Dancing pigs

In computer security, the "dancing pigs" is a term or problem that describes computer users' attitudes to computer security. It states that users will continue to pick an amusing graphic even if they receive a warning from security software that it is potentially dangerous. In other words, users choose their primary desire features without considering the security. "Dancing pigs" is generally used by tech experts and can be found in IT articles.

Origins

The term has its origin in a remark by Edward Felten and Gary McGraw:

Given a choice between dancing pigs and security, users will pick dancing pigs every time.[1]

Bruce Schneier states:

The user's going to pick dancing pigs over security every time[2]

Bruce Schneier expands on this remark as follows:

If J. Random Websurfer clicks on a button that promises dancing pigs on his computer monitor, and instead gets a hortatory message describing the potential dangers of the applet — he's going to choose dancing pigs over computer security any day. If the computer prompts him with a warning screen like: "The applet DANCING PIGS could contain malicious code that might do permanent damage to your computer, steal your life's savings, and impair your ability to have children," he'll click OK without even reading it. Thirty seconds later he won't even remember that the warning screen even existed.[3]

The Mozilla Security Reviewers' Guide states:

Many of our potential users are inexperienced computer users, who do not understand the risks involved in using interactive Web content. This means we must rely on the user's judgement as little as possible.[4]

A widely publicized 2009 paper[5] directly addresses the dancing pigs quotation and argues that users' behavior is plausibly rational:

While amusing, this is unfair: users are never offered security, either on its own or as an alternative to anything else. They are offered long, complex and growing sets of advice, mandates, policy updates and tips. These sometimes carry vague and tentative suggestions of reduced risk, never security.[6]

Experimental support

One study of phishing found that people really do prefer dancing animals to security. The study showed participants a number of phishing sites, including one that copied the Bank of the West home page:[7]

For many participants the "cute" design, the level of detail and the fact that the site does not ask for a great deal of information were the most convincing factors. Two participants mentioned the animated bear video that appears on the page, (e.g., "because that would take a lot of effort to copy"). Participants in general found this animation appealing and many reloaded the page just to see the animation again.

Schneier believes the dancing pigs problem will lead to crime, a key threat. He said: "The tactics might change (...) as security measures make some tactics harder and others easier, but the underlying issue is constant." Ignoring computer security can inflict various types of damage resulting in significant losses.[8]

See also

References

  1. Gary McGraw and Edward Felten: Securing Java (John Wiley & Sons, 1999; ISBN 0-471-31952-X), Chapter one, Part seven
  2. Mills, Elinor (October 23, 2009). "Q&A: Schneier warns of marketers and dancing pigs". CNET. Retrieved 12 February 2013.
  3. Bruce Schneier: Secrets and Lies (John Wiley & Sons, 2000; ISBN 0-471-45380-3), p262
  4. "Mozilla Security Review and Best Practices Guide". Mozilla Foundation. 17 May 2002. Retrieved 2 February 2015.
  5. Pothier, Mark (11 April 2010). "Please Do Not Change Your Password". The Boston Globe. Retrieved 2 February 2015. (subscription required (help)).
  6. Cormac Herley (2009). So Long and No Thanks for the Externalities: the Rational Rejection of Security Advice by Users (PDF). New Security Paradigms Workshop.
  7. Rachna Dhamija, J. D. Tygar and Marti Hearst. "Why Phishing Works" (PDF). Archived from the original (PDF) on 2008-03-06. Retrieved 2011-05-25.
  8. Mills, Elinor (October 23, 2009). "Q&A: Schneier warns of marketers and dancing pigs". CNET. Retrieved 12 February 2013. The tactics might change--phishing, pharming, key logging, social engineering, password guessing, whatever--as security measures make some tactics harder and others easier, but the underlying issue is constant

External links

This article is issued from Wikipedia - version of the 9/4/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.