Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Security, privacy and user interaction
Bookmark Share

Text

Security, privacy and user interaction

Jakobsson, Markus - Personal Name;

This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users – including malicious users, aiming to corrupt the system – this book Illustrates how better security technologies are made possible.
Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse.
Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.

Table of content:
PART I: Considering the Typical User.
1. Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication.
2. Permissions and Privacy.
3. Privacy and Tracking.

PART II: Considering the Malicious User.
4. A Framework for Analysis Attackers' Accounts.
5. Environmentally and Politically Conscious Crypto.

Part III: Designing Solutions Based on Typical and Malicious Users.
6. Social Engineering Resistant 2FA.
7. The Rising Threat of Launchpad Attacks.
8. Discouraging Counterfeiting.
9. Seeing the Future.


Availability
#
Rekayasa Keamanan Siber 005.8 JAK s
b0002552
Available but not for loan - Missing
Detail Information
Series Title
-
Call Number
005.8 JAK s
Publisher
Cham : Springer., 2020
Collation
xv, 153 hlm.; 23 cm
Language
English
ISBN/ISSN
9783030437534
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Computer security
Specific Detail Info
-
Statement of Responsibility
Markus Jakobsson
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?