Neurocrypto: Aligning the Human Brain & Security Technology
Public Service Announcements
The only place to order your free credit report is AnnualCreditReport.com. The other services will either charge you, or keep the information you have authorized them to view and resell it.
Don’t quite get security? These should help. Security Awareness Videos for your use.
Why Aren ’t Computers Secure?
The popularity of Fake AV and the efficacy of phishing are testament to the fact that human confusion is a one of the drivers in online risk. One of the challenges in security is that it is difficult for people to know if they are working with a secure system or facing a threat. For most people security and privacy are not distinct risks because what matters is that their information is compromised, not the mechanism of information exfiltration. Only the person trying to post anonymously knows the implications of loss of confidentiality or privacy: laughter, annoyance, embarassment, loss of employment, and (in some cases) even imprisionment. In our research, we empower people to identify, mitigate, and avoid online risk.
The Indiana Human and Technology Security focuses on computing risk. This requires first understanding the risk, using big data, network instrumentation, and homogenous communities as well as evaluations of specific protocols and devices. When risk can be identified, we mitigate by design as possible. Sometimes risks must be accepted in order for networks to work, just as risks must be accepted for cars to work. In that case we design systems that embed risk communication, so that people knowingly choose to take a risk to accept a benefit. We empower people to protect themselves, or not, by choosing or avoiding risk online.
My Information Security Economics general site.
My Human-Centered Security Project.
Risk On The Network, the IU component of the MACROSEC Project.
Ethical Technologies in the Homes of Seniors, ETHOS Project; and here is a video overview.