SlideShare uma empresa Scribd logo
1 de 28
CMU Usable Privacy and Security Laboratory
http://cups.cs.cmu.edu/
Anti-Phishing Phil
The Design and Evaluation of a
Game That Teaches People Not to
Fall for Phish
S. Sheng, B. Maginien, P. Kumaraguru,
A. Acquisti, L. Cranor, J. Hong, E. Nunge
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
 Online game
• http://cups.cs.cmu.edu/antiphishing_phil/
 Teaches people how to protect
themselves from phishing attacks
• Identify phishing URLs
• Use web browser cues
• Find legitimate sites with search engines
Anti-Phishing Phil
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Why a game?
 Security is a secondary task
 Learning by doing
 Fun and engaging
 Better strategies
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
More about the game
 Four rounds
• Increasing difficulty
• Two minutes in each round
 Eight URL “worms” in each round
• Four phishing and four legitimate URLs
• Users must correctly identify 6 out of 8 URLs to
advance
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
User Study
 Test participants’ ability to identify phishing web
sites before and after training
• 10 URLs before training, 10 after, randomized
• Up to 15 minutes of training
 Training conditions:
• Web-based phishing education
• Tutorial
• Game
 14 participants in each condition
• Screened out security experts
• Younger, college students
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Falling for Phishing
0.43
0.34
0.12
0.19 0.17
0.38
0
0.1
0.2
0.3
0.4
0.5
Existing training
materials
Tutorial Game
FalseNegativeRate
Pre test
Post test
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Misidentifying Legitimate Sites
0.30
0.27
0.30
0.41
0.21
0.14
0
0.1
0.2
0.3
0.4
0.5
Existing training
material
Tutorial Game
FalsePositiveRate
Pre test
Post test
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Results
 Game group had the best performance
overall
 Game group had fewest false positives
 No significant difference in false negatives
among the three groups
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Field Study
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Study Set-up
 Test participants’ ability to identify phishing web
sites after training and the ability to retain the
knowledge
• 6 URL quiz
 before training, after training, one week later
 Conditions:
• Control
• Game
 Completed training
• 423 in training group
• 292 in control group
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Preliminary Results
31%
60%
92%
75%
81%
93%
0%
20%
40%
60%
80%
100%
Novice Intermediate Expert
Pretest
Post test
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Comments
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Press
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Deployment
 We’ve released Phil under a Creative Commons
non-commercial license
 Over the past few weeks we’ve been contacted
by several banks, retailers, other companies, and
government agencies who are interested in using
Phil in their employee training programs
• Can’t get employees to read security memos, but think
they will be willing to play a game and learn something
 We’re working on setting up a commercial
licensing program, customized versions
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Portuguese Version
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Future Plans
 Analyze field study results to understand
how game can be further improved
 Continue to update game and use data
from public usage to evaluate and improve
 Consider adding new modules to teach
different skills or reinforce skills through
alternate approaches
 Consider special versions for kids, elderly,
specific brands, etc.
• CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
Acknowledgements
 Members of Supporting Trust Decision
research group
 Members of CUPS Lab
CMU Usable Privacy and Security
Laboratory
http://cups.cs.cmu.edu/
Play Anti-Phishing Phil:
http://cups.cs.cmu.edu/antiphishing_phil/

Mais conteúdo relacionado

Semelhante a Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish

Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Jason Hong
 
Your attention please: designing security-decision UIs to make genuine risks ...
Your attention please: designing security-decision UIs to make genuine risks ...Your attention please: designing security-decision UIs to make genuine risks ...
Your attention please: designing security-decision UIs to make genuine risks ...Cristian Bravo-Lillo
 
security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.pptSaba651353
 
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009Jason Hong
 
Technological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.pptTechnological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.pptssuserc4a497
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Jason Hong
 
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Jason Hong
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Test Security
 
INSPIRE Workshop 2014 Slides
INSPIRE Workshop 2014 SlidesINSPIRE Workshop 2014 Slides
INSPIRE Workshop 2014 SlidesINSPIRE_Network
 
10 Testing Myths in an Age of Misinformation (1).pptx
10 Testing Myths in an Age of Misinformation (1).pptx10 Testing Myths in an Age of Misinformation (1).pptx
10 Testing Myths in an Age of Misinformation (1).pptxConor Fitzgerald
 
Methods for academic honesty workshop presentation
Methods for academic honesty workshop presentationMethods for academic honesty workshop presentation
Methods for academic honesty workshop presentationKimberly Jordan Seeber
 
