{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

3.29.usability - Human Factors in Computer Security...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
Human Factors in Computer Security 3/29/2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Administrative Announcements Midterm 2 on Friday; in principle, everything up till & including Wednesday is fair game, but in practice we’ll focus on material after MT1. Midterm 2 review tomorrow, Tuesday, 3/30, 6:30-8:30pm in 1 Pimentel. Joel’s 10 -11 section tomorrow (3/30) should go to 3105 Etcheverry (temporarily merged with Matt’s section, just for tomorrow). Joel’s 2-3 section meets at regular time and place.
Background image of page 2
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 4
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 6
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 8
How well does it work? Cost: $80 / 1 million emails Something like 10K-30K users will visit your site Success rate in the wild: ? Fraction of users who type in credentials: ? Gartner: $2.4 billion/year in losses, 19% of Americans have clicked on a link in a phishing email, 3% have disclosed credentials
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Sophisticated phishing Context-aware phishing 10% users fooled Spoofed email includes info related to a recent eBay transaction/listing/purchase Social phishing 70% users fooled
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 33

3.29.usability - Human Factors in Computer Security...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online