Download presentation
Presentation is loading. Please wait.
1
Lecture 10: Usable Security
CS 392/6813: Computer Security Fall 2010 Nitesh Saxena
2
Lecture 11 - Security Policies
Course Admin HW4 graded; Solution provided HW5 is to be graded; Solution to be provided HW6 – Buffer Overflow -- will be posted very soon Demos for HW6 due starting 11am on 12/20 and 12/21 (?) You can use your own intel-based machines We will sign up for a demo slot next Thurs (in class) Final is 12/16, 6-8:30pm roughly 40% pre-midterm, 60% post-midterm 2/24/2019 Lecture 11 - Security Policies
3
Lecture 11 - Security Policies
Today’s Lecture The user aspect in security Security often has to rely on user actions or decisions User is often considered a weak-link in security Can we build secure systems by relying on the strengths of human users rather than their weaknesses? We study this in the context of two important problems: Device-to-Device Authentication User-to-Device Authentication The field of Usable Security is quite new and immature Research flavor in today’s lecture 2/24/2019 Lecture 11 - Security Policies
4
Recall the Security Life Cycle
Threats Which stage? Policy Specification What Design Principle? Design Implementation Operation and Maintenance 2/24/2019 Lecture 11 - Security Policies
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.