Security and Usability (Paperback)
暫譯: 安全性與可用性 (平裝本)

Lorrie Faith Cranor, Simson Garfinkel

  • 出版商: O'Reilly
  • 出版日期: 2005-10-04
  • 定價: $1,575
  • 售價: 2.5$399
  • 語言: 英文
  • 頁數: 740
  • 裝訂: Paperback
  • ISBN: 0596008279
  • ISBN-13: 9780596008277
  • 相關分類: 資訊安全
  • 立即出貨 (庫存=1)

買這商品的人也買了...

商品描述


Description:

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless.

There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer
interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

Security & Usability groups 34 essays into six parts:

  • Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic.
  • Authentication Mechanisms-- techniques for identifying and authenticating computer users.
  • Secure Systems--how system software can deliver or destroy a secure user experience.
  • Privacy and Anonymity Systems--methods for allowing people to control the release of personal information.
  • Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,
    IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.
  • The Classics--groundbreaking papers that sparked the field of security and usability.


This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

 

 

Table of Contents:

1. Preface

Part. Realigning Usability and Security

1. Psychological Acceptability Revisited
Matt Bishop 1

2. Usable Security
M. Angela Sasse and Ivan Flechais 13

3. Design for Usability
Bruce Tognazzini 29

4. Usability Design and Evaluation for Privacy and Security Solutions
Clare-Marie Karat, Carolyn Brodie, and John Karat 45

5. Designing Systems That People Will Trust
Andrew S. Patrick, Pamela Briggs, and Stephen Marsh 71

Part. Authentication Mechanisms

6. Evaluating Authentication Mechanisms
Karen Renaud 97

7. The Memorability and Security of Passwords
Jeff Yan, Alan Blackwell, Ross Anderson, and Alasdair Grant 121

8. Designing Authentication Systemswith Challenge Questions
Mike Just 135

9. Graphical Passwords
Fabian Monrose and Michael K. Reiter 147

10. Usable Biometrics
Lynne Coventry 165

11. Identifying Users from Their Typing Patterns
Alen Peacock, Xian Ke, and Matt Wilkerson 187

12. The Usability of Security Devices
Ugo Piazzalunga, Paolo Salvaneschi, and Paolo Coffetti 209

Part. Secure Systems

13. Guidelines and Strategies for Secure Interaction Design
Ka-Ping Yee 235

14. Fighting Phishing at the User Interface
Robert C. Miller and Min Wu 263

15. Sanitization and Usability
Simson Garfinkel 281

16. Making the Impossible Easy: Usable PKI
Dirk Balfanz, Glenn Durfee, and D.K. Smetters 305

17. Simple Desktop Security with Chameleon
A. Chris Long and Courtney Moskowitz 321

18. Security Administration Tools and Practices
Eser Kandogan and Eben M. Haber 343

Part. Privacy and Anonymity Systems

19. Privacy Issues and Human-Computer Interaction
Mark S. Ackerman and Scott D. Mainwaring 365

20. A User-Centric Privacy Space Framework
Benjamin Brunk 383

21. Five Pitfalls in the Design for Privacy
Scott Lederer, Jason I. Hong, Anind K. Dey, and James A. Landay 403

22. Privacy Policies and Privacy Preferences
Lorrie Faith Cranor 429

23. Privacy Analysis for the Casual User with Bugnosis
David Martin 455

24. Informed Consent by Design
Batya Friedman, Peyina Lin, and Jessica K. Miller 477

25. Social Approaches to End-User Privacy Management
Jeremy Goecks and Elizabeth D. Mynatt 505

26. Anonymity Loves Company: Usability and the Network Effect
Roger Dingledine and Nick Mathewson 529

Part. Commercializing Usability: The Ventor Perspective

27. ZoneAlarm: Creating Usable Security Products for Consumers
Jordy Berson 545

28. Firefox and the Worry-Free Web
Blake Ross 559

29. Users and Trust: A Microsoft Case Study
Chris Nodder 571

30. IBM Lotus Notes/Domino: Embedding Security in Collaborative Applications
Mary Ellen Zurko 589

31. Achieving Usable Security in Groove Virtual Office
George Moromisato, Paul Boyd, and Nimisha Asthagiri 605

Part. The Classics

32. Users Are Not the Enemy
Anne Adams and M. Angela Sasse 619

33. Usability and Privacy:A Study of KaZaA P2P File Sharing
Nathaniel S. Good and Aaron Krekelberg 631

34. Why Johnny Can't Encrypt
Alma Whitten and J. D. Tygar 649

Index

商品描述(中文翻譯)

