PPT-Introduction to Usable Security
Author : ellena-manuel | Published Date : 2017-07-02
Reasoning About the Human in the Loop Lorrie Faith Cranor September 2011 Outline Why should we make secure systems more usable How can we make secure systems more
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Introduction to Usable Security" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Introduction to Usable Security: Transcript
Reasoning About the Human in the Loop Lorrie Faith Cranor September 2011 Outline Why should we make secure systems more usable How can we make secure systems more usable The human in the loop. 1.1. Reprinted by permission from William J. Goode and Paul K Hatt, Methods in Social Research (New Yoric McGraw-Hill, 1952), 68-73. Copyright 1962 by McGraw-Hill Book Company, Inc. 5The hypotheses mu Serge Egelman. UC Berkeley. 1. Hazard Avoidance. Making security usable. Current problems:. . 1. Unnecessary interactions . habituate . users. 2. Users are asked to make decisions they are unqualified to make. to. Security. . Computer Networks . Term . A15. Intro to Security Outline. Network Security. Malware. Spyware, viruses, worms and . trojan. horses, botnets. Denial of Service and Distributed DOS Attacks. Reasoning About the Human in the Loop. Lorrie Faith Cranor. August 2009. Outline. Why should we make secure systems more usable?. How can we make secure systems more usable. The human in the . loop. Why should we make secure systems more usable?. A . perspective for rangeland sustainability. Netra Chhetri. Arizona State University. U2 and actionable science . IS NOT NEW. ……when facts are. uncertain, . values in . dispute, stakes high, . and decision. What makes science NOT usable? . Grazing studied as an “on-off switch”. 400 page reporting documents . . WHAT MAKES SCIENCE USABLE?. Who uses the information? . Land managers, scientists . Gap in . David Brumley. dbrumley@cmu.edu. Carnegie Mellon University. Today: Overview. Course Staff. Trusting Trust. Course Overview. Example Applications. Course Mechanics. CMU CTF Team. 2. You will find. a. ECE 422 / CS 461 - Fall 2013. *Acknowledgment: Thanks to Susan . Hinrichs. for her slides. Outline. Administrative Issues. Class Overview. Introduction to Computer Security. What is computer security?. Jeremiah Blocki. Intel Tech Talk. 9/27/2016. Memory Experiment 1. 2. Person. Bill. Clinton. Action. Tickling. Object. Peach. Memory Experiment 3. 3. Person. Albert Einstein. Action. Kissing. Object. Suman Jana. Columbia University. *some slides are borrowed from . Vitaly. . Shmatikov. and Ari . Juels. 1. Course goals. Understand the fundamental principles of security. What are the common security mechanisms? Why they often go wrong?. Jeremiah Blocki. ASIACRYPT 2013. Manuel Blum. Anupam Datta. Memory Experiment 1. 2. Person. Alan. Turing. Action. Kissing. Object. Piranha. Memory Experiment 2. Person. Bill. Gates. Action. swallowing. Prepared for. Creating Inclusive Communities. By. Jerry Christiansen. Who is this guy . and . what is Freedom Resource Center?. Accessibility Specialist Freedom. CAPS. Disabilities Rights Organization. One-click virtual machine optimized storage creation can deploy hundreds of virtual machines and desktops in minutes, not hours. Built-in backup and data replication via unlimited Raw Capacity 22 TB Jason Hong. jasonh@cs.cmu.edu. Malware. Fake anti-virus scans. Fake . software . updates . Fake video codecs to install. Fake . warnings of account . breaches. Why Unusable Security is Dangerous. Fake Friends on Social Nets.
Download Document
Here is the link to download the presentation.
"Introduction to Usable Security"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents