User-Centered Security Engineering

Size: px
Start display at page:

Download "User-Centered Security Engineering"

Transcription

1 User-Centered Security Engineering Daniela Gerd tom Markotten Albert-Ludwigs-University of Freiburg Institute for Computer Science and Social Studies (IIG) Department of Telematics Friedrichstrasse 50, D Freiburg, Germany Abstract Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool Identity Manager. 1 Introduction As the dependence on the Internet increases in every day life, security becomes more and more important especially in e-commerce. End users are aware of security risks as several studies show 1 and they want to be protected while acting in the Internet. Furthermore, they want to be able to protect themselves without relying on Internet providers or trusting website owners. Thus, security tools for end users are needed. Security engineering facilitates the development of secure software tools. To ensure a high level security standard, current approaches to security engineering [2; 3; 13; 8] focus on attacker models, secure mechanisms and code testing. Our investigation of existing security tools, like PGP ( Signtrust Mail ( and freedom ( shows that it is not sufficient to establish a highly secure system architecture. The main reason for the failure of existing security systems seems to be not the malfunction of these systems, but the wrong configura- tion and use. This leads to the conclusion that the existing security systems are not appropriate for most users. Furthermore, if the security tool is too complex and difficult to configure, most users are not willing to apply such a tool in everyday life. Therefore, a new concept of integrated usercentered security engineering is needed where users are integrated in the whole development process of a security system. The aim of this method is to ensure usable security. Based on the definition of usability of [6] we define usable security as follows: Usable security is the degree how efficiently, effectively and satisfyingly an end user can protect himself and his IT-system in a certain context. In the following two sections we examine the security engineering (section 2) and the usability engineering (section 3) and show weaknesses and problems when one of these methods is applied individually. In section 4 we introduce our new user-centered security engineering method by combining and supplementing the two methods given in section 2 and 3. This method has been pursued for the development and implementation of the security tool Identity Manager which is illustrated in section 5. Conclusions and major findings complete this paper. 2 Security Engineering Security engineering facilitates the development of secure software tools. Whereas many researchers in this field concentrate on security techniques like cryptographical methods and security models [2; 13; 8], Eckert [3] proposes a method for the construction of secure IT-systems in terms of systematic security engineering. Eckert uses an iterative, top-down method referring to the general software engineering and adjusts her method with regard to special security engineering problems. In figure 1 the development phases for the construction of security systems are shown. 1 Business Week online: A rising Tide of concern. GVU s 10 th WWW User Survey.

2 Functional analysis Threat and risk analysis Security strategy and -model Design and Implementation Testing Functional analysis: First, the functional characteristics, the future system environment and the purpose of the system have to be defined. Afterwards the needed system components and services with their functionality are described and put together in a rough draft of the system architecture. Threat and risk analysis: In the next step a threat analysis on the given architecture has to be conducted. The treat analysis regards different kinds of attacks, like outside/inside attacks and defines potential attackers, like programmers, users and mobile code. Subsequently, in the risk analysis the found threats have to be ranked regarding the occurrence probability and the potential damage it may cause. Security Strategy and Security Model: With the results of the previous phase security, requirements of the software tool can be deduced. Additionally, an abstract security model has to be constructed to check security characteristics, e.g. with formal methods. Design and Implementation of the system architecture: First, an architecture has to be defined with all system components, interfaces and dependencies. Adequate algorithms and security mechanisms have to be chosen for the components with security functionality. A wide range of applicable algorithms and security mechanisms and their effective application is described in detail in [2, 13, 8, 5]. Testing and Evaluation: The implemented system has to be tested in several stages (module test, integration test, code inspection) with special emphasis on the security functionality and the system interfaces. If possible, the security functions should be verified by means of formal methods. With the results of the evaluation, re-adjustments may be required. The security engineering process is highly technically oriented without regarding the users and their needs sufficiently. Indeed, it is stated that the users needs should not be ignored, but no explicit guidelines and tasks are given for effective user integration. If the users needs are not a primary goal in the software engineering process, the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour [1]. As said before, end users will not use security products that they cannot understand or that are difficult to apply [16]. Furthermore, the consequences of ignoring the restricted user knowledge about security may lead to user interactions Figure 1: Security engineering development phases that unwittingly compromise the security level of the security tool [15]. 2.1 Adding usability afterwards One possibility to increase the usability of a security tool is to apply usability testing and techniques to the secure system afterwards [16]. We claim that this is not sufficient, since the design of the user interface is never independent of the underlying security infrastructure. This implies that the usability of a security tool is affected by the selection and design of the security mechanisms and the system architecture. For that reason, it may be too late to achieve a large improvement of usability. As usability experts point out [9; 14], users should be integrated into the design process as early as in the functional analysis phase to assimilate their needs to the system requirements. 3 Usability Engineering Several approaches to user-centered design have been made. The most detailed one is the usability engineering method which was introduced by Nielsen [9]. The development process can be split into three parts: The analysis phase, the design phase and the testing phase. Software engineering techniques like the waterfall model with its sequential characteristic is not sufficient for the design of user interfaces. Rather, user interfaces must be designed, checked, re-adjusted and checked again several times. Therefore, the whole lifecycle should follow an iterative procedure. Analysis Design Testing Figure 2: Usability Engineering development phases Analysis phase: In the analysis phase the target user group is defined and studied with its individual characteristics. During the observation of the users, a task analysis can be conducted: On the one hand, the current way of managing tasks in existing security tools are recorded and, on the other hand, the desired ways and possibilities of security configuration are analysed. The

3 consideration of costs and benefits leads to the required functions for such a system. In the end of this phase usability goals like failure minimization are set. Design and testing phases: These phases consist of parallel design and testing. Several parallel designs on paper should be made, following usability guidelines, and tested with evaluation methods, like the heuristic evaluation method or the cognitive walkthrough [10]. The heuristic evaluation and cognitive walkthrough are evaluation methods that can be conducted by usability experts. The advantages is that only three to five experts are needed to achieve a great impact on the usability of the system [9]. This is cost saving and enables the improvement of the user interface in an early stage. Therefore, the design and implementation costs can be kept down. The two steps of designing and testing are repeated until the design is ready to start prototyping. Then an empirical testing with the target user group can be conducted. Re-adjustments may be necessary. Nielsen says: usability engineering is a set of activities that ideally take place throughout the lifecycle of the product. [9]. But usability engineering focuses mainly on the design of the user interface and does neither influence nor interact with the development process of the security architecture and its implementation. A usable user interface depends on the underlying security infrastructure. If the underlying processes are not adequate for the functionality of the security tool it may be impossible to provide an user-friendly user interface. Furthermore, we claim that usability engineering is too general to be applied for the development of security tools because of the special properties of security [15; 4]. Thus, a new concept of integrated user-centered security engineering is needed. To bridge the gap between security and usability several approaches have been made [12; 1; 16; 15]. No approach tried to integrate both into a consistent development process. 4 User-centered Security Engineering In security engineering the secure system forms the centre of the investigation as in the usability engineering it is the user interface. However, none regards the security tool as one unit that has to be developed regarding both engineering methods. To achieve usable security we have to find the answers to three important questions in the development process: Security Engineering Functional analysis Threat and risk analysis Security strategy and -modell Design and Implementation Testing Conjoint Testing Usability Engineering Analysis User as object of attacks User behaviour Focused on users s needs Adaequate security level Modified usability guide lines for security tools Design Testing Figure 3: User-centered security engineering - What are the users needs with respect to security software? - How can we design a secure system architecture that is the best possible presupposition for a good design of the user interface? - How can we design a good user interface of a secure system that enables effective, efficient and satisfying usage? In the following paragraphs we analyse which phases could be merged together and which phases have to persist in the conjoint process of user-centered security engineering. Figure 3 shows the phases of the iterative development process. The grey boxes visualise the existing phases of the security and the usability engineering. The new added ideas are given in the circles. As it can be seen, the analysis phase should be merged together, the modelling phase of the security engineering process is supplemented and the design and testing phases should be undertaken independently. The user-centered security engineering procedure ends with a conjoint testing of the security architecture and the

4 user interface. The reasons for the new structure are given in detail in the following paragraphs. For each phase, we investigate afterwards how security principles and users needs can be combined. 4.1 User-centered analysis phase The two analysis phases should be merged together to get a most precise impression of the system requirements in this early stage of the development process. Interviews or observation of the target user groups are indispensable. However, asking users about their desired security goals may cause a problem: Certainly, they want themselves to be protected as effectively as possible. But the really interesting question is what expenditures (e.g. complex configuration procedures) they are willing to put up with to ensure their personal level of security. Based on the results of the investigation, all processes of the system should be described. Therefore, usability experts and system developers should work together to ensure that the underlying process does not affect the usability of the security tool in a negative way. Then, the needed system components and services can be identified and put together in a rough draft of the system architecture. 4.2 User-centered threat and risk analysis phase The threat and risk analysis of the security engineering process has to persist in the conjoint process because it forms the basis for the design of the security architecture. But it has to be supplemented by the following aspects (illustrated in figure 3): The end user plays different roles regarding potential threats. The first role is given in the security engineering process, too: He may be an attacker himself, i.e. starting an internal attack, then the threats for the security system has to be identified. Additionally, the end user may not only be the subject of an attack but may also be the object of an external attacker. For example, if somebody tries to harm the user s privacy, the user and his personal data have to be protected. Additionally, the users behaviour has to be regarded in the threat analysis. If a user unwittingly commits a mistake, to what extend is the security level of the IT-system impaired? The risk analysis is conducted like explained above, completed by the inclusion of the target user group and its known behaviour. This analysis affects the design of the user interface too: if the question of how a security system could be harmed or the weaknesses of the security chain are identified, the critical points for the user interface design are fixed as well. 4.3 Usable security strategy and model phase With the construction of an abstract security model and the choice of security mechanisms, some aspects of usable security should be taken into account. In a security context some aspects may influence the usability of the whole system. Usability depends on the system speed determined by the chosen security mechanisms. Therefore, it has to be checked if highly secure but slower security mechanisms (e.g. using mixes to ensure anonymity) may impair the usability of the system. The answers to the questions in the usercentered analysis phase (4.1) may give indications to what extent the protection goals have to be fulfilled from the user s point of view. Furthermore, the convenience of the target user group and the necessary steps to interact with the security tool influence the choice of security mechanisms and therefore have to be taken into account when defining a usable security strategy. 4.4 User-centered design and implementation phase Necessarily, the design and implementation phase has to consist of both underlying engineering processes. Suggestions for the user interface should be created without relying on the abstract and complicated security mechanisms. If the user interface is designed when the security architecture is fixed, it will be very hard not to transfer the security mechanisms straight to the surface. Therefore, we propose to work on the design of the user interface and the system architecture simultaneously but independently of each other The system architecture The design and implementation of the security architecture should be based on the usable security strategy. Nevertheless, the highest achievable security level should be implemented while regarding the users needs. Therefore it is recommended that target users attend the design and implementation phase to avoid possible misunderstandings as soon as possible The user interface Nielsen suggests following usability guidelines when designing the user interface. Based on the special properties of security [15] these guidelines are not sufficient for the development of a security tool. We modified and supplemented the usability guidelines of the ISO guideline no. 9241, part 10 [6] referring to security aspects as follows: Error Avoidance: It is not sufficient for a security system to be error tolerant as stated in [6], because security relevant actions are often non-revokeable, e.g. unwittingly sending an that is not encrypted. The security chain may be compromised. Therefore, the user interface should avoid mistakes in advance.

5 User guidance in critical situations: To avoid errors it is necessary to identify critical situations and to develop a guided procedure so that the user can safely complete the desired task. In addition, good help and state messages are needed. Generation of trust: If the user interface does not look trustworthy, nobody will use the security tool independently of secure underlying mechanisms. It is the task of the user interface to reflect the security level of the security tool. It should be kept in mind that trust is very hard to gain but easy to loose. User-friendliness especially for new users: If a user starts to work with a new security tool it has to be intuitively usable, right from the beginning. The user is not willing to learn about security mechanisms and to deal with the user interface, because security is not a primary goal. People do not generally sit down at their computers wanting to manage their security they want security in place to protect them [15]. Abstraction of security mechanisms: Security mechanisms are very technical and complex. If the functionality of the system is merely copied to the user interface, no security novice will be able to use the system. Therefore, familiar models of the real world should be transferred to the security tool. Avoidance of interaction in every-day use: As said before, security is not a primary goal. Therefore, the underlying security should be transparent and the interactions with the end user should be minimised in everyday life. If it is the security system that initiates the interaction, e.g. with warning messages, the user may be disturbed and, in the long run, annoyed. If the user has to start an interaction every time he wants to start a secure communication, it is too inconvenient for him and he may also sometimes forget about the security. The more often he has to begin an interaction, the less he will be satisfied with the system. Furthermore, every action may cause an error due to insufficient security knowledge. Certainly, the control has to remain to the user, but the system should make it as easy as possible to ensure the desired security level. 4.5 User-centered testing The system architecture and the user interface can be tested separately with their domain-specific methods. In an iterative process the system architecture and the user interface are tested and re-adjusted until both parts are ready to be put together. For the evaluation of the user interface we propose a modified evaluation method. The heuristic evaluation is based on the usability guidelines. Referring to this guidelines usability experts analyse the user interface. For the evaluation of security tools we recommend to test the user interface by means of the modified usability guidelines given in section 4.4. We think that applying the heuristic evaluation alone is not sufficient because it focuses on the design of the user interface without regarding the underlying functionalities and processes. With an cognitive walkthrough especially the order of steps to complete a task are examined. Underlying problems caused by inadequate process modelling can be recognized. But this evaluation methods focuses only on intuitive usability and is strictly guided by the given task that should be accomplished by the usability experts. Combining both evaluation methods to a consistent evaluation method for the user interfaces of security tools keeps the advantages of both methods: Some example tasks are given and should be analysed by means of the modified guidelines. This evaluation method is illustrated in figure 4. Heuristic Evaluation Modified usability guidelines for security tools Security evaluation Figure 4: Security evaluation for user interfaces 4.6 Conjoint testing In the conjoint testing phase an integration test has to be accomplished and a representative user test should be conducted. 5 The Identity Manager Cognitive Walkthrough Example tasks, to be conducted To show how user-centered security engineering is applicable in practice we followed this method for the development and implementation of the security tool Identity Manager [7]. 5.1 User-centered analysing phase In our research project ATUS (A Toolkit for Usable Security) we wanted to develop a security tool enable end users to act securely in the Internet. Our target user group were people who are more or less familiar with browsing or writing but who are security novices. It was our aim to minimize the interaction between the security system and the user, because users are not willing to start actions which are not (primary) goal orientated. Starting from the definitions of multilateral security [11], we had to decide which security protection goals

6 Figure 5: The system architecture of the imanager [7] should be necessarily enforced when acting in the Internet and what our tool could support. The analysed security protection goals were: Confidentiality (with its sub-goals: unobservability, anonymity and confidentiality of the communication content), integrity, availability and accountability. Availability cannot be enforced by an end user tool on a PC. Therefore, we concentrated on the other protection goals and had to answer the question of how a non-experienced user could handle all these security goals and set the corresponding security mechanisms correctly. Not to overload the end user and to minimize user interaction in every-day life, we examined dependencies and underlying attacker models of the protection goals. The detailed analysis can be found at [7]. Our result was that protection goals can be split into two groups: the system-controlled and the user-controlled. We found that only the degree of anonymity against the communication partner and accountability have to be user-controlled because they depend on the actual situation. This concept guarantees a simplified everyday configuration and use with the trade-off of an extended installation procedure. It has the advantage for the nonexperienced user that he does not have to configure all protection goals during everyday use. 5.2 User-centered threat and risk analysis Following the instructions of section 4.2, we investigated how users may be attacked while acting in the Internet. The problem we focused on was the user s privacy. While using the Internet, some data is provided automatically, such as IP-addresses, what type of browser is used, which web-sites have been visited before and so on. At the same time, many web forms have to be completed by the customers when they want to buy something. These forms often request personal data which is nonessential for the underlying online purchase. With methods such as data mining, it is possible to link all this information to create very detailed customer profiles, especially through big centralized customer databases. To secure their privacy, end users need adequate tools to handle and to control their personal data whenever they use the Internet. We analysed the target user group s knowledge about security and its willingness to use security tools. This lead us to the conclusion that we have to choose security mechanisms which do not hinder acting in the Internet by slowing down the system and do not need perpetual interaction in everyday use. 5.3 Usable security strategy and model: The remaining protection goals, anonymity (against the communication partner) and accountability, have to be handled by the user because their configuration depends on both the situation and the user's attitude toward his personal security needs. Our investigations led us to an interesting result: the two remaining protection goals can be reduced to the user's identity, which in this case is the user's appearance in the network. Each user has a lot of identities of different kinds, e.g. IP-addresses, e- mail addresses, nicknames, credit card numbers, real names, postal addresses, etc. The advantage of this concept is that every user deals with several identities in the real world, too. That means it is a known concept for him. Our security strategy is to encourage users to manage their identities in the Internet in order to protect their privacy. 5.4 Design and Implementation We split the security architecture and the user interface and design and implemented it separately. Further details are given in the next two sections The system architecture The Identity Manager (imanager) exists between the Internet applications and the network like a firewall and helps the users to manage their digital identities. It controls the data flows to and from the network. The structure of the imanager and its integration is shown in figure 4. The security architecure of the imanager consists of several modules. Databases are used to store the

7 details at any time: the user just moves the cursor to the icon of the identity, and the personal data is shown as on a business card. 5.5 Testing As stated before several tests, especially on the user interface designs, have be conducted. 5.6 Conjoint testing We have not yet tested the imanager with a conjoint testing method, such as a representative user tests, right now. This will be our next task. A target user group test with at least 20 users is already planned. This test should be complete by March Conclusions Figure 6: The user interface of the imanager data of the user and network specific data. Application modules for encryption, digital signatures, or mix net work access are realized as plug-ins. Finally, the imanager has to communicate with the applications, the network, and the user, so it needs system interfaces for the applications, access to the sockets of the TCP/IP network and a user interface The User Interface The user interface is an essential part of the imanager because the acceptance of the whole system strongly depends on its user-friendliness. Two different kinds of user interaction exist: a strictly guided configuration of the system during installation and everyday use. The user must be allowed to change and to browse the initial configuration at any time. The identity must be displayed in a comfortable way. The first idea was the representation on a slider with anonymous identities on the left and accountable identities on the right. This would grant a fast and easy setting of the identity required. However, a linear ranking of the identities, e.g. from anonymous to less anonymous, is subjective. The second approach was based on check boxes and a three window system. It turned out in the usability evaluation for security tools (section 4.5) that this design is too time consuming to deal with in everyday life. Our third design approach is shown in figure 6. During everyday use the user interface just shows the actual identity. The user has the opportunity to view more Today's security tools are insufficient due to overly complex user interfaces. New ideas and concepts are needed to solve this problem. Somehow usability and security are oriented in opposition to one another. To ensure a high security level, usability may be impaired and vice versa. We tried to satisfy these two aims of security system development by introducing user-centered security engineering. Certainly, the presented unified process of usercentered security engineering is not yet complete or entirely worked out in detail. But in this stage it is possible to give an impression of the great impact that usercentered security engineering may have on the usage and usability of security tools and the satisfaction of users. That was what we were aiming at and we know there is a lot to do in this field in the future to bring users and security together and to empower users to control their individual security requirements on their own. Bibliography [1] Anne Adams and Martina Angela Sasse. Users Are Not The Enemy. Communication of the ACM, 42(12):41-46, December [2] Ross Anderson. Security Engineering A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc [3] Claudia Eckert. IT-Sicherheit Konzepte, Verfahren, Protokolle. Oldenbourg Verlag München [4] Daniela Gerd tom Markotten and Johannes Kaiser. Benutzbare Sicherheit Herausforderungen und Modell für E-Commerce-Systeme. In Wirtschaftinformatik, Volume 42, pages , December [5] Dieter Gollmann. Computer Security. John Wiley & Sons, Inc

8 [6] ISO-Standard, no part 10: Guidelines for dialogue design. [7] Uwe Jendricke and Daniela Gerd tom Markotten. Usability meets Security - The Identity- Manager as your Personal Security Assistant for the Internet. In Proceedings of the 16th Annual Computer Security Applications Conference, December [8] Alfred Menezes, Paul Oorschot, Scott Vanstone. Handbook of Applied Cryptography. CRC Press [9] Jakob Nielsen. Usability Engineering. Academic Press [10] Jakob Nielsen and Robert L. Mack. Usability Inspection Methods. John Wiley and Sons, Inc., [11] Kai Rannenberg, Andreas Pfitzmann, and Günter Müller. IT Security and Multilateral Security. In Günter Müller and Kai Rannenberg (Eds.), Technology, Infrastructure, Economy, Volume 3 of Multilateral Security in Communications, pages Addison Wesley Longman Verlag GmbH, [12] Jerome H. Saltzer and Michael D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, Volume 63, pages , September [13] Bruce Schneier. Applied Cryptography. John Wiley & Sons, Inc [14] Ben Shneiderman. Designing the User Interface. Addison-Wesley Longman, Inc ISBN [15] Alma Whitten and J.D. Tygar. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, August [16] Mary Ellen Zurko and Richard T. Simon. User-centered security. In Proceedings of the UCLA conference on New security paradigms workshops, pages 27-33, Lake Arrowhead, CA USA, September 1996.

Why Johnny Can't Encrypt: A Usability Study of PGP

Why Johnny Can't Encrypt: A Usability Study of PGP Why Johnny Can't Encrypt: A Usability Study of PGP Jan Sousedek Technische Universität Berlin, Germany Erasmus program Summer semester 2008 Seminar: Internet Security jan.sousedek@seznam.cz Abstract Interfaces

More information

Retrofitting Security into a Web-Based Information System

Retrofitting Security into a Web-Based Information System Retrofitting Security into a Web-Based Information System David Bettencourt da Cruz, Bernhard Rumpe, Guido Wimmel Software & Systems Engineering, Technische Universität München 85748 Munich/Garching, Germany

More information

A Taxonomy of Single Sign-On Systems

A Taxonomy of Single Sign-On Systems A Taxonomy of Single Sign-On Systems Andreas Pashalidis and Chris J. Mitchell Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {A.Pashalidis, C.Mitchell}@rhul.ac.uk http://www.isg.rhul.ac.uk

More information

Exploring new ways of Usability testing for an E-Science/ Scientific research application

Exploring new ways of Usability testing for an E-Science/ Scientific research application Exploring new ways of Usability testing for an E-Science/ Scientific research application By Julio Cesar Dovalina St. Edward s University Advisor Dr. Gregory Madey 1 Abstract There is a growing interest

More information

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0

Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 Alma Whitten and J. D. Tygar Presentation by Jukka Valkonen jukka.valkonen@tkk.fi 25.10.2006 Outline 1. Background 2. Test methods and results

More information

F21CN: Computer Network Security: Overview

F21CN: Computer Network Security: Overview F21CN: Computer Network Security: Overview Hans-Wolfgang Loidl http://www.macs.hw.ac.uk/~hwloidl School of Mathematical and Computer Sciences Heriot-Watt University, Edinburgh Hans-Wolfgang Loidl (Heriot-Watt

More information

Information & Communication Security (SS 15)

Information & Communication Security (SS 15) Information & Communication Security (SS 15) Security Engineering Dr. Jetzabel Serna-Olvera @sernaolverajm Chair of Mobile Business & Multilateral Security Goethe University Frankfurt www.m-chair.de Introduction

More information

Integrating Security and Usability at Requirement Specification Process

Integrating Security and Usability at Requirement Specification Process Integrating Security and Usability at Requirement Specification Process Author: Nikhat Parveen 1, Rizwan Beg 2, M. H. Khan 3 1,2 Department of Computer Application, Integral University, Lucknow, India.

