238,464 research outputs found

    Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks

    Full text link
    Human errors in performing security-critical tasks are typically blamed on the complexity of those tasks. However, such errors can also occur because of (possibly unexpected) sensory distractions. A sensory distraction that produces negative effects can be abused by the adversary that controls the environment. Meanwhile, a distraction with positive effects can be artificially introduced to improve user performance. The goal of this work is to explore the effects of visual stimuli on the performance of security-critical tasks. To this end, we experimented with a large number of subjects who were exposed to a range of unexpected visual stimuli while attempting to perform Bluetooth Pairing. Our results clearly demonstrate substantially increased task completion times and markedly lower task success rates. These negative effects are noteworthy, especially, when contrasted with prior results on audio distractions which had positive effects on performance of similar tasks. Experiments were conducted in a novel (fully automated and completely unattended) experimental environment. This yielded more uniform experiments, better scalability and significantly lower financial and logistical burdens. We discuss this experience, including benefits and limitations of the unattended automated experiment paradigm

    A Proposal on End-User Network Security System To Visualize Packct Header Information

    Get PDF
    To improve security awareness of end-user, we designed and implemented the visualization system of packet header that represent the condition of network communication. We implemented our systems using Microsoft Visual Studio 2005 with Winpcap library and the development traffic, protocol and the time it captured a packet

    CCBS – a method to maintain memorability, accuracy of password submission and the effective password space in click-based visual passwords

    Get PDF
    Text passwords are vulnerable to many security attacks due to a number of reasons such as the insecure practices of end users who select weak passwords to maintain their long term memory. As such, visual password (VP) solutions were developed to maintain the security and usability of user authentication in collaborative systems. This paper focuses on the challenges facing click-based visual password systems and proposes a novel method in response to them. For instance, Hotspots reveal a serious vulnerability. They occur because users are attracted to specific parts of an image and neglect other areas. Undertaking image analysis to identify these high probability areas can assist dictionary attacks. Another concern is that click-based systems do not guide users towards the correct click-point they are aiming to select. For instance, users might recall the correct spot or area but still fail to include their click within the tolerance distance around the original click-point which results in more incorrect password submissions. Nevertheless, the Passpoints study by Wiedenbeck et al., 2005 inspected the retention of their VP in comparison with text passwords over the long term. Despite being cued-recall the successful rate of their VP submission was not superior to text passwords as it decreased from 85% (the instant retention on the day of registration) to 55% after 2 weeks. This result was identical to that of the text password in the same experiment. The successful submission rates after 6 weeks were also 55% for both VP and text passwords. This paper addresses these issues, and then presents a novel method (CCBS) as a usable solution supported by an empirical proof. A user study is conducted and the results are evaluated against a comparative study

    Implementation and Evaluation of Steganography based Online Voting

    Get PDF
    Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing

    Complex, but in a good way? How to represent encryption to non-experts through text and visuals – Evidence from expert co-creation and a vignette experiment

    Get PDF
    An ongoing discussion in the field of usable privacy and security debates whether security mechanisms should be visible to end-users during interactions with technology, or hidden away. This paper addresses this question using a mixed-methods approach, focusing on encryption as a mechanism for confidentiality during data transmission on a smartphone application. In study 1, we conducted a qualitative co-creation study with security and Human-Computer Interaction (HCI) experts (N = 9) to create appropriate textual and visual representations of the security mechanism encryption in data transmission. We investigated this question in two contexts: online banking and e-voting. In study 2, we put these ideas to the test by presenting these visual and textual representations to non-expert users in an online vignette experiment (N = 2180). We found a statistically significant and positive effect of the textual representation of encryption on perceived security and understanding, but not on user experience (UX). More complex text describing encryption resulted in higher perceived security and more accurate understanding. The visual representation of encryption had no statistically significant effect on perceived security, UX or understanding. Our study contributes to the larger discussion regarding visible instances of security and their impact on user perceptions

    Renovation of information system

    Get PDF
    The thesis deals with the process of renovating and upgrading the existing information system of the Islamic Community in the Republic of Slovenia. It involves analysing, planning and developing the necessary changes in the system. To this end, the majority of work was performed using Microsoft Visual Studio 2010 and the C# programming language. Moreover, the thesis presents other tools, technologies and methods that contributed to the renovation and upgrading of the system. The Islamic Community opted for the renovation because they encountered difficulties in the existing system. They were also interested in raising the level of data security, add new functionalities and introduce a mobile application. The thesis provides a detailed insight into the first renovation phase, which includes the renovation of the system back-end and a section of system upgrade that is visible to the user

    Renovation of information system

    Get PDF
    The thesis deals with the process of renovating and upgrading the existing information system of the Islamic Community in the Republic of Slovenia. It involves analysing, planning and developing the necessary changes in the system. To this end, the majority of work was performed using Microsoft Visual Studio 2010 and the C# programming language. Moreover, the thesis presents other tools, technologies and methods that contributed to the renovation and upgrading of the system. The Islamic Community opted for the renovation because they encountered difficulties in the existing system. They were also interested in raising the level of data security, add new functionalities and introduce a mobile application. The thesis provides a detailed insight into the first renovation phase, which includes the renovation of the system back-end and a section of system upgrade that is visible to the user
    corecore