PPT-Introduction to Usable Security

Author : tawny-fly | Published Date : 2016-08-07

Reasoning About the Human in the Loop Lorrie Faith Cranor August 2009 Outline Why should we make secure systems more usable How can we make secure systems more usable

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Introduction to Usable Security" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Introduction to Usable Security: Transcript


Reasoning About the Human in the Loop Lorrie Faith Cranor August 2009 Outline Why should we make secure systems more usable How can we make secure systems more usable The human in the loop Why should we make secure systems more usable. 1 ACCESSIBLE AND USABLE BUILDINGS AND FACILITIES CHECK LOCAL CODES Countertop 864mm 34 from finished floor Lavatory installed 102mm 4 from front edge of countertop Countertop thickness to be 25mm 1 maximum 5 55 ZZ Z QZ QQ 51mm 2 MIN 83mm Jeremiah Blocki. Spring 2012. Theory . Lunch . Password Management. Competing Goals:. 2. A Challenging Problem. 3. Traditional Security Advice. Not too short. Use mix of lower/upper case letters. Change your passwords every 90 days. Bicycles are a good thing.. We should admit that they exist,. and provide facilities for them.. Every time I see an adult on a bicycle, I no longer despair for the future of the human race. -- H.G. Wells, 1904. 1.1. Reprinted by permission from William J. Goode and Paul K Hatt, Methods in Social Research (New Yoric McGraw-Hill, 1952), 68-73. Copyright 1962 by McGraw-Hill Book Company, Inc. 5The hypotheses mu Serge Egelman. UC Berkeley. 1. Hazard Avoidance. Making security usable. Current problems:. . 1. Unnecessary interactions . habituate . users. 2. Users are asked to make decisions they are unqualified to make. to. Security. . Computer Networks . Term . A15. Intro to Security Outline. Network Security. Malware. Spyware, viruses, worms and . trojan. horses, botnets. Denial of Service and Distributed DOS Attacks. Nikolaos . Karapanos. , Claudio . marforio. , Claudio . Soriente. and . Srdjan. . Capkun. Institute of Information Security. ETH Zurich. Presenter: Rongdong Chai. Weakness. Password-Only authentication sometimes is weak. Authors: . Ninghui. Li, . Ziqing. Mao and Hong Chen. “IEEE Symposium on Security and Privacy(SP’07)”. By:Poornakumar. . Rasiraju. Introduction. Host compromise is one of the most serious security problems today.. A . perspective for rangeland sustainability. Netra Chhetri. Arizona State University. U2 and actionable science . IS NOT NEW. ……when facts are. uncertain, . values in . dispute, stakes high, . and decision. Anita de Waard. VP Research Data Collaborations. a.dewaard@elsevier.com. http. ://researchdata.elsevier.com. /. . 7. Trusted . (. validated/checked . by reviewers). 6. Reproducible . (others can redo . C3C Matthew Jordan. What is an Unmanned Aerial System?. Difference between Unmanned Aerial Systems and Remotely Piloted Aircraft. How this applies to your future. Remotely Piloted Aircraft. Reconnaissance. Jeremiah Blocki. Manuel Blum. Anupam Datta. Santosh Vempala. Previous Work. Naturally Rehearsing Passwords. Presentation . on . Thursday. Password Management. p. 5. p. 4. p. 3. p. 2. p. 1. 3. Competing Goals:. Avast Security gives you the most advanced security against all types of threats. Avast offers a wide range of security products at a great price. To Download, Visit: http://bit.ly/BuyAvastSecurity Or Contact: 855-318-7825 One-click virtual machine optimized storage creation can deploy hundreds of virtual machines and desktops in minutes, not hours. Built-in backup and data replication via unlimited Raw Capacity 22 TB

Download Document

Here is the link to download the presentation.
"Introduction to Usable Security"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents