3.29.usability - Human Factors in Computer Security...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Human Factors in Computer Security 3/29/2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Administrative Announcements Midterm 2 on Friday; in principle, everything up till & including Wednesday is fair game, but in practice we’ll focus on material after MT1. Midterm 2 review tomorrow, Tuesday, 3/30, 6:30-8:30pm in 1 Pimentel. Joel’s 10 -11 section tomorrow (3/30) should go to 3105 Etcheverry (temporarily merged with Matt’s section, just for tomorrow). Joel’s 2-3 section meets at regular time and place.
Background image of page 2
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 4
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 6
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 8
How well does it work? Cost: $80 / 1 million emails Something like 10K-30K users will visit your site Success rate in the wild: ? Fraction of users who type in credentials: ? Gartner: $2.4 billion/year in losses, 19% of Americans have clicked on a link in a phishing email, 3% have disclosed credentials
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Sophisticated phishing Context-aware phishing 10% users fooled Spoofed email includes info related to a recent eBay transaction/listing/purchase Social phishing 70% users fooled
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/14/2010 for the course CS 161 taught by Professor Wagner during the Spring '10 term at University of Central Arkansas.

Page1 / 33

3.29.usability - Human Factors in Computer Security...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online