More information

End-User Perception and Usability of Information Security

End-User Perception and Usability of Information Security End-User Perception and Usability of Information Security Z.F. Zaaba 1,2, S.M. Furnell 1,3 and P.S. Dowland 1 1 Centre for Security, Communications and Network Research, University of Plymouth, Plymouth,

More information

Improving Software Engineering Practice with HCI Aspects

Improving Software Engineering Practice with HCI Aspects Improving Software Engineering Practice with HCI Aspects Xavier Ferre Universidad Politecnica de Madrid xavier@fi.upm.es Ana M. Moreno Universidad Politecnica de Madrid ammoreno@fi.upm.es Abstract Techniques

More information

CSE 5392 Sensor Network Security

CSE 5392 Sensor Network Security About Instructor CSE 5392 Sensor Network Security Course Introduction Dr. Donggang Liu, assistant professor, CSE department http://ranger.uta.edu/~dliu dliu@cse.uta.edu Tel: (817) 272-0741 Office: 330NH

More information

Modeling Guidelines Manual

Modeling Guidelines Manual Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe john.doe@johnydoe.com Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.

More information

A secure, economic infrastructure for signing of web based documents and financial affairs Overview of a server based, customer-friendly approach.

A secure, economic infrastructure for signing of web based documents and financial affairs Overview of a server based, customer-friendly approach. 1 of 8 15.03.2004 14:09 Issue January 2002 A secure, economic infrastructure for signing of web based documents and financial affairs Overview of a server based, customer-friendly approach. Lothar Fritsch,

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

One Time Pad Encryption The unbreakable encryption method

One Time Pad Encryption The unbreakable encryption method One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

Human Behaviour and Security Compliance

Human Behaviour and Security Compliance Human Behaviour and Security Compliance M. Angela Sasse University College London, UK Research Institute for Science of Cyber Security www.ucl.ac.uk/cybersecurity/ Academic Centre of Excellence for Cyber

More information

A Framework for Integrating Software Usability into Software Development Process

A Framework for Integrating Software Usability into Software Development Process A Framework for Integrating Software Usability into Software Development Process Hayat Dino AFRICOM Technologies, Addis Ababa, Ethiopia hayudb@gmail.com Rahel Bekele School of Information Science, Addis

More information

Agile Usability Engineering by Thomas Memmel

Agile Usability Engineering by Thomas Memmel 1 von 4 02.07.2007 10:28 Agile Usability Engineering by Thomas Memmel Agile Usability Engineering is a concept to describe a combination of methods and practices of agile development and usability engineering.

More information

Hardware and Software Security

Hardware and Software Security Today, with the big advancement of technology and the need to share data globally at all time. Security has become one of the most important topics when we talk about data sharing. This means that the

More information

Development models. 1 Introduction. 2 Analyzing development models. R. Kuiper and E.J. Luit

Development models. 1 Introduction. 2 Analyzing development models. R. Kuiper and E.J. Luit Development models R. Kuiper and E.J. Luit 1 Introduction We reconsider the classical development models: the Waterfall Model [Bo76], the V-Model [Ro86], the Spiral Model [Bo88], together with the further

More information

USABILITY: EFFECTIVE, EFFICIENT, AND SATISFYING

USABILITY: EFFECTIVE, EFFICIENT, AND SATISFYING CONSULTING USABILITY: EFFECTIVE, EFFICIENT, AND SATISFYING We have made it our goal to make our clients applications user-friendly. an overview of our services and areas of expertise what is usability?

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

A Planning Process Model for Computer Supported Cooperative Work in Building Construction

A Planning Process Model for Computer Supported Cooperative Work in Building Construction A Planning Process Model for Computer Supported Cooperative Work in Building Construction Uwe Forgber / Christian MŸller 1 Introduction Institut fÿr Industrielle Bauproduktion (ifib) UniversitŠt Karlsruhe,

More information

Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements

Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation

More information

Modeling the User Interface of Web Applications with UML

Modeling the User Interface of Web Applications with UML Modeling the User Interface of Web Applications with UML Rolf Hennicker,Nora Koch,2 Institute of Computer Science Ludwig-Maximilians-University Munich Oettingenstr. 67 80538 München, Germany {kochn,hennicke}@informatik.uni-muenchen.de

More information

GT 6.0 GSI C Security: Key Concepts

GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the

More information

The Usability Engineering Repository (UsER)

The Usability Engineering Repository (UsER) The Usability Engineering Repository (UsER) Marc Paul, Amelie Roenspieß, Tilo Mentler, Michael Herczeg Institut für Multimediale und Interaktive Systeme (IMIS) Universität zu Lübeck Ratzeburger Allee 160

More information

Introduction to Software Engineering

Introduction to Software Engineering CS1Ah Lecture Note 7 Introduction to Software Engineering In this note we provide an overview of Software Engineering. The presentation in this lecture is intended to map out much of what we will study

More information

11557 - CRIPT - Cryptography and Network Security

11557 - CRIPT - Cryptography and Network Security Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 744 - ENTEL - Department of Network Engineering DEGREE IN ELECTRONIC ENGINEERING (Syllabus 1992). (Teaching unit Optional) MASTER'S

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Global Identity Management to Boost Personalization

Global Identity Management to Boost Personalization . In: Proc. 9 th Research Symp. on Emerging Electronic Markets, P. Schubert, U. Leimstoll Michael (eds.), Koch: Basel, Global Sept. Identity 2002, Management p. 137-147 to Boost Personalization Global

More information

A Framework for Evaluating Usable Security: The Case of Online Health Social Networks

A Framework for Evaluating Usable Security: The Case of Online Health Social Networks A Framework for Evaluating Usable Security: The Case of Online Health Social Networks A. Yeratziotis, D. van Greunen and D. Pottas Institute for ICT Advancement, Nelson Mandela Metropolitan University,

