[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Insufficient Psychological Acceptability

ID: 655Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: DRAFT
Abstraction Type: Base





Description

The software has a protection mechanism that is too difficult or inconvenient to use, encouraging non-malicious users to disable or bypass the mechanism, whether by accident or on purpose.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design
  • Implementation
  • Operation

Common Consequences

ScopeTechnical ImpactNotes
Access_Control
 
Bypass protection mechanism
 
By bypassing the security mechanism, a user might leave the system in a less secure state than intended by the administrator, making it more susceptible to compromise.
 

Detection Methods
None

Potential Mitigations

PhaseStrategyDescriptionEffectivenessNotes
Testing
 
 Where possible, perform human factors and usability studies to identify where your product's security mechanisms are difficult to use, and why.
 
  
Architecture and Design
 
 Make the security mechanism as seamless as possible, while also providing the user with sufficient details when a security decision produces unexpected results.
 
  

Relationships

Related CWETypeViewChain
CWE-655 ChildOf CWE-906 Category CWE-888  

Demonstrative Examples   (Details)

  1. Enforcing complex and difficult-to-remember passwords that need to be frequently changed for access to trivial resources, e.g., to use a black-and-white printer. Complex password requirements can also cause users to store the passwords in an unsafe manner so they don't have to remember them, such as using a sticky note or saving them in an unencrypted file.
  2. In "Usability of Security: A Case Study" (see References), the authors consider human factors in a cryptography product. Some of the weakness relevant discoveries of this case study were: users accidentally leaked sensitive information, could not figure out how to perform some tasks, thought they were enabling a security option when they were not, and made improper trust decisions.
  3. Some CAPTCHA utilities produce images that are too difficult for a human to read, causing user frustration.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings
None

References:

  1. Jerome H. Saltzer Michael D. Schroeder .The Protection of Information in Computer Systems. Proceedings of the IEEE 63. Published on September, 1975.
  2. Sean Barnum Michael Gegick .Psychological Acceptability. Published on 2005-09-15.
  3. J. D. Tygar Alma Whitten .Usability of Security: A Case Study. SCS Technical Report Collection, CMU-CS-98-155. Published on 1998-12-15.
  4. Michael Howard David LeBlanc John Viega .24 Deadly Sins of Software Security. McGraw-Hill. Section:'"Sin 14: Poor Usability." Page 217'. Published on 2010.

© SecPod Technologies