CYBER 101

  • Alerts
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Documents
  • Domains
  • Entertainment
  • FAQ
  • Incidents
  • Quotes
  • Tools
  • Tutorials

Join our newsletter

FOLLOW US

Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial
No Result
View All Result

Security and Usability: Designing Secure Systems that People Can Use

Lorrie Faith Cranor, Simson Garfinkel

2 min read
in Book, Learning

 

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues–both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today’s security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world’s future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It’s true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can’t use one that’s secure, they’ll use one that isn’t. Unfortunately, unsecured systems aren’t usable for long, either. They get hacked, compromised, and otherwise rendered useless.

There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

Security & Usability groups 34 essays into six parts:

  • Realigning Usability and Security—with careful attention to user-centered design principles, security and usability can be synergistic.
  • Authentication Mechanisms– techniques for identifying and authenticating computer users.
  • Secure Systems–how system software can deliver or destroy a secure user experience.
  • Privacy and Anonymity Systems–methods for allowing people to control the release of personal information.
  • Commercializing Usability: The Vendor Perspective–specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.
  • The Classics–groundbreaking papers that sparked the field of security and usability.

This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.

Related

Tags: CybersecurityCybersecurity BooksLearningLorrie Faith CranorSecurity UXSecurity UX BooksSimson Garfinkel
15
VIEWS
ADVERTISEMENT

Related Posts

6 Books about Threat Hunting

6 Books about Threat Hunting

August 2, 2022
Secure Coding – Secure application development

Secure Coding – Secure application development

July 29, 2022
FT120 – Fortify SAST and DAST for Developers (ILT/VILT)

Application Security – The Complete Guide

July 29, 2022
FT120 – Fortify SAST and DAST for Developers (ILT/VILT)

FT120 – Fortify SAST and DAST for Developers (ILT/VILT)

July 29, 2022

More Articles

Change management

November 7, 2020
Book

Jump-start Your SOC Analyst Career

March 15, 2022
Alerts

Intel Security Advisory

October 14, 2021
Course

GRAMM-LEACH-BLILEY ACT (GLBA) TRAINING

June 14, 2022
Incidents

New MetaMask phishing campaign uses KYC lures to steal passphrases

June 23, 2022

Address

October 27, 2020

How to become a penetration tester

July 15, 2022
Alerts

F5 security advisory (AV22-154)

March 29, 2022
Load More

World’s number one cybersecurity repository. Find everything you need about cybersecurity.

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Attackers
    • Incidents
    • Threats
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Quotes

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.