Atjaunināt sīkdatņu piekrišanu

Usable Security: History, Themes, and Challenges [Mīkstie vāki]

3.60/5 (10 ratings by Goodreads)
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 59,85 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
Citas grāmatas par šo tēmu:
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future research.
Acknowledgments xi
Figure Credits
xiii
1 Introduction
1(12)
1.1 Why Usable Privacy and Security Is Hard
3(1)
1.2 Why Usable Security Research Is Hard
4(3)
1.3 This Book
7(1)
1.4 Methodology
7(1)
1.5 Scope
8(1)
1.6 Definitions
8(2)
1.6.1 Security
8(1)
1.6.2 Usability
9(1)
1.6.3 Privacy
9(1)
1.7 Related Surveys and Studies
10(3)
2 A Brief History of Usable Privacy and Security Research
13(10)
2.1 Early Work (1975--1995)
13(1)
2.2 The Birth of UPS (1995--2000)
14(4)
2.3 Creation of the UPS Research Community (2000--2005)
18(1)
2.4 Mechanical Turk
19(1)
2.5 Current UPS Publishing Venues
20(3)
3 Major Themes in UPS Academic Research
23(64)
3.1 User Authentication
23(28)
3.1.1 Text Passwords
24(13)
3.1.2 Password Managers
37(3)
3.1.3 Graphical Authentication
40(3)
3.1.4 Biometrics
43(3)
3.1.5 Token-Based Authentication
46(1)
3.1.6 Mental Computation and One-Time Passwords
47(1)
3.1.7 CAPTCHAs
48(2)
3.1.8 Fallback and Backup Authentication
50(1)
3.2 Email Security and PKI
51(4)
3.2.1 Automatic, Transparent Encryption
53(1)
3.2.2 Future of Secure Messaging
54(1)
3.3 Anti-Phishing Efforts
55(10)
3.3.1 A Brief History of Phishing
56(2)
3.3.2 Passive Security Indicators
58(4)
3.3.3 Active Security Warnings
62(1)
3.3.4 Training
63(2)
3.3.5 Password Managers
65(1)
3.4 Storage
65(1)
3.5 Device Pairing
66(4)
3.6 Web Privacy and Fair Information Practice
70(5)
3.6.1 Privacy Policies
70(1)
3.6.2 P3P
71(2)
3.6.3 Behavioral Advertising
73(1)
3.6.4 Summary
74(1)
3.7 Policy Specification and Interaction
75(3)
3.8 Mobile Security and Privacy
78(3)
3.8.1 Location Privacy
78(1)
3.8.2 Application platforms
79(1)
3.8.3 Mobile authentication
80(1)
3.9 Social Media Privacy
81(3)
3.10 Security Administrators
84(3)
4 Lessons Learned
87(6)
4.1 Reduce Decisions
87(1)
4.2 Safe and Secure Defaults
88(1)
4.3 Provide Users with Better Information, not More Information
88(1)
4.4 Users Require Clear Context to Make Good Decisions
89(1)
4.5 Information Presentation is Critical
90(1)
4.6 Education Works, But Has Limits
90(3)
5 Research Challenges
93(12)
5.1 Subject Challenge: Authentication
93(1)
5.2 Subject Challenge: Adversary Modeling
94(1)
5.3 Subject Challenge: Administrators and System Administration
95(1)
5.4 Subject Challenge: Consumer Privacy
96(1)
5.5 Subject Challenge: Social Computing
97(2)
5.6 Domain Challenge: Ecological Validity
99(1)
5.7 Domain Challenge: Teaching
100(5)
6 Conclusion: The Next Ten Years
105(4)
Bibliography 109(40)
Authors' Biographies 149