Buch, Englisch, 412 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 576 g
Buch, Englisch, 412 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 576 g
ISBN: 978-0-367-65692-8
Verlag: Taylor & Francis Ltd (Sales)
There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is possible to increase usability and security by revisiting design decisions made in the past; in others, to align security and usability by changing the regulatory environment in which the computers operate. This book addresses creation of a usable security protocol for user authentication as a natural outcome of the requirements and design phase of the authentication method development life cycle.
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Software Engineering
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerkprotokolle
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Mathematik | Informatik Mathematik Mathematik Allgemein
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Programmierung: Methoden und Allgemeines
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
Weitere Infos & Material
Why this Book?
Acknowledgments
1 Usability and Security: Conflicts and Interdependencies
2 Panoramic Overview of User Authentication Techniques
3 Usable Security Concerns Related to Authentication Methods
4 Fundamentals of the Usable Security Protocol for User Authentication
5 The Usable Security Protocol Methodology: Define, Identify, and Develop
6 The Usable Security Protocol Methodology: Assess and Generate
7 The Usable Security Protocol Methodology: Formulate
8 The Usable Security Protocol Methodology: Demonstrate
Appendix 1: Authentication Risk-Assessment Matrix
Appendix 2: Usability Severity Ratings and Recommendations for MTM
Appendix 3: Security Severity Ratings and Recommendations for MTM
Additional Reading
References
Index