Diese Seite auf DE
Event
Human Factors in Security and Privacy [WS232511554]
Lecturers
Organisation
- KIT-Fakultät für Wirtschaftswissenschaften
Part of
- Brick Human Factors in Security and Privacy | Industrial Engineering and Management (M.Sc.)
- Brick Human Factors in Security and Privacy | Economics Engineering (M.Sc.)
- Brick Human Factors in Security and Privacy | Digital Economics (M.Sc.)
- Brick Human Factors in Security and Privacy | Information Systems (M.Sc.)
- Brick Human Factors in Security and Privacy | Information Engineering and Management (M.Sc.)
- Brick Human Factors in Security and Privacy | Economathematics (M.Sc.)
Literature
- Usable Security: History, Themes, and Challenges (Synthesis Lectures on Information Security, Privacy, and Trust): Simson Garfinkel und Heather Richter Lipford. 2014
- Security and Usability: Designing Secure Systems that People Can Use von Lorrie Faith Cranor und Simson Garfinkel. 2005
- Melanie Volkamer, Karen Renaud: Mental Models - General Introduction and Review of Their Application to Human-Centred Security. In Number Theory and Cryptography (2013): 255-280: https://link.springer.com/chapter/10.1007/978-3-642-42001-6_18
- Paul Gerber, Marco Ghiglierie, Birgit Henhapl, Oksana Kulyk, Karola Marky, Peter Mayer, Benjamin Reinheimer, Melanie Volkamer: Human Factors in Security. In: Reuter C. (eds) Sicherheitskritische Mensch-Computer-Interaktion. Springer (2018) https://link.springer.com/chapter/10.1007/978-3-658-19523-6_5
- Bruce Schneier: Psychology of Security (2018): https://www.schneier.com/essays/archives/2008/01/the_psychology_of_se.html
- Ross Anderson: security /usability and psychology. In Security Engineering. http://www.cl.cam.ac.uk/~rja14/Papers/SEv2-c02.pdf
- Andrew Odlyzko: Economics, Psychology and Sociology of Security: http://www.dtc.umn.edu/~odlyzko/doc/econ.psych.security.pdf
Appointments
- 23.10.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 23.10.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 30.10.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 30.10.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 06.11.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 06.11.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 13.11.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 13.11.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 20.11.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 20.11.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 27.11.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 27.11.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 04.12.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 04.12.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 11.12.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 11.12.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 18.12.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 18.12.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 08.01.2024 14:00 - 15:30 - Room: 05.20 5A-09
- 08.01.2024 14:00 - 15:30 - Room: 05.20 1C-03
- 15.01.2024 14:00 - 15:30 - Room: 05.20 5A-09
- 15.01.2024 14:00 - 15:30 - Room: 05.20 1C-03
- 22.01.2024 14:00 - 15:30 - Room: 05.20 1C-03
- 22.01.2024 14:00 - 15:30 - Room: 05.20 5A-09
- 29.01.2024 14:00 - 15:30 - Room: 05.20 1C-03
- 29.01.2024 14:00 - 15:30 - Room: 05.20 5A-09
- 05.02.2024 14:00 - 15:30 - Room: 05.20 1C-03
- 05.02.2024 14:00 - 15:30 - Room: 05.20 5A-09
- 12.02.2024 14:00 - 15:30 - Room: 05.20 5A-09
- 12.02.2024 14:00 - 15:30 - Room: 05.20 1C-03
Note
Please take a look at all the information provided before the first event (e.g. first slides)!
The event will be conducted with 3G. Accordingly, either a one-time proof of vaccination or an official proof of a negative test is required for each event.
Some lectures are in English, some in German.
To participate in the quizzes at the beginning of the event a charged device is needed e.g. laptop or cell phone.
To successfully pass the course, the following requirements must be met:
Both need to be done:
- Reading Paper, Active Participation & Pass Quiz on Paper for Graphical Passwords
- Presentation of Results Exercise 2
+ 9 of the following 11 need to be done:
- Submit ILIAS certificate until Oct 24
- Pass Quiz on InfoSec Lecture
- Active participation exercise 1 – Part 1
- Reading Paper, Active Participation & Pass Quiz “Users are not the enemy”Active participation exercise 1 – Part 2
- Reading Paper, Active Participation & Pass Quiz “Why Johnny can't encrypt”
- Reading Paper, Active Participation & Pass Quiz “Put Your Warning Where Your Link Is: Improving and Evaluating Email Phishing Warnings”
- Active participation exercise 1 – Part 3
- Active participation exercise 1 – Part 4 Results
- Reading Paper, Active Participation & Pass Quiz “User-centered security”Active participation exercise 2 – Part 1
Here is a first preview of the topics planned for the lecture:
- General Introduction
- Self-Study: Knowlege of Information Security Lecture
- Terminology + Basics
- Evaluation and analyses methods
- Risk Communication
- Security Awareness
- Security Indicators
- Graphical Authentication
- Shoulder Surfing Authentication
- Usable Verifiable Electronic Voting
- Q&A + Exam preparation