描述:
人因因素和可用性問題在安全研究和安全系統開發中傳統上扮演的角色有限。安全專家在很大程度上忽視了可用性問題,這既是因為他們常常未能認識到人因因素的重要性,也因為他們缺乏解決這些問題的專業知識。

但越來越多的人認識到,當今的安全問題只能通過解決可用性和人因因素的問題來解決。越來越多的知名安全漏洞被歸因於人為錯誤,而這些錯誤本可以通過更可用的軟體來避免。事實上,世界未來的網路安全依賴於能夠被未經訓練的電腦使用者廣泛使用的安全技術。

儘管如此,許多人仍然認為電腦安全和可用性之間存在固有的權衡。確實,沒有密碼的電腦是可用的,但安全性不高。一台要求你每五分鐘用密碼和新鮮血液進行身份驗證的電腦可能非常安全,但沒有人會使用它。顯然,人們需要電腦,如果他們無法使用安全的電腦,他們就會使用不安全的電腦。不幸的是,無安全保障的系統也無法長期使用。它們會被駭客入侵、受到損害,或以其他方式變得無用。

越來越多的人達成共識,我們需要設計人們實際上可以使用的安全系統,但對於如何達成這一目標的共識較少。《安全與可用性》是第一本描述這一新興領域當前技術狀態的書籍。由安全專家Dr. Lorrie Faith Cranor和Dr. Simson Garfinkel編輯,並由全球前沿的安全和人機互動(HCI)研究人員撰寫,這本書預計將成為經典參考資料並激發未來的研究。

《安全與可用性》將34篇論文分為六個部分:
1. 重新調整可用性和安全性——在用戶中心設計原則的仔細考量下,安全性和可用性可以形成協同效應。
2. 身份驗證機制——識別和驗證電腦使用者的技術。
3. 安全系統——系統軟體如何提供或破壞安全的用戶體驗。
4. 隱私和匿名系統——允許人們控制個人信息發布的方法。
5. 商業化可用性:供應商的視角——安全和軟體供應商(例如IBM、Microsoft、Lotus、Firefox和Zone Labs)在解決可用性問題方面的具體經驗。
6. 經典文獻——開創安全與可用性領域的開創性論文。

這本書預計將引發大量討論、新想法和在這一重要領域的進一步進展。

目錄:
1. 前言
2. 部分:重新調整可用性和安全性
1. 心理可接受性再探討
2. 可用的安全性
3. 可用性設計
4. 隱私和安全解決方案的可用性設計與評估
5. 設計人們會信任的系統
3. 部分:身份驗證機制
6. 評估身份驗證機制
7. 密碼的可記憶性和安全性
8. 設計帶有挑戰問題的身份驗證系統
9. 圖形密碼
10. 可用的生物識別技術
11. 根據打字模式識別使用者
12. 安全設備的可用性
4. 部分:安全系統
13. 安全互動設計的指導方針和策略
14. 在用戶界面上對抗網路釣魚
15. 清理和可用性
16. 使不可能變得簡單:可用的PKI
17. 使用Chameleon的簡單桌面安全
18. 安全管理工具和實踐
5. 部分:隱私和匿名系統
19. 隱私問題和人機互動
20. 以用戶為中心的隱私空間框架
21. 隱私設計中的五個陷阱
22. 隱私政策和隱私偏好
23. 使用Bugnosis進行的普通用戶隱私分析
24. 設計中的知情同意
25. 終端用戶隱私管理的社會方法
26. 匿名喜歡公司:可用性和網路效應
6. 部分:商業化可用性:供應商的視角
27. ZoneAlarm:為消費者創造可用的安全產品
28. Firefox和無憂網路
29. 使用者與信任:微軟案例研究
30. IBM Lotus Notes/Domino:在協作應用中嵌入安全性
31. 在Groove虛擬辦公室中實現可用的安全性
7. 部分:經典文獻
32. 使用者不是敵人
33. 可用性和隱私:KaZaA P2P文件共享的研究
34. 為什麼Johnny無法加密
索引