Podcast
Questions and Answers
According to the context, what is avoidance of harm from use related to in human-centred design?
According to the context, what is avoidance of harm from use related to in human-centred design?
Why is security considered part of avoidance of harm from use?
Why is security considered part of avoidance of harm from use?
What does flexibility in a computer system refer to?
What does flexibility in a computer system refer to?
Why is security often not what users want?
Why is security often not what users want?
Signup and view all the answers
What is the primary goal of a security system in the context of human-centred design?
What is the primary goal of a security system in the context of human-centred design?
Signup and view all the answers
What is the relationship between security and usability in the context of human-centred design?
What is the relationship between security and usability in the context of human-centred design?
Signup and view all the answers
What is the main focus of 'satisfaction' in the context of usability?
What is the main focus of 'satisfaction' in the context of usability?
Signup and view all the answers
What is the term for 'meeting the widest range of user needs' in diverse contexts of use?
What is the term for 'meeting the widest range of user needs' in diverse contexts of use?
Signup and view all the answers
Which of the following OECD guidelines emphasizes the importance of 'human rights and fundamental values' in digital security risk management?
Which of the following OECD guidelines emphasizes the importance of 'human rights and fundamental values' in digital security risk management?
Signup and view all the answers
What is the term for 'the extent to which a system, product or service can be used by specified users to achieve specified goals'?
What is the term for 'the extent to which a system, product or service can be used by specified users to achieve specified goals'?
Signup and view all the answers
What is the primary goal of a transdisciplinary approach to protection?
What is the primary goal of a transdisciplinary approach to protection?
Signup and view all the answers
What is the term for 'the person's perceptions and responses that result from the use and/or anticipated use of a system, product or service'?
What is the term for 'the person's perceptions and responses that result from the use and/or anticipated use of a system, product or service'?
Signup and view all the answers
What is the primary focus of the 4 principles in NIST Special Publication 800-27 related to security foundations?
What is the primary focus of the 4 principles in NIST Special Publication 800-27 related to security foundations?
Signup and view all the answers
What is the importance of basing security on open standards, as stated in NIST SP 800-27?
What is the importance of basing security on open standards, as stated in NIST SP 800-27?
Signup and view all the answers
What is the primary focus of NIST SP 800-160 Vol. 1 in relation to security?
What is the primary focus of NIST SP 800-160 Vol. 1 in relation to security?
Signup and view all the answers
What is the importance of designing security to allow for regular adoption of new technology, as stated in NIST SP 800-27?
What is the importance of designing security to allow for regular adoption of new technology, as stated in NIST SP 800-27?
Signup and view all the answers
What is the primary focus of the 8 principles in NIST SP 800-27 related to resilience?
What is the primary focus of the 8 principles in NIST SP 800-27 related to resilience?
Signup and view all the answers
What is the importance of striving for operational ease of use, as stated in NIST SP 800-27?
What is the importance of striving for operational ease of use, as stated in NIST SP 800-27?
Signup and view all the answers
A security system tries to avoid some ______-related harm(s).
A security system tries to avoid some ______-related harm(s).
Signup and view all the answers
A computer system should be ______ enough to adapt to the environment and the users’ needs.
A computer system should be ______ enough to adapt to the environment and the users’ needs.
Signup and view all the answers
Security is often NOT what users want , users want their work done and they don’t know what ______ really means!
Security is often NOT what users want , users want their work done and they don’t know what ______ really means!
Signup and view all the answers
According to the OECD Guidelines for the Security of Information Systems and Networks, one of the principles is ______ which includes human rights and fundamental values.
According to the OECD Guidelines for the Security of Information Systems and Networks, one of the principles is ______ which includes human rights and fundamental values.
Signup and view all the answers
The ______ approach to protection requires consideration across all assets where loss could occur.
The ______ approach to protection requires consideration across all assets where loss could occur.
Signup and view all the answers
Part of effectiveness: A ______ system is not effective if it does not provide a sufficient level of security.
Part of effectiveness: A ______ system is not effective if it does not provide a sufficient level of security.
Signup and view all the answers
Part of satisfaction: You will not be satisfied if a ______ system does not provide a sufficient level of security.
Part of satisfaction: You will not be satisfied if a ______ system does not provide a sufficient level of security.
Signup and view all the answers
In the context of security, human factors are critical as humans can be the weakest ______ in the system.
In the context of security, human factors are critical as humans can be the weakest ______ in the system.
Signup and view all the answers
A computer system should be ______ and robust enough to attacks, system failures and errors, and can recover easily to support continuity of use.
A computer system should be ______ and robust enough to attacks, system failures and errors, and can recover easily to support continuity of use.
Signup and view all the answers
The OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity (2015) outlines ______ principles for security risk management.
The OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity (2015) outlines ______ principles for security risk management.
Signup and view all the answers
According to the ISO 9241-11:2018, ______ is the extent to which a system can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction.
According to the ISO 9241-11:2018, ______ is the extent to which a system can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction.
Signup and view all the answers
In security design, it is essential to consider the ______ in the system, including how adversaries attack and compromise systems.
In security design, it is essential to consider the ______ in the system, including how adversaries attack and compromise systems.
Signup and view all the answers
The Parkerian Hexad includes _______ and Integrity.
The Parkerian Hexad includes _______ and Integrity.
Signup and view all the answers
NIST SP 800-160 Vol. 1 provides considerations for a _______ Approach in the Engineering of Trustworthy Secure Systems.
NIST SP 800-160 Vol. 1 provides considerations for a _______ Approach in the Engineering of Trustworthy Secure Systems.
Signup and view all the answers
According to NIST SP 800-27, security should be designed to allow for regular adoption of new _______ technology.
According to NIST SP 800-27, security should be designed to allow for regular adoption of new _______ technology.
Signup and view all the answers
NIST SP 800-160 Vol. 1 includes principles related to _______ Factor Security, among others.
NIST SP 800-160 Vol. 1 includes principles related to _______ Factor Security, among others.
Signup and view all the answers
NIST SP 800-27 emphasizes the importance of _______ security foundations, including principles related to ease of use.
NIST SP 800-27 emphasizes the importance of _______ security foundations, including principles related to ease of use.
Signup and view all the answers
NIST SP 800-160 Vol. 1 discusses the importance of a _______ Approach to protection in system security engineering.
NIST SP 800-160 Vol. 1 discusses the importance of a _______ Approach to protection in system security engineering.
Signup and view all the answers