A ProceedingsoftheHumanFactor Research Gate
A ProceedingsoftheHumanFactor Research Gate
Michael W. Boyce1, Katherine Muse Duma2, Lawrence J. Hettinger3, Ph.D., Thomas B. Malone4, Ph.D., Darren P.
Wilson1, Janae Lockett-Reynolds1, Ph.D.
1
Department of Homeland Security, Science and Technology Directorate, Human Factors / Behavioral Sciences Division,
Washington, DC 2 Booz Allen Hamilton , McLean, VA, 3Liberty Mutual Research Institute for Safety, Hopkinton, MA 4Carlow
International, Potomac Falls, VA
This paper provides an overview of critical areas of human performance research required to support the development and deployment
of effective cybersecurity systems. These areas include usability and security compliance, mitigation of human error and risk
reduction, enhancement of situation awareness, and development of effective visualization tools and techniques. We describe the
nature of the research and development efforts required to support effective human-centered design of cybersecurity systems and
make specific recommendations for near-term work in this area.
Development, describes requirements for research and There are various ways to approach these tasks.
development including efforts to understand behavioral factors Some may be entrusted to machine algorithms while others are
that affect cybersecurity technology and practices. The Senate entirely an individual person’s responsibility, and for still
Bill also calls for the development and implementation of an others both human and machine have a role to play.
identity management strategy for cyberspace, which shall Moreover, where humans are involved the key actors may be
include, at a minimum, research and development goals, an cybersecurity professionals, computer users,
analysis of appropriate protections for privacy and civil administrators/supervisors in various roles or some
liberties, and mechanisms to develop and disseminate best combination thereof. Some security interventions, including
practices and standards relating to identity management, some that may be among the most effective, such as entrance
including usability and transparency. Likewise, the pending barriers to rooms containing secured computers requiring
House Bill H.R. 4061, the ‘‘Cybersecurity Enhancement Act credential presentation, are no different in kind than similar
of 2010’’ Section 112 states that the National Center of precautions that are taken for security reasons outside the
Excellence for Cybersecurity shall perform research on cyberseurity world. Therefore, safeguards of this sort are not
cybersecurity social and behavioral factors, including human- included in the discussion in this paper. This article focuses
computer interactions, usability, user motivations, and on measures that are primarily if not exclusively protective in
organizational cultures. Section 204 of the House Bill, the cybersecurity world.
“Identity Management Research and Development” contains a A focus on the human element is important not just
requirement to improve the usability of identity management because people often have capacities to contribute to
systems. One reason for this focus is because, as stated in the cybersecurity that machines lack, but also because a
recently published Department of Homeland Security (DHS) cybersecurity system can be no stronger than its weakest link.
Downloaded from pro.sagepub.com at HFES-Human Factors and Ergonomics Society on June 4, 2015
PROCEEDINGS of the HUMAN FACTORS and ERGONOMICS SOCIETY 55th ANNUAL MEETING - 2011 1116
and more proficient at deciphering passwords, there is a need Human Error Reduction/Risk Reduction
for increased security. This often gets interpreted as a need for
The GAO reported in 2004 that reviews of
more complex passwords. The thought process is that
cybersecurity controls at federal agencies uncovered numerous
complexity will maintain difficulty in guessing the correct
instances where the effectiveness of technology was limited
password. Additionally, multiple passwords are often needed
through improper configuration of the technology (by humans)
for multiple accounts with varying levels of security, and
or through human errors. Gross (2004) reported that human
password updates are required with differing frequencies
error, not technology, is the most significant cause of IT
depending on the system. Many times this can lead to
security breaches today, according to a security survey
forgotten passwords, interfering with productivity, or people
released by the Computing Technology Industry Association
write their password down or place it in a single simple
Inc. (CompTIA).
