Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Haber, Eben

hand verification, biometrics authentication

handheld devices, authentication mechanisms

hard drives

     blocks

         on free list, sanitizing

     formatting

     monitoring, tools for

     overwriting data on

     repair utilities, file access security

     retirement rates

     sensitive data left on

         study of

hard trust

hardened passwords, keystroke biometrics

hardware

     life cycle

     requirements, authentication accessibility

     tokens

HCI (human-computer interaction)

     exoinformation

     interface design, ubiquitous computing

     privacy issues

         social theories

     reference books 2nd

     research on

         CSCW

         usability engineering

         user differences

         user types

     trust issues

     user experiences

     users, accommodating every type of

HCI methods

     goal of

     product design/development

         identifying/defining security/privacy information for

health advice, online, trusted design example

HeavyCrypto

high-fidelity prototypes

     of user interface

high-fidelity prototypes of user interface

high-latency networks

honeypots

Hong, Jason I.

hotkeys, designating reserved, preventing impersonation

HTTP logs, as security administration tool

human factors

     authentication and 2nd

     bootstrapping and

     exploiting

     fallibility as weakest link in security chain 2nd 3rd

         overwriting data

     human-machine interfaces

     information-processing characteristics of users

    memory

         characteristics of

         methods of memorizing

    passwords

         selecting

         unreasonable demands on users

     production tasks versus supporting tasks

     security design

hyperlinks, phishing attacks and

Категории