Human-Centered Security
Heidi Trost
* Affiliatelinks/Werbelinks
Links auf reinlesen.de sind sogenannte Affiliate-Links. Wenn du auf so einen Affiliate-Link klickst und über diesen Link einkaufst, bekommt reinlesen.de von dem betreffenden Online-Shop oder Anbieter eine Provision. Für dich verändert sich der Preis nicht.
Ratgeber / Kreatives Gestalten
Beschreibung
Whether you’re a designer, researcher, product manager, or engineer, you need to be concerned about your product’s security experience and your organization’s overall security.
If you care about the people who use your products and want to keep them safe, Human-Centered Security is an essential resource to have at your fingertips. This book provides valuable insights and critical questions to help you ensure that your organization’s security experience is both strong and effective.
Takeaways
- Learn how security impacts the user experience—both positively and negatively.
- Understand key security concepts and terms.
- Learn about the intricate dynamics of the user security experience.
- Figure out who your security allies are in your company and how to use them for the best outcomes.
- Ask better questions when talking to your cross-disciplinary team about how to interpret security.
- Consider what the enhanced measures are when designing for secure outcomes.
- Embrace iteration when threat actors surprise your company with unpredictable actions.
- Discover how to get buy-in for security from your leadership.
Kundenbewertungen
privileged access, human-centered security, error message, access management, OTP, MFA fatigue, identification, security, security mistake, security team, credential stuffing, high-risk scenario, permission, accessible security design, guest enrollment, password, trust, knowledge-based mistake, support request, inclusive design, authorization, personal information, 2FA, verification, UXD, HCI, integrity, consent, privacy setting, threat actor, two-step verification, RBAC, safer path, security incident, data privacy, one-time passcode, 2SV, UX, habituation, risk management, security lapse, security breach, compliance, fail-safe default, intentional violation, deception, time-limited access, access control, security ecosystem, confidentiality, security user experience, multi-factor authentication, role-based access control, onboarding, ethical AI, behavioral analytics, experience design, security warning, ethical data use, PII, unintended consequences, two-factor authentication, design leadership, human-computer interaction, rule-based mistake, security UX, insider threat, threat modeling, design management, passkey, secure outcomes, authentication, MFA, human-centered design, user experience