Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Design for Security

Автор: linux.conf.au

Загружено: 2019-01-24

Просмотров: 2698

Описание:

Serena Chen

https://2019.linux.conf.au/schedule/p...

Today, the internet owns our lives. Every website and app we touch knows us: our personal information, our inane ramblings, our deepest secrets. Security has never been more crucial, yet it’s a rare topic outside of ISM teams and hackers. And through the design lens, it’s completely missing.

This is a mistake.

There’s a misconception that security is a niche for masterminds. In the real world, most security breaches don’t come from 0days or neat hacks. In fact, most errors are human—simple scams that have worked since society began.

This is where design fills a missed opportunity.

Good user experience design is necessary for good security. We can craft paths of least resistance that match paths of most security. We can educate our users on what is good practice and what is security theater. We can build secure flows that are usable, not obstructive or annoying.

In this talk we'll go over four strategies that apply design thinking to security problems. We'll pinpoint which practices work and which are detrimental. And finally, we'll walk through how you can use design thinking to approach security issues in your websites, apps, and companies in a whole new way.

linux.conf.au is a conference about the Linux operating system, and all aspects of the thriving ecosystem of Free and Open Source Software that has grown up around it. Run since 1999, in a different Australian or New Zealand city each year, by a team of local volunteers, LCA invites more than 500 people to learn from the people who shape the future of Open Source. For more information on the conference see https://linux.conf.au/

#linux.conf.au #linux #foss #opensource

Design for Security

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#6499 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "3l8GwLv2f3E" ["related_video_title"]=> string(69) "10 Principles for Secure by Design: Baking Security into Your Systems" ["posted_time"]=> string(27) "9 месяцев назад" ["channelName"]=> string(14) "IBM Technology" } [1]=> object(stdClass)#6472 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "sGfyGhP6M_A" ["related_video_title"]=> string(88) ""The seL4 Foundation – growing through upheaval" - Gernot Heiser (LCA 2022 Online)" ["posted_time"]=> string(21) "3 года назад" ["channelName"]=> string(13) "linux.conf.au" } [2]=> object(stdClass)#6497 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "VS2sk3P1_Cc" ["related_video_title"]=> string(63) "Becoming a tyrant: Implementing secure boot in embedded devices" ["posted_time"]=> string(21) "3 года назад" ["channelName"]=> string(13) "linux.conf.au" } [3]=> object(stdClass)#6504 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "BT38K6NqETE" ["related_video_title"]=> string(125) "Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках" ["posted_time"]=> string(27) "6 месяцев назад" ["channelName"]=> string(22) "Раскадровка" } [4]=> object(stdClass)#6483 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "7yGbHtv0yxg" ["related_video_title"]=> string(79) ""Automating hardware test & measurement" - Julien Goodwin (LCA 2022 Online)" ["posted_time"]=> string(21) "3 года назад" ["channelName"]=> string(13) "linux.conf.au" } [5]=> object(stdClass)#6501 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "jq_LZ1RFPfU" ["related_video_title"]=> string(72) "Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(14) "IBM Technology" } [6]=> object(stdClass)#6496 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "1Y1kJpHBn50" ["related_video_title"]=> string(43) "How to Design Impenetrable Airport Security" ["posted_time"]=> string(19) "7 лет назад" ["channelName"]=> string(20) "Wendover Productions" } [7]=> object(stdClass)#6506 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "EJzitviiv2c" ["related_video_title"]=> string(29) "КАК УСТРОЕН TCP/IP?" ["posted_time"]=> string(27) "9 месяцев назад" ["channelName"]=> string(7) "Alek OS" } [8]=> object(stdClass)#6482 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "blWdjRUPP6E" ["related_video_title"]=> string(72) "Разведчик о том, как использовать людей" ["posted_time"]=> string(25) "2 недели назад" ["channelName"]=> string(18) "Коллектив" } [9]=> object(stdClass)#6500 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "SVI7BxfOWdk" ["related_video_title"]=> string(156) "ПОВЫШЕНИЕ ШТРАФОВ В 8 - 40 РАЗ: НОВЫЕ штрафы, ловушка в ОСАГО, секретные отметки в правах" ["posted_time"]=> string(23) "9 часов назад" ["channelName"]=> string(33) "Александр Шумский" } }
10 Principles for Secure by Design: Baking Security into Your Systems

10 Principles for Secure by Design: Baking Security into Your Systems

"The seL4 Foundation – growing through upheaval" - Gernot Heiser (LCA 2022 Online)

Becoming a tyrant: Implementing secure boot in embedded devices

Becoming a tyrant: Implementing secure boot in embedded devices

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

"Automating hardware test & measurement" - Julien Goodwin (LCA 2022 Online)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

How to Design Impenetrable Airport Security

How to Design Impenetrable Airport Security

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Разведчик о том, как использовать людей

Разведчик о том, как использовать людей

ПОВЫШЕНИЕ ШТРАФОВ В 8 - 40 РАЗ: НОВЫЕ штрафы, ловушка в ОСАГО, секретные отметки в правах

ПОВЫШЕНИЕ ШТРАФОВ В 8 - 40 РАЗ: НОВЫЕ штрафы, ловушка в ОСАГО, секретные отметки в правах

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]