Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security, Privacy and User Interaction
~
Jakobsson, Markus.
Security, Privacy and User Interaction
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Security, Privacy and User Interaction/ edited by Markus Jakobsson.
other author:
Jakobsson, Markus.
Description:
XV, 153 p. 52 illus., 24 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-3-030-43754-1
ISBN:
9783030437541
Security, Privacy and User Interaction
Security, Privacy and User Interaction
[electronic resource] /edited by Markus Jakobsson. - 1st ed. 2020. - XV, 153 p. 52 illus., 24 illus. in color.online resource.
PART I: Considering the Typical User -- 1. Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication -- 2. Permissions and Privacy -- 3. Privacy and Tracking -- PART II: Considering the Malicious User -- 4. A Framework for Analysis Attackers’ Accounts -- 5. Environmentally and Politically Conscious Crypto -- Part III: Designing Solutions Based on Typical and Malicious Users -- 6. Social Engineering Resistant 2FA -- 7. The Rising Threat of Launchpad Attacks -- 8. Discouraging Counterfeiting -- 9. Seeing the Future.
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users – including malicious users, aiming to corrupt the system – this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.
ISBN: 9783030437541
Standard No.: 10.1007/978-3-030-43754-1doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security, Privacy and User Interaction
LDR
:03040nam a22003855i 4500
001
1018179
003
DE-He213
005
20201027202159.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030437541
$9
978-3-030-43754-1
024
7
$a
10.1007/978-3-030-43754-1
$2
doi
035
$a
978-3-030-43754-1
050
4
$a
QA76.9.A25
072
7
$a
URD
$2
bicssc
072
7
$a
COM060040
$2
bisacsh
072
7
$a
URD
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Security, Privacy and User Interaction
$h
[electronic resource] /
$c
edited by Markus Jakobsson.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XV, 153 p. 52 illus., 24 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
PART I: Considering the Typical User -- 1. Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication -- 2. Permissions and Privacy -- 3. Privacy and Tracking -- PART II: Considering the Malicious User -- 4. A Framework for Analysis Attackers’ Accounts -- 5. Environmentally and Politically Conscious Crypto -- Part III: Designing Solutions Based on Typical and Malicious Users -- 6. Social Engineering Resistant 2FA -- 7. The Rising Threat of Launchpad Attacks -- 8. Discouraging Counterfeiting -- 9. Seeing the Future.
520
$a
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users – including malicious users, aiming to corrupt the system – this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.
650
0
$a
Computer security.
$3
557122
650
0
$a
User interfaces (Computer systems).
$3
1253526
650
0
$a
Computer crimes.
$3
564161
650
1 4
$a
Privacy.
$3
575491
650
2 4
$a
User Interfaces and Human Computer Interaction.
$3
669793
650
2 4
$a
Computer Crime.
$3
1226852
700
1
$a
Jakobsson, Markus.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
894514
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030437534
776
0 8
$i
Printed edition:
$z
9783030437558
856
4 0
$u
https://doi.org/10.1007/978-3-030-43754-1
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login