This page in EN
Veranstaltung
Human Factors in Security and Privacy [WS222511554]
Dozent/en
Einrichtung
- KIT-Fakultät für Wirtschaftswissenschaften
Bestandteil von
- Teilleistung Human Factors in Security and Privacy | Wirtschaftsingenieurwesen (M.Sc.)
- Teilleistung Human Factors in Security and Privacy | Technische Volkswirtschaftslehre (M.Sc.)
- Teilleistung Human Factors in Security and Privacy | Wirtschaftsinformatik (M.Sc.)
- Teilleistung Human Factors in Security and Privacy | Informationswirtschaft (M.Sc.)
- Teilleistung Human Factors in Security and Privacy | Wirtschaftsmathematik (M.Sc.)
Literatur
- Usable Security: History, Themes, and Challenges (Synthesis Lectures on Information Security, Privacy, and Trust): Simson Garfinkel und Heather Richter Lipford. 2014
- Security and Usability: Designing Secure Systems that People Can Use von Lorrie Faith Cranor und Simson Garfinkel. 2005
- Melanie Volkamer, Karen Renaud: Mental Models - General Introduction and Review of Their Application to Human-Centred Security. In Number Theory and Cryptography (2013): 255-280: https://link.springer.com/chapter/10.1007/978-3-642-42001-6_18
- Paul Gerber, Marco Ghiglierie, Birgit Henhapl, Oksana Kulyk, Karola Marky, Peter Mayer, Benjamin Reinheimer, Melanie Volkamer: Human Factors in Security. In: Reuter C. (eds) Sicherheitskritische Mensch-Computer-Interaktion. Springer (2018) https://link.springer.com/chapter/10.1007/978-3-658-19523-6_5
- Bruce Schneier: Psychology of Security (2018): https://www.schneier.com/essays/archives/2008/01/the_psychology_of_se.html
- Ross Anderson: security /usability and psychology. In Security Engineering. http://www.cl.cam.ac.uk/~rja14/Papers/SEv2-c02.pdf
- Andrew Odlyzko: Economics, Psychology and Sociology of Security: http://www.dtc.umn.edu/~odlyzko/doc/econ.psych.security.pdf
Veranstaltungstermine
- 24.10.2022 14:00 - 15:30 - Room: 05.20 5A-09
- 24.10.2022 14:00 - 15:30 - Room: 05.20 1C-03
- 31.10.2022 14:00 - 15:30 - Room: 05.20 5A-09
- 31.10.2022 14:00 - 15:30 - Room: 05.20 1C-03
- 07.11.2022 14:00 - 15:30 - Room: 05.20 1C-03
- 07.11.2022 14:00 - 15:30 - Room: 05.20 5A-09
- 14.11.2022 14:00 - 15:30 - Room: 05.20 5A-09
- 14.11.2022 14:00 - 15:30 - Room: 05.20 1C-03
- 21.11.2022 14:00 - 15:30 - Room: 05.20 1C-03
- 21.11.2022 14:00 - 15:30 - Room: 05.20 5A-09
- 28.11.2022 14:00 - 15:30 - Room: 05.20 5A-09
- 28.11.2022 14:00 - 15:30 - Room: 05.20 1C-03
- 05.12.2022 14:00 - 15:30 - Room: 05.20 5A-09
- 05.12.2022 14:00 - 15:30 - Room: 05.20 1C-03
- 12.12.2022 14:00 - 15:30 - Room: 05.20 5A-09
- 12.12.2022 14:00 - 15:30 - Room: 05.20 1C-03
- 19.12.2022 14:00 - 15:30 - Room: 05.20 1C-03
- 19.12.2022 14:00 - 15:30 - Room: 05.20 5A-09
- 09.01.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 09.01.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 16.01.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 16.01.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 23.01.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 23.01.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 30.01.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 30.01.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 06.02.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 06.02.2023 14:00 - 15:30 - Room: 05.20 5A-09
- 13.02.2023 14:00 - 15:30 - Room: 05.20 1C-03
- 13.02.2023 14:00 - 15:30 - Room: 05.20 5A-09
Anmerkung
Bitte schauen Sie bereits alle bereit gestellten Informationen vor der ersten Veranstaltung an (z.B. erste Foliensatz)!
Die Veranstaltung wird mit 3G durchgeführt. Dementsprechend ist entweder ein einmaliger Impfnachweis oder zu jeder Veranstaltung ein offizieller Nachweis eines negativen Tests erforderlich.
Manche Vorlesungseinheiten werden auf Deutsch, andere auf Englisch gehalten.
Um an den Quiz zu Begin der Veranstaltung teilzunehmen wird geladenes ein Gerät benötigt z.B. Laptop oder Handy.
To successfully pass the course, the following requirements must be met:
Both need to be done:
- Reading Paper, Active Participation & Pass Quiz on Paper for Graphical Passwords
- Presentation of Results Exercise 2
+ 9 of the following 11 need to be done:
- Submit ILIAS certificate until Oct 24
- Pass Quiz on InfoSec Lecture
- Active participation exercise 1 – Part 1
- Reading Paper, Active Participation & Pass Quiz “Users are not the enemy”Active participation exercise 1 – Part 2
- Reading Paper, Active Participation & Pass Quiz “Why Johnny can't encrypt”
- Reading Paper, Active Participation & Pass Quiz “Put Your Warning Where Your Link Is: Improving and Evaluating Email Phishing Warnings”
- Active participation exercise 1 – Part 3
- Active participation exercise 1 – Part 4 Results
- Reading Paper, Active Participation & Pass Quiz “User-centered security”Active participation exercise 2 – Part 1
Here is a first preview of the topics planned for the lecture:
- General Introduction
- Self-Study: Knowlege of Information Security Lecture
- Terminology + Basics
- Evaluation and analyses methods
- Risk Communication
- Security Awareness
- Security Indicators
- Graphical Authentication
- Shoulder Surfing Authentication
- Usable Verifiable Electronic Voting
- Q&A + Exam preparation