PDF-(BOOS)-Security and Usability Designing Secure Systems that People Can Use
Author : treyvenfowler | Published Date : 2023-03-14
Human factors and usability issues have traditionally played a limited role in security research and secure systems development Security experts have largely ignored
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "(BOOS)-Security and Usability Designing ..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
(BOOS)-Security and Usability Designing Secure Systems that People Can Use: Transcript
Human factors and usability issues have traditionally played a limited role in security research and secure systems development Security experts have largely ignored usability issuesboth because they often failed to recognize the importance of human factors and because they lacked the expertise to address themBut there is a growing recognition that todays security problems can be solved only by addressing issues of usability and human factors Increasingly wellpublicized security breaches are attributed to human errors that might have been prevented through more usable software Indeed the worlds future cybersecurity depends upon the deployment of security technology that can be broadly used by untrained computer usersStill many people believe there is an inherent tradeoff between computer security and usability Its true that a computer without passwords is usable but not very secure A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure but nobody would use it Clearly people need computers and if they cant use one thats secure theyll use one that isnt Unfortunately unsecured systems arent usable for long either They get hacked compromised and otherwise rendered uselessThere is increasing agreement that we need to design secure systems that people can actually use but less agreement about how to reach this goal Security amp Usability is the first booklength work describing the current state of the art in this emerging field Edited by security experts Dr Lorrie Faith Cranor and Dr Simson Garfinkel and authored by cuttingedge security and humancomputerinteraction HCI researchers worldwide this volume is expected to become both a classic reference and an inspiration for future researchSecurity amp Usability groups 34 essays into six partsRealigning Usability and Securitywith careful attention to usercentered design principles security and usability can be synergisticAuthentication Mechanisms techniques for identifying and authenticating computer usersSecure Systemshow system software can deliver or destroy a secure user experiencePrivacy and Anonymity Systemsmethods for allowing people to control the release of personal informationCommercializing Usability The Vendor Perspectivespecific experiences of security and software vendors egIBM Microsoft Lotus Firefox and Zone Labs in addressing usabilityThe Classicsgroundbreaking papers that sparked the field of security and usabilityThis book is expected to start an avalanche of discussion new ideas and further advances in this important field. Adam Shostack. Microsoft. Outline. Engineering in Large Projects. Threat Modeling. Usability Tools. A Software Engineer’s Day. Solve customer problems. Write code. Build cool stuff. Change the world. Sunday, June 20, 2010. 2. Designing Efficiencies and Performance. into Your Security Platform. Introductions. Fundamentals of Creating an Effective Program. Current State - Legacy Systems . Future State - Integration versus Interfacing. N. etwork using ‘Stealth’ Networks with Avaya Fabric Connect. Ed Koehler . – . Director – WW DSE. Distinguished Engineer. Privacy in a Virtualized World. Network and Service Virtualization have transformed the IT industry. Ali Alhamdan, PhD. National Information Center . Ministry . of . Interior. April 28. th. , 2015. Command and Control Systems . Collection of . technology. , people, information and business. All military functions and operations. Introduction. Fundamentals . Capability Security. Challenges in Secure Capability Systems. Revoking Capabilities. Conclusion. CONTENTS. A capability system is an operating system that represents its access control policy from the subject’s perspective.. Activity . Resource. . C. oordination. : . E. mpirical. . E. vidence. . of . E. nhanced. . S. ecurity . A. wareness . in . Designing . S. ecure. . B. usiness. Processes. Oct 2008. Reviewed . by. Edward Chow. Professor of Computer Science. University of Colorado at Colorado Springs. Freshmen Welcome 2009. Chow. 1. Outline of the Talk. Security Related Projects at UCCS. iCTF. cyber war competition, you are wanted!. Introduction. Jan . 8, 2013. IS 2620. James Joshi, . Associate Professor. Contact. James Joshi. 706A, IS Building. Phone: 412-624-9982 . E-mail: . jjoshi@mail.sis.pitt.edu. Web: . http://www.sis.pitt.edu/~jjoshi/courses/IS2620/Spring13/. Systems. RIC-2017. Supriya . Kamthania, . Balaji K, Pradyumna . Padhan. 3. rd. April 2017. Agenda. 2. Introduction. RISC-V for Open Systems & Threat Landscape. Hardware and Firmware Security. Secure Management. Sep.12.2014. Jürgen Frank . | . Sr. System Engineer. Agenda. Introduction. Automotive Security . Use. -Case. Security Timeline . Standards. EVITA. SHE. HSM . TPM. Security Modules . Introduction. Security Use . Jason Franklin. With . Anupam. . Datta. , Deepak . Garg. , . Dilsun. . Kaynar. . CyLab, Carnegie Mellon University. Motivation: Secure Access to Financial Data. 2. . Network. Goal:. . An end-to-end trusted path in presence of local and network adversaries. Building Trustworthy, Secure Systems for the United States Critical Infrastructure An Urgent National Imperative The Current Landscape. It’s a dangerous world in cyberspace… Cyber Risk. Function Fall 2014. 1. Anthony Tang. Learning Objectives. At the end of this lecture, you should be able to:. » Know how to select users for a usability test, and how many. » Be able to describe how to analyze data. Everyone expects the products and services they use to be secure but \'building security in\' at the earliest stages of a system\'s design also means designing for use as well. Software that is unusable to end-users and unwieldy to developers and administrators may be insecure as errors and violations may expose exploitable vulnerabilities.nbspThis book shows how practitioners and researchers can build both security and usability into the design of systems.nbspIt introduces the IRIS framework and the open source CAIRIS platform that can guide the specification of secure and usable software. It also illustrates how IRIS and CAIRIS can complement techniques from User Experience Security Engineering and Innovation amp Entrepreneurship in ways that allow security to be addressed at different stages of the software lifecycle without disruption.nbsp Real-world examples are provided of the techniques and processes illustrated in this book making this text a resource for practitioners researchers educators and students.
Download Document
Here is the link to download the presentation.
"(BOOS)-Security and Usability Designing Secure Systems that People Can Use"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents