{"id":4028,"date":"2015-10-12T09:26:00","date_gmt":"2015-10-12T14:26:00","guid":{"rendered":"http:\/\/www.carnaghan.com\/?p=4028"},"modified":"2018-02-18T22:14:35","modified_gmt":"2018-02-19T03:14:35","slug":"usable-security-user-friendly-factors","status":"publish","type":"post","link":"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/","title":{"rendered":"Usable Security? User Friendly Factors"},"content":{"rendered":"

In his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how we model security systems within the organization. He makes the case that security has to be simple and at the same time it has to minimize hassle (for the end user). He concludes that the root cause of this problem is one of economics whereby we “don\u2019t know the costs either of getting security or of not having it, so users quite rationally don\u2019t care much about it. Therefore, vendors have no incentive to make security usable.” To get around this we must first look at simple models of security the user understands.<\/p>\n

Single Sign On (SSO) is one of those technologies that helps bridge the gap of complexity to usability. SSO allows a user to authenticate once and then have access to various information systems across the network without the need to authenticate multiple times with multiple sets of credentials (creating an unmanageable and unusable situation).<\/p>\n

Coupled with SSO, smart cards are becoming more common within organizations. Smart cards allow the user to authenticate once within the network by providing all the required authentication factors. UMUC (2013). In the US Government, the use of PIV cards (Personal Identity Verification), has become commonplace among the agencies. These cards enable employees physical access to facilities and contain digital certificates for access to network resources. Employee and contractor photographs are printed on the cards. The employee sets a PIN (Personal Identification Number) which they enter once inserting the card into a reader. This not only maintains high security, but provides a more user friendly way of access instead of multiple credentials.<\/p>\n

Depending on the nature of the organization, the resources available, and the type of information assets needed to be protected, a usable security strategy will differ greatly. At the forefront of the process should be policy implications and a simple to understand process or model for end-users. This will continue to evolve as the organization changes and as other tools and techniques become available to them.<\/p>\n

References:<\/p>\n

Lampson, B. (2009). Privacy and Security: Usable Security: How to Get It. Communications Of The ACM, 52(11), 25-27.<\/p>\n

UMUC. (2013). Preventive and Protective Strategies in Cybersecurity. Retrieved from https:\/\/leoprdws.umuc.edu\/CSEC630\/1306\/csec630_04\/assets\/csec630_04.pdf<\/p>\n

ID Management. (2015). Homeland Security Presidential Directive 12. Retrieved from http:\/\/www.idmanagement.gov\/homeland-security-presidential-directive-12<\/p>\n","protected":false},"excerpt":{"rendered":"

In his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how we model security systems within the organization. He makes the case that security has to be simple and at the same time it has to minimize hassle (for the end user). He concludes that the root […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[356],"tags":[4234],"post_series":[410],"yoast_head":"\nUsable Security? User Friendly Factors - Ian Carnaghan<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Usable Security? User Friendly Factors - Ian Carnaghan\" \/>\n<meta property=\"og:description\" content=\"In his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how we model security systems within the organization. He makes the case that security has to be simple and at the same time it has to minimize hassle (for the end user). He concludes that the root […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/\" \/>\n<meta property=\"og:site_name\" content=\"Ian Carnaghan\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-12T14:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-19T03:14:35+00:00\" \/>\n<meta name=\"author\" content=\"Ian Carnaghan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@icarnaghan\" \/>\n<meta name=\"twitter:site\" content=\"@icarnaghan\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ian Carnaghan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/\"},\"author\":{\"name\":\"Ian Carnaghan\",\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\"},\"headline\":\"Usable Security? User Friendly Factors\",\"datePublished\":\"2015-10-12T14:26:00+00:00\",\"dateModified\":\"2018-02-19T03:14:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/\"},\"wordCount\":397,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\"},\"keywords\":[\"CSEC 630\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/\",\"url\":\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/\",\"name\":\"Usable Security? User Friendly Factors - Ian Carnaghan\",\"isPartOf\":{\"@id\":\"https:\/\/www.carnaghan.com\/#website\"},\"datePublished\":\"2015-10-12T14:26:00+00:00\",\"dateModified\":\"2018-02-19T03:14:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carnaghan.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Usable Security? User Friendly Factors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carnaghan.com\/#website\",\"url\":\"https:\/\/www.carnaghan.com\/\",\"name\":\"Ian Carnaghan\",\"description\":\"Software Developer, Blogger, Educator\",\"publisher\":{\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carnaghan.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5\",\"name\":\"Ian Carnaghan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g\",\"caption\":\"Ian Carnaghan\"},\"logo\":{\"@id\":\"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/\"},\"description\":\"I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.\",\"sameAs\":[\"http:\/\/www.carnaghan.com\",\"https:\/\/x.com\/icarnaghan\"],\"url\":\"https:\/\/www.carnaghan.com\/author\/icarnaghan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Usable Security? User Friendly Factors - Ian Carnaghan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/","og_locale":"en_US","og_type":"article","og_title":"Usable Security? User Friendly Factors - Ian Carnaghan","og_description":"In his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how we model security systems within the organization. He makes the case that security has to be simple and at the same time it has to minimize hassle (for the end user). He concludes that the root […]","og_url":"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/","og_site_name":"Ian Carnaghan","article_published_time":"2015-10-12T14:26:00+00:00","article_modified_time":"2018-02-19T03:14:35+00:00","author":"Ian Carnaghan","twitter_card":"summary_large_image","twitter_creator":"@icarnaghan","twitter_site":"@icarnaghan","twitter_misc":{"Written by":"Ian Carnaghan","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/#article","isPartOf":{"@id":"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/"},"author":{"name":"Ian Carnaghan","@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5"},"headline":"Usable Security? User Friendly Factors","datePublished":"2015-10-12T14:26:00+00:00","dateModified":"2018-02-19T03:14:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/"},"wordCount":397,"commentCount":0,"publisher":{"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5"},"keywords":["CSEC 630"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/","url":"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/","name":"Usable Security? User Friendly Factors - Ian Carnaghan","isPartOf":{"@id":"https:\/\/www.carnaghan.com\/#website"},"datePublished":"2015-10-12T14:26:00+00:00","dateModified":"2018-02-19T03:14:35+00:00","breadcrumb":{"@id":"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.carnaghan.com\/usable-security-user-friendly-factors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carnaghan.com\/"},{"@type":"ListItem","position":2,"name":"Usable Security? User Friendly Factors"}]},{"@type":"WebSite","@id":"https:\/\/www.carnaghan.com\/#website","url":"https:\/\/www.carnaghan.com\/","name":"Ian Carnaghan","description":"Software Developer, Blogger, Educator","publisher":{"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carnaghan.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/c689c24d516c51968a88b628860740a5","name":"Ian Carnaghan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2aa5baca80c2be728de43a975185d91?s=96&d=retro&r=g","caption":"Ian Carnaghan"},"logo":{"@id":"https:\/\/www.carnaghan.com\/#\/schema\/person\/image\/"},"description":"I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.","sameAs":["http:\/\/www.carnaghan.com","https:\/\/x.com\/icarnaghan"],"url":"https:\/\/www.carnaghan.com\/author\/icarnaghan\/"}]}},"views":67,"_links":{"self":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/posts\/4028"}],"collection":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/comments?post=4028"}],"version-history":[{"count":0,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/posts\/4028\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/media?parent=4028"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/categories?post=4028"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/tags?post=4028"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/www.carnaghan.com\/wp-json\/wp\/v2\/post_series?post=4028"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}