SlideShare uma empresa Scribd logo
1 de 67
@jwgoerlich
Design Nudge
and
Sludge
@jwgoerlich
J Wolfgang Goerlich
Advisory CISO @ Cisco Secure
WGoerlic@Cisco.com
https://jwgoerlich.com
Twitter: @jwgoerlich
Wolf@JWGoerlich.com
Hi. I’m Wolf.
@jwgoerlich
Intentionally or
accidentally, we
create experiences.
How can we design
a better experience?
@jwgoerlich
@jwgoerlich
Predictability of each
choice
Number of
steps
Number of choices
Familiarity of each step
Friction at each
step
Cognitive load at each choice
Paths They Take
Choices They Make
@jwgoerlich
Affordances
Nudges
Sludge
“
@jwgoerlich
Affordance is what the environment
offers the individual.
– James J. Gibson
“
@jwgoerlich
Nudge was written as an alternative
to rules and mandates.
– Richard Thaler
@jwgoerlich
Sludge: when people face high
levels of friction obstructing
their efforts to get work done
“
@jwgoerlich
Friction and bad intentions.
– Richard Thaler
@jwgoerlich
Process analysis
Journey mapping
Behavior mapping
Wayfinding
Look at the paths they take
@jwgoerlich
what we build Nudge
and
Sludge
@jwgoerlich
Affordances
@jwgoerlich
@jwgoerlich
Epic Games
unlocks the Boogie
Down emote for
turning on 2FA.
@jwgoerlich
Content Warning:
Many of my examples will be
authentication and authorization. Please
expand these concepts to your area of
security.
@jwgoerlich
Cognitive, physical, sensory, and functional affordances in interaction design. BIT 22(5) (pp.315-338)
@jwgoerlich
😕 🙁 ☹️
Emotional Affordances
@jwgoerlich
X
✓ X ✓
Physical Affordance Cognitive Affordance
@jwgoerlich
Nudges
@jwgoerlich https://thegeekpage.com/chrome-sync-is-paused/
Indicating
something is amiss
without interrupting
user tasks.
@jwgoerlich
Nudge Towards More Security
Bank of America, November 2021
@jwgoerlich
Sludge
@jwgoerlich
Multi-Factor Authentication (MFA)
Single Sign-On (SSO)
Security & Privacy Settings *everywhere*
@jwgoerlich
For example
@jwgoerlich
The features we give our users are the exploits we give our attackers.
@jwgoerlich
@jwgoerlich
What path are the criminals taking?
What are the steps along that path?
What choices are they making?
What choices are they NOT making?
Starting Questions
@jwgoerlich
@jwgoerlich
Investigate and manually block suspicious accounts
Enhance the credit card approval logic
Block certain telephone numbers
Add controls to the signup to limit mass signups
Not on the Users’ Path
@jwgoerlich
Limit the number of calls for trial accounts
Geo-fencing to block countries
Credit card statement validation
On the Users’ Path
@jwgoerlich
Good security is applied along the paths and choices users and
adversaries make.
@jwgoerlich
how we build Nudge
and
Sludge
@jwgoerlich
Apply UX to securing DevOps.
@jwgoerlich
Let’s look at the paths they take.
@jwgoerlich
DevOps Path
@jwgoerlich
@jwgoerlich
Adversary Path
Deliver Exploit Control Execute Maintain
Command & Control
Exfiltration
Discovery
Lateral Movement
Collection
Privileged
Escalation
Defense Evasion
Credential Access
Initial Access
Execution
Persistence
Lockheed Martin Cyber Kill Chain
Mitre Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)
@jwgoerlich
@jwgoerlich
Good security gets out of the way of developers and gets in the way
of adversaries.
@jwgoerlich
Affordances
@jwgoerlich
People writing down passwords is a
creative cognitive affordance.
@jwgoerlich
Role-Based Access Control (RBAC)
Just In Time Access (JIT)
Updated images and packages
@jwgoerlich
Functional
Emotional
Cognitive
Physical
Sensory
Functional
Emotional
Cognitive
Physical
Sensory
Needs Affordances
Developers Security
Design
DevOps
∞
@jwgoerlich
Constrained users are creative, and creative users are dangerous.
@jwgoerlich
Nudges
@jwgoerlich
DevOps but Securely
Design Review
Code Review
Code Inventory
Asset Inventory
DAST
IAST
SCA
Change Monitoring
FIM
Vulnerability Management
RASP
WAF
Container Monitoring
Cloud Monitoring
SAST
@jwgoerlich
Sludge
@jwgoerlich
Security: SCAN ALL THE
THINGS.
Developers…
@jwgoerlich
“
@jwgoerlich
Friction and bad intentions.
– Richard Thaler
@jwgoerlich
@jwgoerlich
@jwgoerlich
Good friction is the natural consequence of poor security behaviors.
@jwgoerlich
Reducing sludge
doesn’t always
mean reducing
steps.
@jwgoerlich
Bad friction is determined by perceived friction, not just actual
friction.
@jwgoerlich
Measure compliance rates, BUT ALSO
Measure process and communication sludge
Trudging Through Sludge
Source: Seeing Sludge:Towards a Dashboard to Help Organizations Recognize
Impedance to End-User Decisions and Action
@jwgoerlich
Good security is as little security as
possible.
@jwgoerlich
Nudge
and
Sludge
@jwgoerlich
@jwgoerlich
Predictability of each
choice
Number of
steps
Number of choices
Familiarity of each step
Friction at each
step
Cognitive load at each choice
Paths They Take
Choices They Make
@jwgoerlich
@jwgoerlich
Users and Developers
Behavior or journey maps
BSIMM
Reduce steps
Reduce choices
Simplify
Clarify
Criminals
Threat model or attack path
Mitre ATT&CK
Increase steps
Increase choices
Complicate
Confound
How to Apply this Model?
@jwgoerlich
One final example
@jwgoerlich
Zero Trust for the Workforce
(Data Plane)
Policy Administration
Policy Engine
Trust Inference
@jwgoerlich
To enter Israel, I need a negative Covid Test
… which means I need my PCR test results
... which means I need my password manager
... which sees I’m traveling
… and therefore prompts to login
… which requires MFA
… which in turn sees my MacBook needs an update
… which begins downloading over a hotel Wi-Fi
@jwgoerlich
@jwgoerlich
Good security is a design problem.
And like any design problem, it will take many iterations to get right.
@jwgoerlich
Thank You!
J Wolfgang Goerlich
Advisory CISO @ Cisco Secure
WGoerlic@Cisco.com
https://jwgoerlich.com
Twitter: @jwgoerlich
Wolf@JWGoerlich.com