Caveon Webinar Series: Six Security Challenges to Your High Stakes Test Prog...
Caveon Webinar Series:  Six Security Challenges to Your High Stakes Test Prog...Caveon Webinar Series:  Six Security Challenges to Your High Stakes Test Prog...
Caveon Webinar Series: Six Security Challenges to Your High Stakes Test Prog...Caveon Test Security
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Jason Hong
 
Caveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Test Security
 
Foolproof Assessments
Foolproof AssessmentsFoolproof Assessments
Foolproof Assessmentsdaniel.pahlow
 
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...Jason Hong
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseChristopher Beiring
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016Tudor Damian
 

Semelhante a Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish (20)

Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
Phinding Phish: An Evaluation of Anti-Phishing Toolbars, at NDSS 2007
 
Your attention please: designing security-decision UIs to make genuine risks ...
Your attention please: designing security-decision UIs to make genuine risks ...Your attention please: designing security-decision UIs to make genuine risks ...
Your attention please: designing security-decision UIs to make genuine risks ...
 
security and usable.ppt
security and usable.pptsecurity and usable.ppt
security and usable.ppt
 
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
Teaching Johnny not to Fall for Phish, at APWG CeCOS 2009
 
Privacy And Copyrights
Privacy And CopyrightsPrivacy And Copyrights
Privacy And Copyrights
 
social networking .pptx
social networking .pptxsocial networking .pptx
social networking .pptx
 
Technological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.pptTechnological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.ppt
 
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
 
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
 
INSPIRE Workshop 2014 Slides
INSPIRE Workshop 2014 SlidesINSPIRE Workshop 2014 Slides
INSPIRE Workshop 2014 Slides
 
10 Testing Myths in an Age of Misinformation (1).pptx
10 Testing Myths in an Age of Misinformation (1).pptx10 Testing Myths in an Age of Misinformation (1).pptx
10 Testing Myths in an Age of Misinformation (1).pptx
 
Methods for academic honesty workshop presentation
Methods for academic honesty workshop presentationMethods for academic honesty workshop presentation
Methods for academic honesty workshop presentation
 
Caveon Webinar Series: Six Security Challenges to Your High Stakes Test Prog...
Caveon Webinar Series:  Six Security Challenges to Your High Stakes Test Prog...Caveon Webinar Series:  Six Security Challenges to Your High Stakes Test Prog...
Caveon Webinar Series: Six Security Challenges to Your High Stakes Test Prog...
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
Caveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online Proctoring
 
Foolproof Assessments
Foolproof AssessmentsFoolproof Assessments
Foolproof Assessments
 
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
User Interfaces and Algorithms for Fighting Phishing, at Google Tech Talk Jan...
 
Utilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident ResponseUtilizing OSINT in Threat Analytics and Incident Response
Utilizing OSINT in Threat Analytics and Incident Response
 
The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016The state of web applications (in)security @ ITDays 2016
The state of web applications (in)security @ ITDays 2016
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish

