Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

backups

     DELETE command, Windows

     encrypting data on

Balfanz, Dirk

Barbi web site, violating informed consent principles

behavioral biometrics

benchmark studies, setting usability goals

benevolence, trustworthiness and

Berson, Jordy

BHOs (Browser Helper Objects), Bugnosis and

binary security model, VPNs

biometric authentication 2nd 3rd 4th 5th 6th

     accessibility factors

         outlier accommodation

     applications for 2nd

     ATMs

     capture

     enrolling users

     face systems

     fingerprint systems 2nd

     flaws in

     handprint systems

     iris systems

     key predictability

     keystroke systems 2nd

         evaluating

         tips for producing reliable results

     market growth in

     memorability of

     portable biometric devices

     privacy/security issues

     remote

     retina systems

     time factor

     users and

         acceptance

     verification techniques

biometrics

BioPassword

Bishop, Matt

Blackwell, Alan

blocks

     on free list, overwriting

bodystorming, interface design

bootstrapping

     iPKIs and

Boyd, Paul

breakability, authentication security

Briggs, Pamela

Bro network-monitoring tool

Brodie, Carolyn

Browser Helper Objects (BHOs), Bugnosis and

Brunk, Benjamin

brute force attacks 2nd

Bugnosis

     architecture

     audience for

     future directions

     graphic identity

     source code

     theory of operation

     user alerts

     web bugs, defining

     web security, user awareness of

bugtraq

bulletin boards, sense of community in

business sector, security breaches in

Категории