34. Security and Usability
36 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

According to the context, what is avoidance of harm from use related to in human-centred design?

  • Positive outcomes from interaction
  • Ergonomic aspects of product design
  • Negative outcomes that could arise from inappropriate forms of interaction or outputs (correct)
  • User satisfaction with the system

Why is security considered part of avoidance of harm from use?

  • Because it is an aspect of usability
  • Because it is an ergonomic consideration
  • Because it tries to avoid security-related harm (correct)
  • Because it enhances user satisfaction

What does flexibility in a computer system refer to?

  • Ability to adapt to the environment and users' needs (correct)
  • Ability to withstand attacks
  • Ability to recover from system failures
  • Ability to sustain for a longer term

Why is security often not what users want?

<p>Because users want to focus on getting their work done (B)</p> Signup and view all the answers

What is the primary goal of a security system in the context of human-centred design?

<p>To provide a sufficient level of security (C)</p> Signup and view all the answers

What is the relationship between security and usability in the context of human-centred design?

<p>Security and usability are separate but related considerations (A)</p> Signup and view all the answers

What is the main focus of 'satisfaction' in the context of usability?

<p>A collective goal of achieving specified goals (D)</p> Signup and view all the answers

What is the term for 'meeting the widest range of user needs' in diverse contexts of use?

<p>Accessibility (D)</p> Signup and view all the answers

Which of the following OECD guidelines emphasizes the importance of 'human rights and fundamental values' in digital security risk management?

<p>OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity (2015) (C)</p> Signup and view all the answers

What is the term for 'the extent to which a system, product or service can be used by specified users to achieve specified goals'?

<p>Usability (D)</p> Signup and view all the answers

What is the primary goal of a transdisciplinary approach to protection?

<p>To understand how adversaries attack and compromise systems (B)</p> Signup and view all the answers

What is the term for 'the person's perceptions and responses that result from the use and/or anticipated use of a system, product or service'?

<p>User experience (C)</p> Signup and view all the answers

What is the primary focus of the 4 principles in NIST Special Publication 800-27 related to security foundations?

<p>Ease of use and usability (A)</p> Signup and view all the answers

What is the importance of basing security on open standards, as stated in NIST SP 800-27?

<p>To promote portability and interoperability (A)</p> Signup and view all the answers

What is the primary focus of NIST SP 800-160 Vol. 1 in relation to security?

<p>Security architecture and design (C)</p> Signup and view all the answers

What is the importance of designing security to allow for regular adoption of new technology, as stated in NIST SP 800-27?

<p>To enable the integration of new technologies and reduce legacy system risks (A)</p> Signup and view all the answers

What is the primary focus of the 8 principles in NIST SP 800-27 related to resilience?

<p>System redundancy and fault tolerance (D)</p> Signup and view all the answers

What is the importance of striving for operational ease of use, as stated in NIST SP 800-27?

<p>To enhance the user experience (D)</p> Signup and view all the answers

A security system tries to avoid some ______-related harm(s).

<p>security</p> Signup and view all the answers

A computer system should be ______ enough to adapt to the environment and the users’ needs.

<p>flexible</p> Signup and view all the answers

Security is often NOT what users want , users want their work done and they don’t know what ______ really means!

<p>security</p> Signup and view all the answers

According to the OECD Guidelines for the Security of Information Systems and Networks, one of the principles is ______ which includes human rights and fundamental values.

<p>Democracy</p> Signup and view all the answers

The ______ approach to protection requires consideration across all assets where loss could occur.

<p>transdisciplinary</p> Signup and view all the answers

Part of effectiveness: A ______ system is not effective if it does not provide a sufficient level of security.

<p>security</p> Signup and view all the answers

Part of satisfaction: You will not be satisfied if a ______ system does not provide a sufficient level of security.

<p>security</p> Signup and view all the answers

In the context of security, human factors are critical as humans can be the weakest ______ in the system.

<p>link</p> Signup and view all the answers

A computer system should be ______ and robust enough to attacks, system failures and errors, and can recover easily to support continuity of use.

<p>resilient</p> Signup and view all the answers

The OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity (2015) outlines ______ principles for security risk management.

<p>8</p> Signup and view all the answers

According to the ISO 9241-11:2018, ______ is the extent to which a system can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction.

<p>usability</p> Signup and view all the answers

In security design, it is essential to consider the ______ in the system, including how adversaries attack and compromise systems.

<p>adversities</p> Signup and view all the answers

The Parkerian Hexad includes _______ and Integrity.

<p>Utility</p> Signup and view all the answers

NIST SP 800-160 Vol. 1 provides considerations for a _______ Approach in the Engineering of Trustworthy Secure Systems.

<p>Multidisciplinary</p> Signup and view all the answers

According to NIST SP 800-27, security should be designed to allow for regular adoption of new _______ technology.

<p>secure</p> Signup and view all the answers

NIST SP 800-160 Vol. 1 includes principles related to _______ Factor Security, among others.

<p>Human</p> Signup and view all the answers

NIST SP 800-27 emphasizes the importance of _______ security foundations, including principles related to ease of use.

<p>Life Cycle</p> Signup and view all the answers

NIST SP 800-160 Vol. 1 discusses the importance of a _______ Approach to protection in system security engineering.

<p>Transdisciplinary</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser