Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

TANs (transaction authorization numbers) approach to online banking authentication mechanism

tap regions, graphical authentication

tasks

     analysis of

     core, scenarios

         validated/updated

     ease of use, influence of

     flow, validated user model

     privacy implications, user understanding of

     production versus supporting

     varying security with

testing

     benchmark studies, setting usability goals

     design/usability of user interface

     empirical usability laboratory studies

     exploits on isolated systems

     security mechanisms

     usability

     user-interface prototypes

The Anonymizer

third-party cookies

threat analysis

Thunderwire, CSCW research study

TLS (Transport Layer Security)

Tognazzini, Bruce "Tog"

tokens

     authentication based on 2nd

     biometric verification and

     P3P compact policy

tools

     antiphishing

     automated, user control of personal information

     awareness/detection

     Bugnosis

     code samples, vulnerability detection 2nd

     communications, coordinating security administrator efforts

     disk repair utilities, securing file access

     file/host integrity

     for finding patches

     for security administration

     forensic

     hacking

     honeypots

     HTTP logs

     information management

     integration of, need for

    monitoring

         analyzing network logs 2nd

         networks in real time

     MOO 2nd 3rd

     network intrusion alert, case study

     privacy awareness, Bugnosis future directions

     public information sources for

     recognizing/removing adware/spyware

     remote data collection/system evaluation

     rootkit hunters 2nd

     scanning 2nd 3rd

         web logs

     search utilities, file access security

     session logs

     trapping hackers

     visualization

Tor networks

transaction authorization numbers (TANs) approach to online banking authentication mechanism

transitive trust

Transport Layer Security (TLS)

Trash Can icon, user interface error in Mac OS 10.3

Tresor 2.2

Tribe.net web site, user-controlled information flow

Trojan horses, patch distribution and

trust 2nd 3rd

     authentication and

     beliefs about trustworthiness

     context of

     credibility and 2nd

     decisions about, user control of

     designs promoting

         examples

     disposition to

     exploiting, phishing attacks and

     hard trust/soft trust

     informed consent and

     layers of

     models of

         iPKIs and

     on eBay

     personal information handling, communicating policies

     situational

     Solaris trusted stripe

     time-course of

     transitive

     user-generated keys and

     users and

trust-risk relationship

     e-commerce transactions

     high risk/low trust model

     technology factors

two-factor authentication

Tygar, Doug

Type I networks

typing verification, keystroke biometrics

Категории