More information

RULE BASED EXPERT SYSTEM FOR SELECTING SOFTWARE DEVELOPMENT METHODOLOGY

RULE BASED EXPERT SYSTEM FOR SELECTING SOFTWARE DEVELOPMENT METHODOLOGY RULE BASED EXPERT SYSTEM FOR SELECTING SOFTWARE DEVELOPMENT METHODOLOGY M. AYMAN AL AHMAR Asstt. Prof. and Deputy Dean, College of Engineering and Information Technology, Fujairah Campus, Ajman University

More information

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus Department of Computer & Information Sciences CSCI-445: Computer and Network Security Syllabus Course Description This course provides detailed, in depth overview of pressing network security problems

More information

Privacy and Identity Management for Europe

Privacy and Identity Management for Europe Privacy and Identity Management for Europe Pierangela Samarati Università degli Studi di Milano Milan, Italy samarati@dti.unimi.it Page 1 Vision and Objectives Users disclose vast amounts of personal information

More information

SSL, PKI and Secure Communication

SSL, PKI and Secure Communication SSL, PKI and Secure Communication Aditya Marella 20 th March, 2014 03/19/2014 Usable Privacy and Security 1 Secure Sockets Layer (SSL) Developed by Netscape Sits on top of TCP and below application level

More information

Running head: USABILITY ENGINEERING, COGNITIVE SCIENCE, AND HEALTHCARE INFORMATION SYSTEMS

Running head: USABILITY ENGINEERING, COGNITIVE SCIENCE, AND HEALTHCARE INFORMATION SYSTEMS Usability Engineering 1 Running head: USABILITY ENGINEERING, COGNITIVE SCIENCE, AND HEALTHCARE INFORMATION SYSTEMS Usability Engineering, Cognitive Science and Healthcare Information Systems Yong IL Choi

More information

SecSDM: A Model for Integrating Security into the Software Development Life Cycle

SecSDM: A Model for Integrating Security into the Software Development Life Cycle SecSDM: A Model for Integrating Security into the Software Development Life Cycle Lynn Futcher, Rossouw von Solms Centre for Information Security Studies, Nelson Mandela Metropolitan University, Port Elizabeth,

More information

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Network Security Introduction Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Objectives - Syllabus 2 Objectives Introduce the key aspects of applied network security,

More information

Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective

Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective Orit Hazzan's Column Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective This column is coauthored with Jeff Kramer, Department of Computing, Imperial College, London ABSTRACT

More information

SystemDesign Methodologies

SystemDesign Methodologies SystemDesign Methodologies CM 3380-3 Maintenance is not part of the design process by Claudia Buder, bq923372 Anne Holzapfel, hq923380 Abstract In context of the level three module of System design Methodology

More information

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information

More information

The Role of Information Technology Studies in Software Product Quality Improvement

The Role of Information Technology Studies in Software Product Quality Improvement The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department

More information

BUSINESS RULES AS PART OF INFORMATION SYSTEMS LIFE CYCLE: POSSIBLE SCENARIOS Kestutis Kapocius 1,2,3, Gintautas Garsva 1,2,4

BUSINESS RULES AS PART OF INFORMATION SYSTEMS LIFE CYCLE: POSSIBLE SCENARIOS Kestutis Kapocius 1,2,3, Gintautas Garsva 1,2,4 International Conference 20th EURO Mini Conference Continuous Optimization and Knowledge-Based Technologies (EurOPT-2008) May 20 23, 2008, Neringa, LITHUANIA ISBN 978-9955-28-283-9 L. Sakalauskas, G.W.

More information

Software Testing and Software Development Lifecycles

Software Testing and Software Development Lifecycles Software Testing and Software Development Lifecycles Executive Summary This paper outlines a number of commonly used software development lifecycle models, with particular emphasis on the testing activities

More information

Screen Design : Navigation, Windows, Controls, Text,

Screen Design : Navigation, Windows, Controls, Text, Overview Introduction Fundamentals of GUIs Screen Design : Navigation, Windows, Controls, Text, Evaluating GUI Performance - Methods - Comparison 1 Example: Automotive HMI (CAR IT 03/2013) 64, 68, 69 2

More information

How To Set Up A Net Integration Firewall

How To Set Up A Net Integration Firewall Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2

More information

Qualified mobile electronic signatures: Possible, but worth a try?

Qualified mobile electronic signatures: Possible, but worth a try? Qualified mobile electronic signatures: Possible, but worth a try? Lothar Fritsch 1, Johannes Ranke 2, Heiko Rossnagel 1 Interest level of audience: 3 - for application developers (interested in IT security)

More information

Fan Fu. Usability Testing of Cloud File Storage Systems. A Master s Paper for the M.S. in I.S. degree. April, 2013. 70 pages. Advisor: Robert Capra

Fan Fu. Usability Testing of Cloud File Storage Systems. A Master s Paper for the M.S. in I.S. degree. April, 2013. 70 pages. Advisor: Robert Capra Fan Fu. Usability Testing of Cloud File Storage Systems. A Master s Paper for the M.S. in I.S. degree. April, 2013. 70 pages. Advisor: Robert Capra This paper presents the results of a usability test involving

More information

Digital Signatures and Interoperability

Digital Signatures and Interoperability Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000

More information

The W-MODEL Strengthening the Bond Between Development and Test

The W-MODEL Strengthening the Bond Between Development and Test Andreas Spillner Dr. Spillner is working as Professor at the Hochschule Bremen (University of Applied Sciences) where he is responsible for software engineering and real time systems. Dr. Spillner has

More information

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc. February 2013 1 Executive Summary Adnet is pleased to provide this white paper, describing our approach to performing

More information

應 用 測 試 於 軟 體 發 展 生 命 週 期. Testing In The Software Development Life Cycle

應 用 測 試 於 軟 體 發 展 生 命 週 期. Testing In The Software Development Life Cycle The Second Management Innovation and Practices Conference, Tamsui, Taiwan, April 2001,Volume 2, pp59-68 應 用 測 試 於 軟 體 發 展 生 命 週 期 Testing In The Software Development Life Cycle 蔡 博 元 莊 立 文 真 理 大 學 資 訊

More information

SOME SECURITY CHALLENGES IN CLOUD COMPUTING. Hoang N.V.

