Security, Privacy and User Interaction
Editat de Markus Jakobssonen Limba Engleză Hardback – 28 oct 2020
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users – including malicious users, aiming to corrupt the system – this book Illustrates how better security technologies are made possible.
Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse.
Advanced-levelstudents interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.
Preț: 319.89 lei
Preț vechi: 399.86 lei
-20% Nou
Puncte Express: 480
Preț estimativ în valută:
61.22€ • 64.59$ • 51.02£
61.22€ • 64.59$ • 51.02£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030437534
ISBN-10: 3030437531
Pagini: 153
Ilustrații: XV, 153 p. 52 illus., 24 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.42 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3030437531
Pagini: 153
Ilustrații: XV, 153 p. 52 illus., 24 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.42 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
PART I: Considering the Typical User.- 1. Mind your SMSes: Mitigating Social Engineering in Second Factor Authentication.- 2. Permissions and Privacy.- 3. Privacy and Tracking.- PART II: Considering the Malicious User.- 4. A Framework for Analysis Attackers’ Accounts.- 5. Environmentally and Politically Conscious Crypto.- Part III: Designing Solutions Based on Typical and Malicious Users.- 6. Social Engineering Resistant 2FA.- 7. The Rising Threat of Launchpad Attacks.- 8. Discouraging Counterfeiting.- 9. Seeing the Future.
Recenzii
“This book provides fruitful content for engineers and researchers to consider when designing (or adopting) a security protocol. The editor uses many paradigms and charts to lively depict what he wants readers to comprehend. I recommend this book to readers who have a background in information security, especially cryptographic engineers and researchers.” (Zheng Gong, Computing Reviews, August 11, 2021)
Notă biografică
Dr. Markus Jakobsson has spent more than 20 years as a security researcher, scientist and entrepreneur, studying phishing, crimeware, mobile security, privacy and user interaction. He spearheaded research in malware and mobile security technologies at Qualcomm, after his startup, FatSkunk, was acquired by Qualcomm. He performed email security research and helped track Nigerian scammers as the Chief Scientist at Agari. In addition, Dr. Jakobsson has held key roles as Principal Scientist at PayPal, Xerox PARC, and RSA Security, and as Chief of Security and Data Analytics at Amber Solutions. He has also worked as a testifying expert witness in a range of high-profile patent litigation cases, covering digital rights management, Internet and mobile security, authentication, and spam detection. He has a PhD in Computer Science from University of California at San Diego.
Textul de pe ultima copertă
This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users – including malicious users, aiming to corrupt the system – this book Illustrates how better security technologies are made possible.
Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse.
Advanced-levelstudents interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.
Caracteristici
Traditional online security considers security problems of a technical nature separately from security problems of a social nature. This book addresses how to bridge this chasm Describes how to address several emerging socio-technical security risks, ranging from SIM-jacking and counterfeiting to political risks of crypto payments and attacks launched from malware-infected computers of trusted colleagues It is not possible to address today’s most pressing problems in security and privacy without recognizing the human aspect of the problem. However, this book makes the case that the best countermeasures are not based on increasing awareness, but rather, on technical countermeasures based on an understanding of the end user