password keeper to reduce their mental workload, defeating
the purpose of requiring a password for security reasons. A In addition to frustration regarding passwords, one of
study undertaken by Parkin, et al (2010), allowed software the most common areas of human error is authentication. This
developers and cybersecurity policymakers to see and in turn causes increased likelihood of threat intrusion and
understand what effect and/or consequences their increased enterprise costs. Parkin et al (2010) state that
cybersecurity software and policies had on users. The results significant effort has been dedicated to providing alternative,
demonstrated a disconnect between software developer / more usable authentication mechanisms. Commercially, there
policy maker decisions and user needs. This not only has been significant investment in biometrics to replace
indicates the need for training policy-makers and software password authentication with authentication via fingerprints,
developers to better understand users, but also illustrates the retinal eye scan, etc.. However, in a recent study on password
need to involve users at every stage of the development use in organizations it was found that little has changed: single
process, as they provide applied information which can guide sign-on is at best partially implemented, there are short
development. timeouts on services leading to a need for frequent re-
An issue not mentioned by US-CERT is users’ authentication, and users are still required to generate complex
perception of vulnerability and awareness of their own passwords without regard to how these address the real
cybersecurity risks. According to West (2008), “…people threats. Even where single sign-on mechanisms exist, legacy
tend to believe they are less vulnerable to risks than systems and increasing use of third party services means that
others…People also believe they are less likely to be harmed individual users still have many passwords to cope with. The
by consumer products compared to others”. West attributed consequence of this reality is that users are forced to organize
this in part to the fact that cybersecurity has no “visible primary tasks around the password mechanism. Considering
threat”, and is associated with abstract consequences. One only web-based services, Parkin et al (2010) found that the
result is that users are not fully aware and do not fully average user has an average of 25 web accounts and, since
understand the safety implications/consequences associated users cope by re-using passwords across several accounts, they
with poor cybersecurity habits and are therefore less motivated have an average of 6.5 passwords each.
to actually implement cybersecurity measures. Another result
As with research on reducing password system
is that cybersecurity specialists and designers often impose
requirements on people who see no need for them and who, if complexity, authentication research should encompass both
the requirements are user unfriendly, subsequently construct design approaches and training methods. Although it is true
that training users can help their performance, training in and
inherently insecure work-arounds. What is needed are
workable mitigation strategies, either through improved of itself will do little to reduce the incidence and impact of
usability and interface design to make cybersecurity measures human errors. As is true in any software system
implementation, user interfaces, security processes, routines
easier to understand and implement, or through training or
alerts to increase awareness of risks and consequences, or and techniques must be based on a user-centered design
some combination of these. approach addressing the proper allocation of security functions
to a human or automation. To do so, user interfaces must be
Critical to the success of a cybersecurity system is
that users understand how to use its protections as well as the designed in accordance with human factors design criteria.
benefits of use and consequences or risks of not using it. Such Research is needed to determine the types of errors
knowledge can be imparted by training, but should also be associated with the different human roles that figure in the
enhanced through features of the user interface design. It is cybersecurity tasks listed in Table 1, and to assess the risk
equally important for security policy makers and software associated with these errors. The risk determination will
designers to understand users’ operational requirements, and identify the likelihood of errors in alternate scenarios, the
understand the effect that policy/software design may consequences of any errors, and mitigation strategies to reduce
potentially have on them. In addition, cybersecurity error likelihoods and/or the consequences. For example,
professionals should bear in mind that the goal of their task is studies can help determine how to make systems error tolerant
to facilitate missions that belong to others. A completely so that erroneous actions can be detected and corrected before
bullet proof system that substantially hampers the ability of serious consequences are realized and with the least amount of
users to accomplish their mission is not always preferable to a inconvenience to the user.
system that is far more facilitative but runs some security risk.
The best outcome will depend on the costs and values at stake.
Downloaded from pro.sagepub.com at HFES-Human Factors and Ergonomics Society on June 4, 2015
PROCEEDINGS of the HUMAN FACTORS and ERGONOMICS SOCIETY 55th ANNUAL MEETING - 2011 1118
Situation Awareness in Cybersecurity Bean, 2008; Claburn, 2008), human error is cited as the
leading cause of information system security failure in 50-
In the field of cybersecurity, situation awareness is
80% of instances.
the ability to assess data, evaluate options, and make decisions
Given the vast and complex nature of cyber space,
in a timely manner. Analysts are often charged to examine all
interface design approaches that capitalize on recent advances
traffic coming through the network for vulnerabilities and
in complex data set visualization are well worth exploring.
efforts to exploit them. Providing contextual clues can assist in
Current users of cybersecurity systems are often required to
guiding individuals to the locations they should regard most
process large amounts of graphical information whose
closely and enable faster decisions (Daniel at all, 2010).
meaning and interrelationships are not always clear.
Intrusion detection systems also exist to assist users.
