Wiley Handbook of Science and Technology for Homeland Security 2008
DOI: 10.1002/9780470087923.hhs457
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Technology Usability and Management

Abstract: Usability and security are no longer at odds, but instead increasingly seen as two critical components of effective cyber systems. This article reviews recent results on designing systems that are usable, useful, and secure, and describes general principles important in the management of secure systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Previously, a majority of efforts had sought to evaluate and enhance existing mechanisms by lending them greater usability. In contrast, some authors began to argue for the need to redesign security mechanisms from the ground up and integrate them into an application as a functional component and not as an element to be added afterwards [ 35 ]. This approach attempted to avoid the conception of the functionality of the service and the security mechanisms separately.…”
Section: User-centered Securitymentioning
confidence: 99%
“…Previously, a majority of efforts had sought to evaluate and enhance existing mechanisms by lending them greater usability. In contrast, some authors began to argue for the need to redesign security mechanisms from the ground up and integrate them into an application as a functional component and not as an element to be added afterwards [ 35 ]. This approach attempted to avoid the conception of the functionality of the service and the security mechanisms separately.…”
Section: User-centered Securitymentioning
confidence: 99%
“…For insider attack detection, Bayesian networks are introduced to model, capture, and analyze anomalous data streams or state transitions (Valdes & Skinner, 2000). Ongoing research also examines human susceptibility to phishing (e.g., Egelman, Cranor, & Hong, 2008) and management of passwords (Smetters, 2014) to inform engineering design and security practices that minimize leaks of credentials.…”
Section: Introductionmentioning
confidence: 99%