
Rick Wash from Michigan State wrote a great paper, "Folk Models in Home Computer Security," which uses interviews with users of varying levels of sophistication to create a taxonomy of the way that regular people think about the security of their computers. Wash finds that primarily, users' models relate to the pre-botnet era of malicious software, and he goes on to see what happens when those models are applied to modern malware. From the abstract:
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromise these computers, aggregate them, and use the resulting network to attack third parties. Despite a large security industry that provides software and advice, home computer users remain vulnerable. I investigate how home computer users make security-relevant decisions about their computers. I identify eight 'folk models' of security threats that are used by home computer users to decide what security software to use, and which security advice to follow: four different conceptualizations of 'viruses' and other malware, and four different conceptualizations of 'hackers' that break into computers. I illustrate how these models are used to justify ignoring some security advice. Finally, I describe one reason why botnets are so difficult to eliminate: they have been cleverly designed to take advantage of gaps in these models so that many home computer users do not take steps to protect against them.
Folk Models of Home Computer Security (PDF)
(
via Schneier)
report this ad
Researchers from the University of Michigan EE/Computer Science Department (previously) presented their work on hacking traffic signals at this year’s Usenix Security Symposium (previously), and guess what? It’s shockingly easy to pwn the traffic control system.
Penn State researchers funded by the Army Research Office and the Office of Naval Research have posted video showing their progress on “self-healing” textiles that use proteins similar to those found in human hair and squid teeth to allow fibers to coated in polyelectrolytes so that they can be set and bonded using safe solvents […]
Here’s a wonderful feature about my favorite constellation and the galaxy’s most awesome telescope (at least one of them!) from NASA’s Jet Propulsion Laboratory (JPL) in Pasadena, California.
Mophie’s gadgets are reliable, minimalist, and stacked with all the right features. We use these two gadgets to keep our phones, tablets, e-readers, and other electronics charged.Recharge on-the-go with the Mophie Powerstation XL External BatteryThe Mophie Powerstation XL ($39.95) packs enough power to re-charge your phone eight times over. It has three levels of charging, so […]
Earlier this spring, Salesforce announced that Amazon Web Services (AWS) would be its preferred public cloud infrastructure provider. Salesforce developers and AWS developers are already in-demand and paid very well for their expertise, but this partnership opens up the opportunity to become an extremely valuable asset by mastering both. Below are two in-depth courses to help you start or progress […]
Whether you’re trying to start a quirky news blog, open a local Irish pub, or sell handmade furniture out of your garage, one thing’s for sure: your business is not going to succeed if you don’t build it a professional-looking website. That’s why we’re excited to share the WordPress Wizard Bundle.This is a bundle that includes 12 courses about […]
report this ad
Really interesting paper, thanks Cory.
This is interesting, but of little practical value in securing end-user computer systems. Those systems CANNOT be secured — not for any sane value of “secure” — as long as they run Windows. Not even Microsoft has managed to do it, and they not only have essentially-unlimited resources, but the source code and more expertise than anyone else.
This is an unpleasant and inconvenient reality that most security experts will deny, deny, deny — because of course they wish to sell the goods and services that claim to accomplish this, and flatly admitting that it can’t be done would undercut their rationale. But there are (at latest, best estimate) about 200 million systems out there constituting a substantial supporting argument for this position.
And by the time you’ve finished reading this, there will be more — since the number of such systems has been monotonically increasing for a decade, and since there is no reason whatsoever to suspect that the trend might be reversing.
This is NOT, by the way, to say that non-Windows systems are secure. Of course they’re not: they have their own issues. But it is to say that anyone who claims to be able to secure a Windows system is either stupid, incompetent, delusional, lying or paid by Microsoft.
I’m afraid I must disagree with one of Rick Wash’s basic premises, “Despite a large security industry that provides software and advice, home computer users remain vulnerable.” IMHO, it is /because/ of that very large, hungry and malware-dependent so-called “security” industry, and many associates, especially all those that depend in servicing home and professional users in “cleaning” their machines and providing “upgrades”, and, of course, Microsoft (+1, rsk), that we are where we are in this respect.
