Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security and Usability: Designing Secure Systems That People Can Use

Buy

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless.There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer

interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

Security & Usability groups 34 essays into six parts:
  • Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic.

  • Authentication Mechanisms-- techniques for identifying and authenticating computer users.

  • Secure Systems--how system software can deliver or destroy a secure user experience.

  • Privacy and Anonymity Systems--methods for allowing people to control the release of personal information.

  • Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,
    IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.

  • The Classics--groundbreaking papers that sparked the field of security and usability.

This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

(HTML tags aren't allowed.)

A Concise Introduction to Software Engineering (Undergraduate Topics in Computer Science)
A Concise Introduction to Software Engineering (Undergraduate Topics in Computer Science)
Software engineering is an integral part of studies in computer science and consequently foundational knowledge is critical to all students in the field. This text focuses on the essential elements, providing readers with the basic skills and introductory knowledge required to execute a software project successfully.

Following the winning...

Foam Films and Foams: Fundamentals and Applications (Progress in Colloid and Interface Science)
Foam Films and Foams: Fundamentals and Applications (Progress in Colloid and Interface Science)

This book describes in detail the scientific philosophy of the formation and stabilization-destabilization of foams. It presents all hierarchical steps of a foam, starting from the properties of adsorption layers formed by foaming agents, discussing the properties of foam films as the building blocks of a foam, and then describing...

XML Web Services Professional Projects
XML Web Services Professional Projects
Use XML Web Services Professional Projects to accomplish real-world professional tasks. Incorporating nine hands-on projects, XML Web Services Professional Projects is your key to unlocking the power of XML Web services. Each project focuses on developing and deploying Web services by using several vendor-provided tools. These projects are based on...

Complete PCB Design Using OrCad Capture and Layout
Complete PCB Design Using OrCad Capture and Layout
Complete PCB Design Using OrCAD Capture and Layout is the first book to offer a complete guide on how to use the OrCAD design suite to design and manufacture printed circuit boards. Professionals and students will find this book to be an easily accessible resource covering topics from the basic PCB design principles to advanced levels of specific...
Groovy in Action
Groovy in Action
Groovy, the brand-new language for the Java platform, brings to Java many of the features that have made Ruby popular. Groovy in Action is a comprehensive guide to Groovy programming, introducing Java developers to the new dynamic features that Groovy provides. To bring you Groovy in Action, Manning again went to the source by...
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)

The rapid growth of the Web in the past two decades has made it the largest publicly accessible data source in the world. Web mining aims to discover useful information or knowledge from Web hyperlinks, page contents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy