skip to main content
research-article
Open Access

Measuring security practices

Published:19 August 2022Publication History
Skip Abstract Section

Abstract

Users are encouraged to adopt a wide array of technologies and behaviors to reduce their security risk. However, the adoption of these "best practices," ranging from the use of antivirus products to keeping software updated, is not well understood, nor is their practical impact on security risk well established. To explore these issues, we conducted a large-scale measurement of 15,000 computers over six months. We use passive monitoring to infer and characterize the prevalence of various security practices as well as a range of other potentially security-relevant behaviors. We then explore the extent to which differences in key security behaviors impact the real-world outcomes (i.e., that a device shows clear evidence of having been compromised).

References

  1. Apple. Update your iPhone, iPad, or iPod touch, 2018. https://support.apple.com/en-us/HT204204.Google ScholarGoogle Scholar
  2. Bellare, M., Rogaway, P. The FFX mode of operation for format-preserving encryption. Manuscript (standards proposal) submitted to NIST (2010).Google ScholarGoogle Scholar
  3. Bilge, L., Han, Y., Dell'Amico, M. RiskTeller: Predicting the risk of cyber incidents. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS) (Dallas, Texas, USA, November 2017).Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Canali, D., Bilge, L., Balzarotti, D. On the effectiveness of risk prediction based on users browsing behavior. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (CCS) (Kyoto, Japan, June 2014).Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Marshall, C., Ellis, C. The best free password manager 2019, 2018. https://www.techradar.com/news/software/applications/the-best-password-manager-1325845.Google ScholarGoogle Scholar
  6. CVE Details. Mozilla Thunderbird Vulnerability Statistics, 2019. https://www.cvedetails.com/product/3678/?q=Thunderbird.Google ScholarGoogle Scholar
  7. The Enigmail Project. Enigmail---OpenPGP encryption for Thunderbird, 2019. https://www.enigmail.net/index.php/en/home.Google ScholarGoogle Scholar
  8. Forget, A., Pearman, S., Thomas, J., Acquisti, A., Christin, N., Cranor, L.F., Egelman, S., Harbach, M., Telang, R. Do or do not, there is no try: User engagement may not improve security outcomes. In Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS) (Denver, CO, USA, June 2016).Google ScholarGoogle Scholar
  9. Hastie, T., Tibshirani, R., Friedman, J. The Elements of Statistical Learning. Springer New York Inc., 2001.Google ScholarGoogle ScholarCross RefCross Ref
  10. Herley, C. So long, and no thanks for the externalities: The rational rejection of security advice by users. In Proceedings of the 2009 Workshop on New Security Paradigms Workshop (Oxford, United Kingdom, September 2009).Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Hosmer Jr, D.W., Lemeshow, S. Applied Logistic Regression. 2nd edn. John Wiley & Sons, New Jersey, USA, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  12. IAB. IAB Tech Lab Content Taxonomy, 2019. https://www.iab.com/guidelines/iab-tech-lab-content-taxonomy/.Google ScholarGoogle Scholar
  13. Khan, M., Bi, Z., Copeland, J.A. Software updates as a security metric: Passive identification of update trends and effect on machine infection. In Proceedings of IEEE Military Communications Conference (MILCOM) (Orlando, Florida, USA, October 2012).Google ScholarGoogle ScholarCross RefCross Ref
  14. Microsoft. Microsoft update catalog, 2019. https://www.catalog.update.microsoft.com/Home.aspx.Google ScholarGoogle Scholar
  15. Mozilla Foundation. Public suffix list website, 2019. https://publicsuffix.org/.Google ScholarGoogle Scholar
  16. Rubenking, N.J. The best antivirus protection for 2019, 2019. https://www.pcmag.com/article2/0,2817,2372364,00.asp.Google ScholarGoogle Scholar
  17. ProofPoint. ET Pro Ruleset, 2019. https://www.proofpoint.com/us/threat-insight/et-pro-ruleset.Google ScholarGoogle Scholar
  18. Redmiles, E.M., Kross, S., Mazurek, M.L. Where is the digital divide?: A survey of security, privacy, and socioeconomics. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA, May 2017).Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Redmiles, E.M., Kross, S., Mazurek, M.L. How well do my results generalize? Comparing security and privacy survey results from MTurk, web, and telephone samples. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (San Fransisco, CA, USA, May 2019).Google ScholarGoogle ScholarCross RefCross Ref
  20. Reeder, R., Ion, I., Consolvo, S. 152 Simple steps to stay safe online: Security advice for non-tech-savvy users. IEEE Security and Privacy 15, 5 (June 2017):55--64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sawaya, Y., Sharif, M., Christin, N., Kubota, A., Nakarai, A. Yamada, A. Self-confidence trumps knowledge: A cross-cultural study of security behavior. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA, May 2017).Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Sharif, M., Urakawa, J., Christin, N., Kubota, A., Yamada, A. Predicting impending exposure to malicious content from user behavior. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS) (Toronto, Canada, October 2018).Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Vitale, F., McGrenere, J., Tabard, A., Beaudouin-Lafon, M., Mackay, W.E. High costs and small benefits: A field study of how users experience operating system upgrades. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA, May 2017).Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Webshrinker. IAB categories, 2018. https://docs.webshrinker.com/v3/iab-website-categories.html#iab-categories.Google ScholarGoogle Scholar
  25. Webshrinker. Webshrinker website, 2019. https://www.webshrinker.com/.Google ScholarGoogle Scholar

Index Terms

  1. Measuring security practices

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 65, Issue 9
      September 2022
      94 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3558490
      • Editor:
      • James Larus
      Issue’s Table of Contents

      Copyright © 2022 Owner/Author

      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 August 2022

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format