SOME SECURITY CHALLENGES IN CLOUD COMPUTING. Hoang N.V. SOME SECURITY CHALLENGES IN CLOUD COMPUTING Hoang N.V. What is cloud computing? Cloud computing: Advantages "pay-per-use model for enabling available, convenient and on-demand network access to a shared

More information

How Do People Use Security in the Home

How Do People Use Security in the Home How Do People Use Security in the Home Kaarlo Lahtela Helsinki University of Technology Kaarlo.Lahtela@hut.fi Abstract This paper investigates home security. How much people know about security and how

More information

UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW

UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW John C. Knight, Jane C. Prey, & Wm. A. Wulf Department of Computer Science University of Virginia Charlottesville, VA 22903

More information

Evaluation of Commercial Web Engineering Processes

Evaluation of Commercial Web Engineering Processes Evaluation of Commercial Web Engineering Processes Andrew McDonald and Ray Welland Department of Computing Science, University of Glasgow, Glasgow, Scotland. G12 8QQ. {andrew, ray}@dcs.gla.ac.uk, http://www.dcs.gla.ac.uk/

More information

keep your Passwords secure!

keep your Passwords secure! keep your Passwords secure! architectures for secure identity ManageMent: a bottom View Secure Identity Management is is a a key key aspect for corporate security. It It comprises modern technical solutions

More information

Lifecycle Models: Waterfall / Spiral / EVO

Lifecycle Models: Waterfall / Spiral / EVO Lifecycle Models: Waterfall / Spiral / EVO Dror Feitelson Basic Seminar on Software Engineering Hebrew University 2011 Lifecycle The sequence of actions that must be performed in order to build a software

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

An integrated life cycle quality model for general public market software products

An integrated life cycle quality model for general public market software products An integrated life cycle quality model for general public market software products Witold Suryn 1, Alain Abran 2, Claude Laporte 3 1 Département de génie électrique, École de technologie supérieure 1100,

More information

Security Attack Testing (SAT) testing the security of information systems at design time $

Security Attack Testing (SAT) testing the security of information systems at design time $ Information Systems 32 (2007) 1166 1183 www.elsevier.com/locate/infosys Security Attack Testing (SAT) testing the security of information systems at design time $ Haralambos Mouratidis a,, Paolo Giorgini

More information

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles.

Online Voting Project. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. New Developments in the Voting System an Consequently Implemented Improvements in the Representation of Legal Principles. Introduction. Since 2001 T-Systems made research on secure online voting systems

More information

Agile Offshore Outsourcing

Agile Offshore Outsourcing Agile Offshore Outsourcing Concepts and Practices for Flexible Integration of Offshore Development Services Agile Business Conference 2006 Joachim Sauer Agenda Challenges and common solutions of applying

More information

Continuous User Experience Development

Continuous User Experience Development Continuous User Experience Development Kati Kuusinen Tampere University of Technology Tampere, Finland Korkeakoulunkatu 1, FI-33101 Tampere kati.kuusinen@tut.fi Abstract. Continuous approaches for software

More information

An Introduction to Digital Signature Schemes

An Introduction to Digital Signature Schemes An Introduction to Digital Signature Schemes Mehran Alidoost Nia #1, Ali Sajedi #2, Aryo Jamshidpey #3 #1 Computer Engineering Department, University of Guilan-Rasht, Iran m.alidoost@hotmail.com #2 Software

More information

Model-based approach to design web application testing tool

Model-based approach to design web application testing tool American Journal of Software Engineering and Applications 2014; 3(5): 63-67 Published online November 20, 2014 (http://www.sciencepublishinggroup.com/j/ajsea) doi: 10.11648/j.ajsea.20140305.12 ISSN: 2327-2473

More information

Agile development of safety-critical software while meetings standards' requirements

Agile development of safety-critical software while meetings standards' requirements 1(37) Agile development of safety-critical software while meetings standards' requirements Matti Vuori, Tampere University of Technology 2011-11-04 Contents 1/2 A study in Ohjelmaturva 4 Tendency to be

More information

Techniques for Securing Networks against Criminal Attacks

Techniques for Securing Networks against Criminal Attacks Techniques for Securing Networks against Criminal Attacks Ernst-Georg Haffner, Thomas Engel, Christoph Meinel Institute of Telematics Bahnhofstraße 30-32 D-54292 Trier, Germany Abstract The main Internet

More information

Evaluate the Usability of Security Audits in Electronic Commerce

Evaluate the Usability of Security Audits in Electronic Commerce Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka

More information

WebSecFrame - A Way to Improve Corporate Network Security

WebSecFrame - A Way to Improve Corporate Network Security WebSecFrame - A Way to Improve Corporate Network Security Frank Losemann losemann@ti.fhg.de Christoph Meinel meinel@ti.fhg.de Institute for Telematics, Trier, Germany Phone: +49-651 975 51 60 Fax: +49-651

More information

MEASURING USABILITY OF ICONIC BASED GUIs OF MOBILE EMERGENCY SERVICE SOFTWARE BY USING HCI. Y.Batu Salman, Adem Karahoca

MEASURING USABILITY OF ICONIC BASED GUIs OF MOBILE EMERGENCY SERVICE SOFTWARE BY USING HCI. Y.Batu Salman, Adem Karahoca MEASURING USABILITY OF ICONIC BASED GUIs OF MOBILE EMERGENCY SERVICE SOFTWARE BY USING HCI Y.Batu Salman, Adem Karahoca Bahcesehir University, Engineering Faculty, Computer Engineering Department Bahcesehir,

More information

Why Johnny Can t Encrypt

Why Johnny Can t Encrypt In Security and Usability: Designing Secure Systems that People Can Use, eds. L. Cranor and G. Simson. O'Reilly, 2005, pp. 679-702 CHAPTER THIRTY- FOUR Why Johnny Can t Encrypt A Usability Evaluation of

More information

IMEO International Mass Event Organization based on Recent Experience of Euro 2012

IMEO International Mass Event Organization based on Recent Experience of Euro 2012 IMEO International Mass Event Organization based on Recent Experience of Euro 2012 1. Name of the project: Project Management 2. Leader of the workshop (materials' author): Szymon Włochowicz 1 Objectives