Mais conteúdo relacionado

Semelhante a NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo Security by Cisco

ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020 ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020
Aaron Rinehart
 

Semelhante a NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo Security by Cisco (20)

Epistemological Problem of Application Security
Epistemological Problem of Application SecurityEpistemological Problem of Application Security
Epistemological Problem of Application Security
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Trusting Your Ingredients - What Building Software And Cheesecake Have In Common
Trusting Your Ingredients - What Building Software And Cheesecake Have In CommonTrusting Your Ingredients - What Building Software And Cheesecake Have In Common
Trusting Your Ingredients - What Building Software And Cheesecake Have In Common
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
 
How to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application SecurityHow to Effect Change in the Epistemological Wasteland of Application Security
How to Effect Change in the Epistemological Wasteland of Application Security
 
In search of unique behaviour
In search of unique behaviourIn search of unique behaviour
In search of unique behaviour
 
The Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CDThe Emergent Cloud Security Toolchain for CI/CD
The Emergent Cloud Security Toolchain for CI/CD
 
Visual Design and Architecture
Visual Design and ArchitectureVisual Design and Architecture
Visual Design and Architecture
 
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer RigginsHow to Build Your Future in the Internet of Things Economy. Jennifer Riggins
How to Build Your Future in the Internet of Things Economy. Jennifer Riggins
 
Qcon london2012 recap
Qcon london2012 recapQcon london2012 recap
Qcon london2012 recap
 
The New Agile
The New AgileThe New Agile
The New Agile
 
Understanding Technical Debt: A Primer for Product Owners and Founders
Understanding Technical Debt: A Primer for Product Owners and FoundersUnderstanding Technical Debt: A Primer for Product Owners and Founders
Understanding Technical Debt: A Primer for Product Owners and Founders
 
103 Understanding Technical Debt
103 Understanding Technical Debt103 Understanding Technical Debt
103 Understanding Technical Debt
 
ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020 ADDO - Navigating the DevSecOps App-ocalypse 2020
ADDO - Navigating the DevSecOps App-ocalypse 2020
 
Vulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructureVulnerabilities of machine learning infrastructure
Vulnerabilities of machine learning infrastructure
 
The DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD PipelineThe DevSecOps Builder’s Guide to the CI/CD Pipeline
The DevSecOps Builder’s Guide to the CI/CD Pipeline
 
DevOps & Security from an Enterprise Toolsmith's Perspective
DevOps & Security from an Enterprise Toolsmith's PerspectiveDevOps & Security from an Enterprise Toolsmith's Perspective
DevOps & Security from an Enterprise Toolsmith's Perspective
 
Application Security Epistemology in a Continuous Delivery World
Application Security Epistemology in a Continuous Delivery WorldApplication Security Epistemology in a Continuous Delivery World
Application Security Epistemology in a Continuous Delivery World
 
