img Leseprobe Leseprobe

Human-Centered Security

How to Design Systems That Are Both Safe and Usable

Heidi Trost

EPUB
ca. 43,99

Rosenfeld Media img Link Publisher

Ratgeber / Kreatives Gestalten

Beschreibung

Whether you’re a designer, researcher, product manager, or engineer, you need to be concerned about your product’s security experience and your organization’s overall security.

If you care about the people who use your products and want to keep them safe, Human-Centered Security is an essential resource to have at your fingertips. This book provides valuable insights and critical questions to help you ensure that your organization’s security experience is both strong and effective.

Takeaways

  • Learn how security impacts the user experience—both positively and negatively.
  • Understand key security concepts and terms.
  • Learn about the intricate dynamics of the user security experience.
  • Figure out who your security allies are in your company and how to use them for the best outcomes.
  • Ask better questions when talking to your cross-disciplinary team about how to interpret security.
  • Consider what the enhanced measures are when designing for secure outcomes.
  • Embrace iteration when threat actors surprise your company with unpredictable actions.
  • Discover how to get buy-in for security from your leadership.

Weitere Titel in dieser Kategorie
Cover 100 Logos
Louise Fili
Cover All-Time Favorite Relief Carving Projects
Editors Of Woodcarving Illustrated Magazine
Cover The Social Object
Soumitri Varadarajan
Cover Alphabet Coloring Pages
Letícia Silva Feijó Da Clara
Cover Menswear Mavericks
Voja Malenkovic
Cover Becoming couture
Chiara Faggella
Cover Principle of Design
Marcus Blackwell
Cover Woodcarving Illustrated Issue 109 Winter 2024
Editors of Woodcarving Illustrated

Kundenbewertungen

Schlagwörter

privileged access, human-centered security, error message, access management, OTP, MFA fatigue, identification, security, security mistake, security team, credential stuffing, high-risk scenario, permission, accessible security design, guest enrollment, password, trust, knowledge-based mistake, support request, inclusive design, authorization, personal information, 2FA, verification, UXD, HCI, integrity, consent, privacy setting, threat actor, two-step verification, RBAC, safer path, security incident, data privacy, one-time passcode, 2SV, UX, habituation, risk management, security lapse, security breach, compliance, fail-safe default, intentional violation, deception, time-limited access, access control, security ecosystem, confidentiality, security user experience, multi-factor authentication, role-based access control, onboarding, ethical AI, behavioral analytics, experience design, security warning, ethical data use, PII, unintended consequences, two-factor authentication, design leadership, human-computer interaction, rule-based mistake, security UX, insider threat, threat modeling, design management, passkey, secure outcomes, authentication, MFA, human-centered design, user experience