Users are not stupid

By John Forrester March 28, 2023

Users are not stupid

This article from Julie Haney of NIST deals with some of the misconceptions and pitfalls that cyber security professionals fall victim to. These pitfalls reflect a tendency in the cyber security community “to focus and depend on technology to solve today’s security problems while at the same time failing to appreciate the human element: the individual and social factors affecting security adoption.”

To appreciate the importance of the human element in cyber security, Haney suggests it would be best to understand the concepts of usability and usable cyber security. The International Organization for Standardization definition of usability is ‘the extent to which people can use systems, products, and services with effectiveness, efficiency, and satisfaction to accomplish their goals in a specified context of use’.

In the context of cyber security, systems, products, and services can actually be many different things. In a similar fashion, Users can seen as people involved in or affected by “interactions with the systems, products and services.”

Usable cyber security

Hany quotes a report of the U.S. Department of Homeland Security that identified 11 hard problems in information security research, one of which was “usable security”. The definition is still relevant today:

‘Security must be usable by persons ranging from nontechnical users to experts and system administrators. Furthermore, systems must be usable while maintaining security. In the absence of usable security, there is ultimately no effective security.

“Usable security” includes not just usability but also extends to considering the “perceptions, relationships and behaviours of people when engaging with security.” The focus is, Haney asserts, on the human element. Most importantly, usable security should be an enabler, not an obstacle, to cyber security. The goal of usable security programs should be to develop systems, products, and services that are “usable and result in improved security outcomes.”

Haney notes that many organisations and professionals in cyber security attach a certain importance to the human element, the cyber security fields is perceived as “technology-centric by nature” and the ultimate solutions to security issues. Haney quotes one cyber security professional: ‘Humans have always been a big part of the computing picture, but for some reason, we always thought only technology solutions alone can fix or prevent issues … That is not a workable strategy’

Few security professional seem to have had much formal or professional training regarding the human element or those non-technical skills like “security risk communication, interpersonal skills or usability that all tend to facilitate interaction with non-experts. Adopting a human-centric approach is perceived often as resource intensive and an obstacle to implementing security efficiently.

Finally, Haney suggests that cyber security professionals may well hold some unintended misconceptions about the role of the human and the people they are supposed to be helping. Haney outlined the following “pitfalls” for cybersecurity professionals:

Pitfall #1: Assuming people are stupid.

The belief that ‘users are the weakest link’ or ‘users are stupid’ is prevalent throughout the cyber security community as a result of an “unhealthy, ‘us versus them’ relationship between cyber security professionals and the people they are ultimately tasked to support”. Aim to empower, Haney suggests, instead of a ‘blame game’, focus on empowering users to be active, capable partners in cyber security. and seek to move beyond the ‘us versus them’ mentality.

PITFALL #2: Not tailoring communications to the audience.

Basically, the issue is that it is not unusual for cyber security professionals to have a difficult time translating technical information into a language understandable to their intended audience.

Be context aware: Being aware of your audience, Haney notes, is a crucial first step in effective communication. Seek to Identify users, their skill levels, constraints, values and environments where users tend to interact with cyber security systems, products and services.

PITFALL #3: Unintentionally creating insider threats due to poor usability.

Solutions that are limited to cyber security without considering usability can backfire. In environments where users may be already pushed to their limits by time pressures or other distractions, unusable security can increase user burden. Do basic usability testing and provide tools and “actionable guidance to help people. Think about what can be done to lessen the burden on end users so that they are not forced to make decisions they may not be ill equipped to make,

PITFALL #4: Having too much security.

The most secure solution may not be necessary in every situation and may be impractical from both a resource and usability perspective.35 Overly rigid and restrictive security rules and solutions often create the illusion of security but may result in unanticipated negative consequences for both technical and end users. Take a risk-based approach and avoid a ‘one-size-fits-all’ stance on what security solutions are implemented. Performing a risk assessment can help determine what level of cyber security is appropriate for the environment.

Understand and support the capability of users and seek to understand how well the users are equipped to implement and react to the security measures. Furthermore, attempt to understand the current constraints and pressures of end users and how added security processes may negatively affect their work

PITFALL #5: Depending on punitive measures or negative messaging to get users to comply.

Many organisation resort to penalising measures or focus on negative messaging to convince users to comply with recommended security practices. Motivating and empowering people to have “confidence in their ability to do something about a possible threat” is an important step. Likewise, taking a collaborative, rather than punitive, approach can also be effective in encouraging the adoption of security practices.

PITFALL #6: Not considering User-Centric measurements of effectiveness.

Collecting meaningful security related measurements can be challenging. The return on investment is often being difficult to measure. Unfortunately, organisations may neglect, for a variety of motives, to seek out data about user behaviours and attitudes. Without this data, organisations are left in the dark about areas in which employees are doing well or shortfalls for which they may need more support.

Concluding remarks

Haney argues having usable security programs in place will allow organisations to develop products and services that are “usable and result in improved security outcomes.” Clearly, the focus needs to be not just on technological needs but also on social and economic aspects.

References

https://govwhitepapers.com/whitepapers/users-are-not-stupid-six-cyber-security-pitfalls-overturned Julie Haney. National Institute of Standards and Technology (NIST)