  • 1. CMU Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/ Anti-Phishing Phil The Design and Evaluation of a Game That Teaches People Not to Fall for Phish S. Sheng, B. Maginien, P. Kumaraguru, A. Acquisti, L. Cranor, J. Hong, E. Nunge
  • 2. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/  Online game • http://cups.cs.cmu.edu/antiphishing_phil/  Teaches people how to protect themselves from phishing attacks • Identify phishing URLs • Use web browser cues • Find legitimate sites with search engines Anti-Phishing Phil
  • 3. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Why a game?  Security is a secondary task  Learning by doing  Fun and engaging  Better strategies
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ More about the game  Four rounds • Increasing difficulty • Two minutes in each round  Eight URL “worms” in each round • Four phishing and four legitimate URLs • Users must correctly identify 6 out of 8 URLs to advance
  • 11.
  • 12. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ User Study  Test participants’ ability to identify phishing web sites before and after training • 10 URLs before training, 10 after, randomized • Up to 15 minutes of training  Training conditions: • Web-based phishing education • Tutorial • Game  14 participants in each condition • Screened out security experts • Younger, college students
  • 13. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
  • 14. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/
  • 15. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Falling for Phishing 0.43 0.34 0.12 0.19 0.17 0.38 0 0.1 0.2 0.3 0.4 0.5 Existing training materials Tutorial Game FalseNegativeRate Pre test Post test
  • 16. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Misidentifying Legitimate Sites 0.30 0.27 0.30 0.41 0.21 0.14 0 0.1 0.2 0.3 0.4 0.5 Existing training material Tutorial Game FalsePositiveRate Pre test Post test
  • 17. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Results  Game group had the best performance overall  Game group had fewest false positives  No significant difference in false negatives among the three groups
  • 18. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Field Study
  • 19.
  • 20. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Study Set-up  Test participants’ ability to identify phishing web sites after training and the ability to retain the knowledge • 6 URL quiz  before training, after training, one week later  Conditions: • Control • Game  Completed training • 423 in training group • 292 in control group
  • 21. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Preliminary Results 31% 60% 92% 75% 81% 93% 0% 20% 40% 60% 80% 100% Novice Intermediate Expert Pretest Post test
  • 22. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Comments
  • 23. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Press
  • 24. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Deployment  We’ve released Phil under a Creative Commons non-commercial license  Over the past few weeks we’ve been contacted by several banks, retailers, other companies, and government agencies who are interested in using Phil in their employee training programs • Can’t get employees to read security memos, but think they will be willing to play a game and learn something  We’re working on setting up a commercial licensing program, customized versions
  • 25. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Portuguese Version
  • 26. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Future Plans  Analyze field study results to understand how game can be further improved  Continue to update game and use data from public usage to evaluate and improve  Consider adding new modules to teach different skills or reinforce skills through alternate approaches  Consider special versions for kids, elderly, specific brands, etc.
  • 27. • CMU Usable Privacy and Security Laboratory • http://cups.cs.cmu.edu/ Acknowledgements  Members of Supporting Trust Decision research group  Members of CUPS Lab
  • 28. CMU Usable Privacy and Security Laboratory http://cups.cs.cmu.edu/ Play Anti-Phishing Phil: http://cups.cs.cmu.edu/antiphishing_phil/

Notas do Editor

  1. Good afternoon everyone, I am Steve Sheng from Carnegie Mellon University, I am part of the CUPS lab at CMU. Today, I will be talking about some of the work that we did at CUPS lab in order to find solutions to train users about phishing attacks. The work that I will be presenting today was jointly done with Bryant Maginien, Ponguru Kumaragu, Alessandro Acquisti, Lorrie Cranor, Jason Hong and Elizabeth Nunge.
  2. Educating user have some constraints, The first constraint is that security is a secondary task, people are not visiting a website to look at its security features, they go to the website to complete transactions. Another constraint is people like learning by doing, they don’t like to sit down and read training materials. Education is more effective when users learn by doing rather than by learning the classroom instructions.
  3. The scene: is sea, we have a small fish called Phil, her job is to eat all the worms.
  4. So today, Phil swim by a worm, the worm is identified by a URL. A good worm is a legitimate URL, whereas a bad worm is a bait dropped by the phishers.
  5. Phil needs to score 6 / 8 to move on to the next rounds, and the end of the round, phil got a chance to reflect what he missed.
  6. In between rounds, we also have short tutorials to teach Phil better strategies to identify phishing. In this example, Phil’s father teaches Phil how to use a search engine.
  7. STUDY WAS A THINK ALOUD STUDY that lasts 45 - 60 MINS.. WE CAREFULLY RECRUITED NON-EXPERTS USING THREE SPECIFIC QUESTIONS - THE DEIFNITION OF NON EXPERT IS THE SAME AS IN PREVIOUS STUDY THAT I SAID. It aimed at testing the participants’ ability to identify phishing websites. We presented them 10 websites before training, followed by a 15 minute break where users perform one of the three tasks: they read webased phishing education, they read the game tutorial, or they played the game. Users are randomly assigned in each of the conditions. There are fourteen non-expert participants in each condition, for a total of 42 participants.
  8. All of them are statistical significant, there is no statistical difference between them in Either pre test or post test.
  9. There are statistically different.
  10. To summarize, there are -- No significant difference in false negatives among the three groups - Game group performed best in false positives - Game condition performed best in total correctness Effect between the tutorial and the game conditions not statistically significant. The next question we want to answer, is that is the increase in performance due to learning or raising awareness.
  11. http://www.pcworld.com/article/id,137868-c,cybercrime/article.html http://www.news.com/8301-10784_3-9787549-7.html?tag=nefd.only http://www.cbc.ca/technology/story/2007/09/26/phil-phish.html http://www.pcpro.co.uk/news/126386/phishers-caught-hook-line-and-sinker.html http://www.businessweek.com/the_thread/blogspotting/archives/2007/09/play_with_anti-.html