However, such systems often don’t allow speedy decisions
because of the time they take for data analysis. This in turn DISCUSSION
can reduce user performance. One way to improve this
This research agenda for addressing human performance
analytic process is through the summation of information in
in cybersecurity systems identifies many of the major human
addition to individualized information which can be leveraged
performance research issues to be encountered in the design
when additional information is needed (Daniel, et al., 2010).
and deployment of cybersecurity systems. Required research
Currently throughout the Department of Homeland
activities include methods for enhancing usability, user-
Security (DHS), there are growing initiatives to increase
automation interaction, procedures and user interfaces,
capabilities through partnerships with counterparts throughout
situation awareness and decision support, alarms and alerts,
the world. Information sharing is one aspect that can greatly
and help utilities. This work was funded by the Department of
improve situation awareness in cybersecurity. This becomes
Homeland Security, Science and Technology Directorate,
relevant from a user perspective as an analyst now is a part of
Human Factors / Behavioral Sciences Division, Human
an international cybersecurity community. If countries can
Systems Research and Engineering Program.
work at cybersecurity issues jointly, the information resources
available to all would increase, thereby increasing Vulnerability Assessment Procedures
cybersecurity knowledge and capabilities at a uniform and
large scale level (Takeshi, Hiroyuki, & Youki, 2010). As described above, usability is a major challenge to
cybersecurity systems and directly effects vulnerability. The
research requirement is to assess user interface design
Cybersecurity and Visualization
concepts in terms of their usability, and to develop a set of
design guidelines that ensure usability. Usability assessments
One of the most pressing problems in the design and
usually constitute two interrelated approaches: a heuristic
use of cybersecurity systems involves supporting the user’s
evaluation using HSI experts determining the extent to which
ability to quickly and accurately extract the information
a design conforms with HSI design standards; and a
needed to perform required operations. The sheer volume of
performance evaluation entailing representative users
information that characterizes cybersecurity operations, as
conducting selected sequences of tasks under representative
well as the rapid speed with which events unfold, presents
conditions, with systematic collection of measures of
difficult design challenges. Human-computer interfaces for
performance, including quantitative measures of performance,
cybersecurity applications must be able to reliably accomplish
and qualitative opinions of the users. For authentication
the following:
techniques, usability should address issues beyond ease of use
• Operator situation awareness must be maintained at a including human error potential and user workload. Any
consistently high level, and in such a manner that proposed technique to replace or supplement the use of
cognitive workload is maintained in an acceptable passwords, such as tokens, cards, or biometrics, will need to
range. Current designs that rely heavily on the user’s be assessed in terms of user interface usability.
own ability to maintain high levels of sustained
situation awareness over lengthy periods of time are User-Automation Interaction
particularly at risk for human error.
Much of the surveillance and monitoring to support
• Maintaining separation of signal (i.e., information) cybersecurity, detect attempted intrusions or identify outright
from noise (i.e., random interference) in visual and/or attacks has been automated, due in large part to the large
auditory displays is essential to effective amounts of data to be monitored and the short timeframe
cybersecurity human-system performance. available for detection. The optimal roles of the user in such
• Interface design must be directly tied to the user’s surveillance systems need to be established, and the
information requirements and must be flexible and information and user interfaces needed to support these roles
agile enough to respond rapidly to the ever changing must be defined through empirical research. In addition, the
landscape of the cybersecurity operational interactions between human users and automation must be
environment. clearly defined to avoid “automation surprises” and situations
For these reasons and because of the importance of the where the user lacks needed oversight of what the automation
enterprise, understanding the potential sources of human error is doing.
in cybersecurity and designing features to mitigate its
occurrence is critical. As noted above and elsewhere (e.g.,
Downloaded from pro.sagepub.com at HFES-Human Factors and Ergonomics Society on June 4, 2015
PROCEEDINGS of the HUMAN FACTORS and ERGONOMICS SOCIETY 55th ANNUAL MEETING - 2011 1119
Procedures and User Interfaces Daniel, M. B., Shawn, B., Douglas, L., Adam, W., & William,
A. P. (2010). Real-time visualization of network
Research is needed on user procedures and interfaces to
behaviors for situational awareness. Paper presented
support initiating, monitoring, supervising, conducting,
at the Proceedings of the Seventh International
managing and verifying cybersecurity activities and incidents.
