A stealth approach to usable security: helping IT security managers to identify workable security solutions

  1. Lookup NU author(s)
  2. Dr Simon Parkin
  3. Professor Aad van Moorsel
Author(s)Parkin S, van Moorsel A, Inglesant P, Sasse MA
Editor(s)
Publication type Conference Proceedings (inc. Abstract)
Conference NameNSPW 2010: Proceedings of the 2010 Workshop on New Security Paradigms
Conference LocationConcord, Massachusetts, USA
Year of Conference2010
Legacy Date21-23 September 2010
Volume
Pages33-49
ISBN9781450304153
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
Recent advances in the research of usable security have produced many new security mechanisms that improve usability. However, these mechanisms have not been widely adopted in practice. In most organisations, IT security managers decide on security policies and mechanisms, seemingly without considering usability. IT security managers consider risk reduction and the business impact of information security controls, but not the impact that controls have on users. Rather than trying to remind security managers of usability, we present a new paradigm -- a stealth approach which incorporates the impact of security controls on users' productivity and willingness to comply into business impact and risk reduction. During two 2-hour sessions, 3 IT security managers discussed with us mock-up tool prototypes that embody these principles, alongside a range of potential usage scenarios (e.g. cloud-based password-cracking attacks and "hot-desking" initiatives). Our tool design process elicits findings to help develop mechanisms to visualise these tradeoffs.
PublisherACM
URLhttp://dx.doi.org/10.1145/1900546.1900553
DOI10.1145/1900546.1900553
ActionsLink to this publication
Library holdingsSearch Newcastle University Library for this item