We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Designing for Security

Formal Metadata

Title
Designing for Security
Title of Series
Number of Parts
561
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Good security requires usability. If a secure technology isn’t usable, users will simply use something else - or worse, they might work around the technology to do what they need to do. We will demonstrate this universal truth with a handful of examples and supplement them with good design principles. We will cover UX of key handling, password managers and anti-phishing, and also spend some time on why these products and services so often lack usability. We also won't miss this opportunity to introduce simple human-centered design methods to incorporate in the development process!