Application_Threat_Modeling ● http://passwordresearch.com/stats/statistic101.html ● http://www1.janrain.com/rs/janrain/images/Industry-Research-Consumer- Perceptions-of-Online-Registration-and-Social-Login-2012.pdf