๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Security and Usability: Designing Secure Systems That People Can Use

โœ Scribed by Lorrie Faith Cranor, Simson Garfinkel


Publisher
O'Reilly Media
Year
2005
Tongue
English
Leaves
738
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security & Usability groups 34 essays into six parts: Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems--how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems--methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g., IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The Classics--groundbreaking papers that sparked the field of security and usability. This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.


๐Ÿ“œ SIMILAR VOLUMES


Security and Usability: Designing Secure
โœ Lorrie Faith Cranor, Simson Garfinkel ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› O'Reilly Media ๐ŸŒ English

Computer users have been taught for years that computer security systems can't be effective unless they are complex and difficult to use. In reality, this conventional wisdom is completely wrong. Tomorrow's computers won't be secure unless researchers, designers, and programmers can invent new ways

Forms for people: designing forms that p
โœ Barnett, Robert ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› 1st Impression Publishing ๐ŸŒ English

'Forms For People, ' by Robert Barnett, is a 512 page comprehensive manual on the design and production of business forms. The book has been written for both the experienced forms analyst as well as the novice and part-time form designer and is based on the author's experience in the industry for ov

Designing Usable and Secure Software wit
โœ Shamal Faily ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Springer ๐ŸŒ English

Everyone expects the products and services they use to be secure, but 'building security in' at the earliest stages of a system's design also means designing for use as well. Software that is unusable to end-users and unwieldy to developers and administrators may be insecure as errors and violations

Designing Usable and Secure Software wit
โœ Shamal Faily ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Springer ๐ŸŒ English

Everyone expects the products and services they use to be secure, but 'building security in' at the earliest stages of a system's design also means designing for use as well. Software that is unusable to end-users and unwieldy to developers and administrators may be insecure as errors and violations

Designing Secure Systems
โœ Michael Melone ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› CRC Press ๐ŸŒ English

Modern systems are an intertwined mesh of human process, physical security, and technology. Many times, an attacker will leverage a weakness in one form of security to gain control over an otherwise protected operation. Designing Secure Systems takes a theory-based approach to concepts underlying

Designing Secure Systems
โœ Michael Melone ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› CRC Press ๐ŸŒ English

<p>Modern systems are an intertwined mesh of human process, physical security, and technology. Many times, an attacker will leverage a weakness in one form of security to gain control over an otherwise protected operation.</p> <p>Designing Secure Systems takes a theory-based approach to concepts und