Symposium on Visualization for Cyber Security,
Procedures must be intuitive, consistent, and compatible with
Ottawa, Ontario, Canada.
the cognitive and computer literacy skills of the user. Research
Department of Homeland Security (2011). Enabling
concerns include providing feedback to verify correct
distributed security in cyberspace: Building a healthy
performance and control of cognitive workload of the user.
and resilient cyber ecosystem with automated
Situation Awareness and Decision Support collective action. www.dhs.gov/xlibrary/assets/nppd-
healthy-cbyer-ecosystem.pdf
Information must be displayed to the user on what is Claburn, T. (2008) Human error cited as greatest security
happening in the cybersecurity space and what can be threat. Information Week,
expected in the near future. Decision aides will be needed to http://www.informationweek.com/news/security/clie
select a decision and implement it in a way that will reduce the nt/showArticle.jhtml?articleID=213002007
potential for human error or at least to convey to the user that
GAO Report 04-321 (2004) Technology Assessment:
an error has occurred and how it can be corrected. Decision Cybersecurity for Critical Infrastructure Protection
aiding software and adaptive algorithms are needed to reliably Gross, G. (2003) “Human error causes most security
respond to variations in the user’s operational state.
breaches” IGD News Service
Alarms and Alerts http://www.gao.gov/new.items/d04321.pdf
Takeshi, T., Hiroyuki, F., & Youki, K. (2010). Building
Alarms and alerts will be needed to bring to the user’s ontology of cybersecurity operational information.
attention events that require cognizance if not action. Features Paper presented at the Proceedings of the Sixth
of alarms and alerts need to be empirically investigated to Annual Workshop on Cyber Security and Information
enhance attention-getting potential and the clarity with which Intelligence Research, Oak Ridge, Tennessee.
they identify problems, without adding to the potential for Parkin, S., van Moorsel, A., Inglesant, P., and Sasse, A.
error. A high priority here is the development of unified alert (2010). A Stealth Approach to Usable Security:
fusion models which prioritize alerts, identify associations and Helping IT Security managers to Identify Workable
assess the state of system security. Security Solutions. Paper presented at the
Proceedings of the 2010 New Security Paradigms
Help Utilities Workshop, Concord, Massachusetts.
Research is needed on online help to provide procedural United States Computer Emergency Readiness Team (US-
aids, recovery from errors, and advice without requiring the CERT), (2011), Cyber threats to mobile devices
user to exit the application and with minimal waste of time (Technical Inforation Paper TIP-10-105-01).
and training. http://www.us-cert.gov/reading_room/TIP10-105-
CONCLUSIONS 01.pdf
Effective human performance is critical to the successful United States Computer Emergency Readiness Team (US-
implementation and operation of cybersecurity processes, CERT). (2011). Cybersecurity Tips. Retrieved
facilities and provisions. Although the research areas January 24, 2011, from http://www.us-
discussed in this paper are in most cases not new, considerable cert.gov/cas/tips/
work within each is required to support the effective design U.S. Department of Homeland Security. (2003). The National
and deployment of cybersecurity. This research should follow Strategy to Secure Cyberspace. Retrieved from
the accepted human factors approach of achieving full http://www.dhs.gov/xlibrary/assets/National_Cybersp
integration of the human with other elements of the ace_Strategy.pdf
cybersecurity system. The focus on the roles of the human in U.S. Department of Homeland Security. (2009). National
operating, supervising and monitoring cybersecurity systems, Infrastructure Protection Plan: Partnering to Enhance
and on the requirements attendant to these roles, will produce Protection and Resiliency. Retrieved from
human performance research findings and results that will http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf
help to effectively and economically integrate the user into the U.S. Senate S.4380 (2010) Senate Bill “Protecting Cyberspace
cybersecurity system. as a National Asset Act of 2010”
West, R. (2008). The Psychology of Security: Why do good
REFERENCES users make bad decisions? Communications of the
ANSI (2001) Common Industry Format for Usability Test ACM, 51(4), 34-40.
Reports, ANSI-NCITS 354-2001, American National White House Press Release (2009). Remarks by the President
Standards Institute. on Securing our Nation’s Cyber Infrastructure.
Bean, Martin (2008) Human error in IT security breaches, http://www.whitehouse.gov/the_press_office/Remark
http://www.newhorizons.com/elevate/network%20defens s-by-the-President-on-Securing-Our-Nations-Cyber-
e%20contributed%20article.pd Infrastructure/
Downloaded from pro.sagepub.com at HFES-Human Factors and Ergonomics Society on June 4, 2015