More information

Processing Requirements by Software Configuration Management

Processing Requirements by Software Configuration Management Processing Requirements by Software Configuration Management Ivica Crnkovic 1, Peter Funk 1, Magnus Larsson 2 1 Mälardalen University, Department of Computer Engineering, S-721 23 Västerås, Sweden {ivica.crnkovic,

More information

Name of pattern types 1 Process control patterns 2 Logic architectural patterns 3 Organizational patterns 4 Analytic patterns 5 Design patterns 6

Name of pattern types 1 Process control patterns 2 Logic architectural patterns 3 Organizational patterns 4 Analytic patterns 5 Design patterns 6 The Researches on Unified Pattern of Information System Deng Zhonghua,Guo Liang,Xia Yanping School of Information Management, Wuhan University Wuhan, Hubei, China 430072 Abstract: This paper discusses

More information

An Investigation into the Human/Computer Interface from a Security Perspective. Daniel J. Cross. A Proposal Submitted to the Honors Council

An Investigation into the Human/Computer Interface from a Security Perspective. Daniel J. Cross. A Proposal Submitted to the Honors Council An Investigation into the Human/Computer Interface from a Security Perspective by Daniel J. Cross A Proposal Submitted to the Honors Council For Honors in Computer Science and Engineering 15 October, 2004

More information

Software Engineering. What is a system?

Software Engineering. What is a system? What is a system? Software Engineering Software Processes A purposeful collection of inter-related components working together to achieve some common objective. A system may include software, mechanical,

More information

White Paper Secure Reverse Proxy Server and Web Application Firewall

White Paper Secure Reverse Proxy Server and Web Application Firewall White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security

More information

The Advantages of Automatic Protocol Creation

The Advantages of Automatic Protocol Creation AUTOMATIC PROTOCOL CREATION FOR INFORMATION SECURITY SYSTEM Mr. Arjun Kumar arjunsingh@abes.ac.in ABES Engineering College, Ghaziabad Master of Computer Application ABSTRACT Now a days, security is very

More information

Human Aspects of Software Engineering: The Case of Extreme Programming

Human Aspects of Software Engineering: The Case of Extreme Programming 1 Human Aspects of Software Engineering: The Case of Extreme Programming Orit Hazzan 1 and Jim Tomayko 2 1 Department of Education in Technology and Science, Technion - IIT, Haifa 32000, Israel oritha@tx.technion.ac.il

More information

ACHIEVING FUNCTIONAL SAFETY OF AUDI DYNAMIC STEERING USING A STRUCTURED DEVELOPMENT PROCESS

ACHIEVING FUNCTIONAL SAFETY OF AUDI DYNAMIC STEERING USING A STRUCTURED DEVELOPMENT PROCESS ACHIEVING FUNCTIONAL SAFETY OF AUDI DYNAMIC STEERING USING A STRUCTURED DEVELOPMENT PROCESS Dr Juergen Schuller* 1, Marnix Lannoije* 2, Dr Michael Sagefka* 3, Wolfgang Dick* 4, Dr Ralf Schwarz* 5 * 1 Audi

More information

Privacy-Enhancing Identity Management

Privacy-Enhancing Identity Management Privacy-Enhancing Identity Management Sebastian Clauß, Andreas Pfitzmann, Dresden University of Technology, Marit Hansen, Independent Centre for Privacy Protection Schleswig-Holstein and Els Van Herreweghen,

More information

Risk Management (3C05/D22) Unit 3: Risk Management. What is risk?

Risk Management (3C05/D22) Unit 3: Risk Management. What is risk? Risk Management (3C05/D22) Unit 3: Risk Management Objectives To explain the concept of risk & to develop its role within the software development process To introduce the use of risk management as a means

More information

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status 10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary

More information

3 Traditional approach

3 Traditional approach The Unified Approach to Modeling of Software Project Management Processes Šárka Květoňová 1, Zdeněk Martínek 1 1 Dept. of Information Systems, Faculty of Information Technology, Brno University of Technology,

More information

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing Encryption on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 4 2 Encryption Options... 5 3 Basics of Encryption... 7 3.1 Public Key... 7 3.2 Private

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

ADVANCE SECURITY TO CLOUD DATA STORAGE

ADVANCE SECURITY TO CLOUD DATA STORAGE Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next

More information

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

Business Modeling with UML

Business Modeling with UML Business Modeling with UML Hans-Erik Eriksson and Magnus Penker, Open Training Hans-Erik In order to keep up and be competitive, all companies Ericsson is and enterprises must assess the quality of their

More information

Why process models? Topic 3 Software process models. 3. Process models. What is a process model?

Why process models? Topic 3 Software process models. 3. Process models. What is a process model? Why process models? Topic 3 Software process models SE is the application of a systematic, disciplined, quantifiable approach to the development, operation, and maintenance of software... (IEEE Standard

More information

Software Engineering

Software Engineering 1 Software Engineering Lecture 2: Software Life Cycles Stefan Hallerstede Århus School of Engineering 25 August 2011 2 Contents Naive Software Development Code & Fix Towards A Software Process Software

More information

Security challenges for internet technologies on mobile devices

Security challenges for internet technologies on mobile devices Security challenges for internet technologies on mobile devices - Geir Olsen [geiro@microsoft.com], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [anild@microsoft.com],

More information

Introduction to Software Project Management. CITS3220 Software Requirements & Project Management

Introduction to Software Project Management. CITS3220 Software Requirements & Project Management Introduction to Software Project Management CITS3220 Software Requirements & Project Management "A project gets a year late one day at a time." "Anything that can be changed will be changed until there

More information

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and

More information

Proposal: Application of Agile Software Development Process in xlpr ORNL- 2012/41412 November 2012

Proposal: Application of Agile Software Development Process in xlpr ORNL- 2012/41412 November 2012 Proposal: Application of Agile Software Development Process in xlpr ORNL- 2012/41412 November 2012 Prepared by Hilda B. Klasky Paul T. Williams B. Richard Bass This report was prepared as an account of

More information

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004

More information