Rocking the microservice world with Helidon-LAOUCTour2023.pdf
Rocking the microservice world with Helidon-LAOUCTour2023.pdfRocking the microservice world with Helidon-LAOUCTour2023.pdf
Rocking the microservice world with Helidon-LAOUCTour2023.pdf
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering
 

Mais de DevOpsDays Tel Aviv

THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider SecurityTHE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
DevOpsDays Tel Aviv
 
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearBHOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
DevOpsDays Tel Aviv
 
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, FireflyDON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DevOpsDays Tel Aviv
 

Mais de DevOpsDays Tel Aviv (20)

YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
YOUR OPEN SOURCE PROJECT IS LIKE A STARTUP, TREAT IT LIKE ONE, EYAR ZILBERMAN...
 
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, SaltoGRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
GRAPHQL TO THE RES(T)CUE, ELLA SHARAKANSKI, Salto
 
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
MICROSERVICES ABOVE THE CLOUD - DESIGNING THE INTERNATIONAL SPACE STATION FOR...
 
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
THE (IR)RATIONAL INCIDENT RESPONSE: HOW PSYCHOLOGICAL BIASES AFFECT INCIDENT ...
 
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDogPRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
PRINCIPLES OF OBSERVABILITY // DANIEL MAHER, DataDog
 
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
(Ignite) TAKE A HIKE: PREVENTING BATTERY CORROSION - LEAH VOGEL, CHEGG
 
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
BUILDING A DR PLAN FOR YOUR CLOUD INFRASTRUCTURE FROM THE GROUND UP, MOSHE BE...
 
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider SecurityTHE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
THE THREE DISCIPLINES OF CI/CD SECURITY, DANIEL KRIVELEVICH, Cider Security
 
THE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABELTHE PLEASURES OF ON-PREM, TOMER GABEL
THE PLEASURES OF ON-PREM, TOMER GABEL
 
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPackCONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
CONFIGURATION MANAGEMENT IN THE CLOUD NATIVE ERA, SHAHAR MINTZ, EggPack
 
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, DeveleapSOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
SOLVING THE DEVOPS CRISIS, ONE PERSON AT A TIME, CHRISTINA BABITSKI, Develeap
 
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
OPTIMIZING PERFORMANCE USING CONTINUOUS PRODUCTION PROFILING ,YONATAN GOLDSCH...
 
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKHHOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
HOW TO SCALE YOUR ONCALL OPERATION, AND SURVIVE TO TELL, ANTON DRUKH
 
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearBHOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
HOW TO OPTIMIZE NON-CODING TIME, ORI KEREN, LinearB
 
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, IcingaFLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
FLYING BLIND - ACCESSIBILITY IN MONITORING, FEU MOUREK, Icinga
 
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
(Ignite) WHAT'S BURNING THROUGH YOUR CLOUD BILL - GIL BAHAT, CIDER SECURITY
 
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.ioSLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
SLO DRIVEN DEVELOPMENT, ALON NATIV, Tomorrow.io
 
ONBOARDING IN LOCKDOWN, HILA FOX, Augury
ONBOARDING IN LOCKDOWN, HILA FOX, AuguryONBOARDING IN LOCKDOWN, HILA FOX, Augury
ONBOARDING IN LOCKDOWN, HILA FOX, Augury
 
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, FireflyDON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
DON'T PANIC: GETTING YOUR INFRASTRUCTURE DRIFT UNDER CONTROL, ERAN BIBI, Firefly
 
KEYNOTE | WHAT'S COMING IN THE NEXT 10 YEARS OF DEVOPS? // ELLEN CHISA, bolds...
KEYNOTE | WHAT'S COMING IN THE NEXT 10 YEARS OF DEVOPS? // ELLEN CHISA, bolds...KEYNOTE | WHAT'S COMING IN THE NEXT 10 YEARS OF DEVOPS? // ELLEN CHISA, bolds...
KEYNOTE | WHAT'S COMING IN THE NEXT 10 YEARS OF DEVOPS? // ELLEN CHISA, bolds...
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo Security by Cisco

