Download presentation
Presentation is loading. Please wait.
Published byKevin Bryan Modified over 9 years ago
1
Biometrics and Usability March 21, 2008 Poor Usability: The Inherent Insider Threat Information Access Division Visualization and Usability Group Mary Theofanos
2
2 Biometrics and Usability 2
3
3 3
4
4 4 The weakest link in the chain? Is it because the User is : Careless and Ignorant OR Frustrated and Overwhelmed
5
5 Biometrics and Usability 5 What is usability? ISO 9241-11 defines usability as: “the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use” ISO 9241-11 defines usability as: “the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use”
6
6 Biometrics and Usability 6 First Tenet: Know thy User Policy Makers Security Organization End-Users
7
7 Biometrics and Usability 7 User goals and mission are not similar End-User Task oriented – production tasks vs supporting tasks Performance metric: efficiency, effectiveness of production tasks The organization’s mission relies on the production tasks Security Organization Security is the production task Performance metric: how secure Mission is Security but how does it relate to overall mission of the larger organization
8
8 Biometrics and Usability 8 User Perception Influences Behavior Impossible demands Need --Value Complexity Awkward Behavior
9
9 Biometrics and Usability 9 Context of Use Differences in physical location and devices influence usage Laptop Desktop Office, Home, Airport, Battlefield
10
10 Biometrics and Usability 10 Today’s usability is one-sided In favor of the Security Organization “Command and Control” approach Policies constructed top-down, enforced through sanctions Compliance monitored by checklists One size fits all
11
11 Biometrics and Usability 11 What can we do? Integrate Security and Usability Include usability in software development cycle Apply user-centered design to security design Establish a partnership with users
12
12 Biometrics and Usability 12 Good Usability Strengthens Security Easier to implement security policies, processes and procedures Encourages users to follow good security practices Reduces users inadvertently undermining security
13
13 Biometrics and Usability 13 The goal is to build systems that are actually secure not theoretically secure: Security Mechanisms have to be usable in order to be effective
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.