Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

face verification, biometric authentication

Faces software prototype

     design

     formative evaluation

     halting/resuming disclosure

fact-based questions, challenge questions systems

fail-safe defaults, configurations violating

Fair Information Practices (FIP), Code of

fake

     answers, challenge questions systems

     password prompts

familiarity, trust and

file access

     permissions

     special privileges, Netscape Navigator

file allocation table

files

     APPEL preference, importing with Privacy Bird

     deleting

         securely

     organizing in Chameleon

     overwriting, Save As command

     policy reference (P3P)

     sanitizing

     sharing unintentionally

         KaZaA network

     shredding, user-created rules for

     unlink( ) function, changing semantics of

filesystems, security of, Chameleon 2nd

fingerprint verification, biometric authentication

FIP (Fair Information Practice), Code of

FIPS (Federal Information Processing Standards)

     passwords

FIPS (Federal Information Processing Standards), Code of

     passwords

firewalls, ZoneAlarm

FIRST (Forum of Incident Response and Security Teams)

fixed answers/questions, challenge questions systems 2nd

Flechais, Ivan

focus groups, identifying user/stakeholder/customer concerns

forensic tools

forged messages

FORMAT command (Windows)

Forum of Incident Response and Security Teams (FIRST)

Freenet network

freeware

Friendster web site, user-controlled information flow

FTA (failure to acquire)

     biometric usability

     keystroke biometrics

FTE (failure to enroll)

     biometric usability

     keystroke biometrics

Категории