| 000 | 00000cam u2200205 a 4500 | |
| 001 | 000045936677 | |
| 005 | 20180328112224 | |
| 008 | 180327s2005 cc a b 001 0 eng d | |
| 010 | ▼a 2006271007 | |
| 015 | ▼a GBA578560 ▼2 bnb | |
| 020 | ▼a 0596008279 (pbk.) | |
| 035 | ▼a (KERIS)REF000012532804 | |
| 040 | ▼a UKM ▼b eng ▼c UKM ▼d BAKER ▼d DST ▼d IXA ▼d DLC ▼d 211009 | |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b S3758 2005 |
| 082 | 0 4 | ▼a 005.8 ▼2 23 |
| 084 | ▼a 005.8 ▼2 DDCK | |
| 090 | ▼a 005.8 ▼b S44691 | |
| 245 | 0 0 | ▼a Security and usability : ▼b designing secure systems that people can use / ▼c edited by Lorrie Faith Cranor & Simson Garfinkel. |
| 260 | ▼a Beijing ; ▼a Sebastapol, CA : ▼b O'Reilly, ▼c c2005. | |
| 300 | ▼a xviii, 714 p. : ▼b ill. ; ▼c 24 cm. | |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Computer security. |
| 700 | 1 | ▼a Cranor, Lorrie Faith. |
| 700 | 1 | ▼a Garfinkel, Simson. |
| 945 | ▼a KLPA |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 S44691 | 등록번호 121243920 (2회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.
But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.
Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless.
There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.
Security & Usability groups 34 essays into six parts:
- Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic.
- Authentication Mechanisms-- techniques for identifying and authenticating computer users.
- Secure Systems--how system software can deliver or destroy a secure user experience.
- Privacy and Anonymity Systems--methods for allowing people to control the release of personal information.
- Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g., IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.
- The Classics--groundbreaking papers that sparked the field of security and usability.
This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.
정보제공 :
저자소개
Simson Garfinkel(지은이)
1965년 7월 12일, 미국에서 태어나 현재 매사추세츠주 캠브리지에서 아내와 예쁜 딸과 함께 살고 있다. 금빛 눈동자에 갈색 고수머리, 무난한 성격으로 대표되는 O형 혈액형을 지닌 저자를 더 자세히 알고 싶다면 저자의 홈페이지(http://simson.net/)를 방문해 보라. MIT와 콜롬비아대학에서 수학하고, 현재 첨단기술 기업인이자 언론인으로 활동 중이다. 컴퓨터 사용자들을 대상으로 한 「보스톤글로브」의 주간 칼럼 '심슨 세즈(Simson Says)'가 유명하며, 그밖에도 「와이어드」「컴퓨터월드」「포브스」「뉴욕타임즈」「테크놀로지리뷰」등 50종이 넘는 출판물에 글을 기고했다.
Lorrie Faith Cranor(엮은이)
목차
Preface p. ix Part 1 Realigning Usability and Security p. xxi 1 Psychological Acceptability Revisited Matt Bishop p. 1 2 Usable Security M. Angela Sasse and Ivan Flechais p. 13 3 Design for Usability Bruce Tognazzini p. 31 4 Usability Design and Evaluation for Privacy and Security Solutions Clare-Marie Karat and Carolyn Brodie and John Karat p. 47 5 Designing Systems That People Will Trust Andrew S. Patrick and Pamela Briggs and Stephen Marsh p. 75 Part 2 Authentication mechanisms p. 101 6 Evaluating Authentication Mechanisms Karen Renaud p. 103 7 The Memorability and Security of Passwords Jeff Yan and Alan Blackwell and Ross Anderson and Alasdair Grant p. 129 8 Designing Authentication Systems with Challenge Questions Mike Just p. 143 9 Graphical Passwords Fabian Monrose and Michael K. Reiter p. 157 10 Usable Biometrics Lynne Coventry p. 175 11 Identifying Users from Their Typing Patterns Alen Peacock and Xian Ke and Matt Wilkerson p. 199 12 The Usability of Security Devices Ugo Piazzalunga and Paolo Salvaneschi and Paolo Coffetti p. 221 Part 3 Secure Systems p. 245 13 Guidelines and Strategies for Secure Interaction Design Ka-Ping Yee p. 247 14 Fighting Phishing at the User Interface Robert C. Miller and Min Wu p. 275 15 Sanitization and Usability Simson Garfinkel p. 293 16 Making the Impossible Easy: Usable PKI Dirk Balfanz and Glenn Durfee and D. K. Smetters p. 319 17 Simple Desktop Security with Chameleon A. Chris Long and Courtney Moskowitz p. 335 18 Security Administration Tools and Practices Eser Kandogan and Eben M. Haber p. 357 Part 4 Privacy and Anonymity Systems p. 379 19 Privacy Issues and Human-Computer Interaction Mark S. Ackerman and Scott D. Mainwaring p. 381 20 A User-Centric Privacy Space Framework Benjamin Brunk p. 401 21 Five Pitfalls in the Design for Privacy Scott Lederer and Jason I. Hong and Anind K. Dey and James A. Landay p. 421 22 Privacy Policies and Privacy Preferences Lorrie Faith Cranor p. 447 23 Privacy Analysis for the Casual User with Bugnosis David Martin p. 473 24 Informed Consent by Design Batya Friedman and Peyina Lin and Jessica K. Miller p. 495 25 Social Approaches to End-User Privacy Management Jeremy Goecks and Elizabeth D. Mynatt p. 523 26 Anonymity Loves Company: Usability and the Network Effect Roger Dingledine and Nick Mathewson p. 547 Part 5 Commercializing Usability: The Vendor Perspective p. 561 27 ZoneAlarm: Creating Usable Security Products for Consumers Jordy Berson p. 563 28 Firefox and the Worry-Free Web Blake Ross p. 577 29 Users and Trust: A Microsoft Case Study Chris Nodder p. 589 30 IBM Lotus Notes/Domino: Embedding Security in Collaborative Applications Mary Ellen Zurko p. 607 31 Achieving Usable Security in Groove Virtual Office George Moromisato and Paul Boyd and Nimisha Asthagiri p. 623 Part 6 The Classics p. 637 32 Users Are Not the Enemy Anne Adams and M. Angela Sasse p. 639 33 Usability and Privacy: A Study of KaZaA P2P File Sharing Nathaniel S. Good and Aaron Krekelberg p. 651 34 Why Johnny Can''t Encrypt Alma Whitten and J. D. Tygar p. 669 Index p. 693