I am not aware there ever was proved collusion between Microsoft, and say, CompUSA or other such stores, or (your favorite “antivirus” here) that depend for their income on people having their computers infected. Yes, correlation is not causality, but the evidence is there, at least for areductio ad abs: if any of those stores cared to protect their customers, they would strongly suggest and push FLOSS OSs, or at the very least Firefox with filters and Open Office or even MSOffice with macros disabled. In the same line, if Microsoft et al cared about piracy, they would encourage would be pirates to user other software… On this point Bill Gates was clear already. As to possible collusion, it is rather obvious that success in this area (virus-proof OS and other software) would discourage ignorant or store-driven “upgrades” (“my computer is slowing down – I think I need to upgrade”, “yes, ma’am, you should”), and definitively drive several companies out of business. In standard crime-chasing mode, “who benefits” points often to the criminal. Here we know who benefits, and a lot, out of viruses, “legally”.
Fascinating study. I thought these bits were especially interesting:
And:
Certainly nothing is bulletproof.
That having been said, and after running only Windows machines for about twenty years,
Mac, MacIntosh, Mac, Mac and Mac. Also, Apple Macs, Mac-ish, Mac, Mac, Mac.
I am an awfully zealous convert. It’s just a different gig. Can you be infected? Sure. But you have to hang yourself. And you have to pretty much run down the plank and hurl yourself off.
It’s also a test. If you don’t think twice before clicking a link to a PDF, you fail.
@ TEKNA2007,
… not everyone uses Adobe products.
It’s a dense read, and an interesting formalized approach. While I’ve had to ecucate users frequently, I’ve not given a lot of thought into how their models messed with their cost/benefit analyses, aside from informing them that “doing it that way doesn’t actually work.”
So far (~halfway) the most interesting point has been that as users acquire additional information, their security decisions overall improve noticeably, but they also suffer more cognitive dissonance.
This is why Chrome OS might be a good idea.
I don’t have a clue about the regular usage habits of home PC users, but I imagine it really isn’t much more than browsing, pictures, music and possibly video. Give yourself a full OS and you’re exposing a lot more than you are with a semi-locked-down, function-oriented system.
I try to understand that everybody should be able to use the Internet, but have trouble suppressing my exasperation at the cluelessness of many users, whether it’s gullibility relating to a scam or not reading (or rather not interpreting) error messages. I may learn to drive one day. There’s no way in hell I’m going to do that unless I know how the engine works, and how it integrates into the whole. I don’t understand how you could comfortably type your credit card number into a machine without applying the same mindset.
One BIG thing left out is that people are LAZY.
I am the chronically uninformed home PC user. I bring my computer to a local guru occasionally when it starts hiccuping, and the rest of the time I don’t worry about security or viruses. My behavior is similar with my car and other things that work through processes that I’m not interested in learning. (Did you learn how microwaves worked before you used one too, #8?)
My reasoning follows along the lines of the first two comments: it seems like a sisyphean task that I’ll ultimately fail at, and the people who would claim to eliminate risks for me have a vested interest in the maintenance of those very risks. Also, as I’ve already stated, Jim does fixes up my sick computer for a very reasonable price and I like giving him business.
There’s really a good comparison between cars and computers #8, I don’t know anything about my car either. As far as I’m concerned they’re both magical contraptions that work because a bunch of skilled magicians said the right words over them at midnight while burning savory herbs. I like it that way.
I think the conclusion that should be reached from this is that people are going to learn about computers much in the same way that many of them learn about cars: piecemeal and as it applies to them. I know more about alternators than almost any other part of a car, because I’ve had alternator problems.
Perhaps Windows ought to recommend that computers are brought in regularly to be looked over by magicians who know what to look for, it could be cheap, fast and easy, like an oil change.
I don’t want to spend much of my time being educated about things that I have no interest in. I already feel as if I don’t spend enough time doing things I enjoy and worrying about possibilities I don’t know how to prevent.
Open Office, Zone Alarm and Avira updated and run daily.
and forget about those nasty rootkits out there. get one of those and if you ever realize you have it (hiding under the software level as they do so the av software doresn’t have clue its there) the only way to get rid of it is to reformat.
but i’ve run windows machines for decades and i’ve found that a box running behind a spi firewall in the router, keeping up with patches, using up to date software and a good free antivirus keeps things nice and clean. i also recommend running the noscript plugin for your browser (chrome and firefox i know can use it). the web just not as fun with java turned off on all sites and turning it on and off manualy just is a pain.
after you get your computer setup the way you like run a disk image of your os drive and if anything nasty does happen, its a 30 minute fix.