Notas do Editor

  1. Nudge and Sludge: Driving Security with Design DevOpsDays Tel Aviv with Cloud Native & OSS Day & StatsCraft
  2. Royalty-free stock photo ID: 458236126 Garden Brick Pathway Paving by Professional Paver Worker. By welcomia https://www.shutterstock.com/image-photo/garden-brick-pathway-paving-by-professional-458236126
  3. https://www.youtube.com/watch?v=KYuaKMrquYQ&ab_channel=TheUniversityofChicagoBoothSchoolofBusiness
  4. Duo story about where people begin on the app restore process.
  5. Nudge and Sludge: Driving Security with Design DevOpsDays Tel Aviv with Cloud Native & OSS Day & StatsCraft
  6. Stockholm, Sweden. “The interactive staircase persuaded 66% more people than normal chose to use the staircase instead of the escalator.” https://sites.psu.edu/siowfa15/2015/09/16/the-fun-theory/
  7. https://www.epicgames.com/help/en-US/epic-accounts-c74/account-security-c112/what-rewards-do-i-get-for-enabling-twofactor-authentication-2fa-on-my-epic-games-account-a4443
  8. Hartson’s taxonomy of affordances https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.499.252&rep=rep1&type=pdf
  9. Duo story about different frowning faces leading to different responses in unpatched software.
  10. Physical affordances – I know where the buttons are and I’ve built muscle memory. Power users. Cognitive affordances – The buttons are where I’d expect based on other apps. New users.
  11. Mention doing an analysis of e-commerce MFA and finding almost no support for anything other than SMS. Mention http://sso.tax/ or the SSO wall of shame.
  12. https://www.pexels.com/photo/antique-communication-phone-museum-35886/ Long distance calls are expensive. Shady Telco’s asked: What if we could have people generate long distance calls to increase revenue? Scammers asked: What if I could generate long distance calls and get a kickback from the telco’s? Shady Telco’s stand up premium numbers that scammers direct traffic to for a kickback.
  13. Wayfinding: What path are the criminals taking? Wayfinding – cognitive load: What are the steps along that path? Choice architecture – choice cost: What choices are they making? Choice architecture – defaults: What choices are they NOT making? Path: Scammer establishes trial account with stolen credit card. Scammer registers the shady telco’s premium number as second factor. Scammer performs authentication to place the phone call. Shady telco charges for the call, provides kick-back to scammer. PROFIT!!! Choices: API or headless browser Specific IP addresses - country of origin Specific telephone numbers
  14. Image by Janine Bolon from Pixabay  Balance usability with defensibility using design.
  15. Nudge and Sludge: Driving Security with Design DevOpsDays Tel Aviv with Cloud Native & OSS Day & StatsCraft
  16. Initial Access Execution Persistence
  17. Seek out user-driven cognitive affordances. This is people’s way of trying to fix an underlying design issue. Here, it’s the lack of password manager or password vault.
  18. Tell the story about trying to update production APX when you were at Munder Capital. Give the example of Merrill’s on-call people having prod access only when on-call.
  19. Security depends upon how well the needs of the developer are met by the affordances of the security controls. If they don’t meet, developers will creatively satisfy their own needs with their own affordances. From: Affordances as an alliance to design https://www.udemy.com/course/affordances/learn/lecture/637602#overview
  20. Excessive error messages and reports and tickets, what Richard Thaler calls “useless clutter” sludge. Can Stock Photo, Wolf’s license Order 6379855
  21. “Think Better” with Richard Thaler https://youtu.be/KYuaKMrquYQ?t=1006
  22. https://en.wikipedia.org/wiki/Rumble_strip#/media/File:North_Luzon_Expressway_Rumble_Strips.jpg
  23. Friction is the metaphor of rumble strips on highways. Completely out of the way for most of the time. Only kick in when drivers go off track, hopefully to prevent car crashes. Highway https://www.flickr.com/photos/kenlund/14467590123 Rumble Strip http://asphaltmagazine.com/rumble-strips-keep-drivers-on-the-road/ Car crash https://commons.wikimedia.org/wiki/File:Car_crash_1.jpg
  24. Master Class added steps to the sign-up process. This should have resulted in more sludge. “What Master Class found, however, was a substantial increase in subscriptions, which is potentially attributable to the idea that even though the number of steps increased, the perceived level of “ask” on each step was reduced.”
  25. Soman, Dilip and Cowen, Daniel and Kannan, Niketana and Feng, Bing, Seeing Sludge: Towards a Dashboard to Help Organizations Recognize Impedance to End-User Decisions and Action (September 27, 2019). Research Report Series Behaviourally Informed Organizations Partnership; Behavioural Economics in Action at Rotman, September 2019  
  26. Image by Daniel Nebreda from Pixabay 
  27. Nudge and Sludge: Driving Security with Design DevOpsDays Tel Aviv with Cloud Native & OSS Day & StatsCraft
  28. Royalty-free stock photo ID: 458236126 Garden Brick Pathway Paving by Professional Paver Worker. By welcomia https://www.shutterstock.com/image-photo/garden-brick-pathway-paving-by-professional-458236126
  29. Building Security In Maturity Model (BSIMM) is a study of current software security initiatives or programs.
  30. Live the story you want to tell, even if it’s a cautionary tale.