Podcast Beta
Questions and Answers
According to the context, what is avoidance of harm from use related to in human-centred design?
Why is security considered part of avoidance of harm from use?
What does flexibility in a computer system refer to?
Why is security often not what users want?
Signup and view all the answers
What is the primary goal of a security system in the context of human-centred design?
Signup and view all the answers
What is the relationship between security and usability in the context of human-centred design?
Signup and view all the answers
What is the main focus of 'satisfaction' in the context of usability?
Signup and view all the answers
What is the term for 'meeting the widest range of user needs' in diverse contexts of use?
Signup and view all the answers
Which of the following OECD guidelines emphasizes the importance of 'human rights and fundamental values' in digital security risk management?
Signup and view all the answers
What is the term for 'the extent to which a system, product or service can be used by specified users to achieve specified goals'?
Signup and view all the answers
What is the primary goal of a transdisciplinary approach to protection?
Signup and view all the answers
What is the term for 'the person's perceptions and responses that result from the use and/or anticipated use of a system, product or service'?
Signup and view all the answers
What is the primary focus of the 4 principles in NIST Special Publication 800-27 related to security foundations?
Signup and view all the answers
What is the importance of basing security on open standards, as stated in NIST SP 800-27?
Signup and view all the answers
What is the primary focus of NIST SP 800-160 Vol. 1 in relation to security?
Signup and view all the answers
What is the importance of designing security to allow for regular adoption of new technology, as stated in NIST SP 800-27?
Signup and view all the answers
What is the primary focus of the 8 principles in NIST SP 800-27 related to resilience?
Signup and view all the answers
What is the importance of striving for operational ease of use, as stated in NIST SP 800-27?
Signup and view all the answers
A security system tries to avoid some ______-related harm(s).
Signup and view all the answers
A computer system should be ______ enough to adapt to the environment and the users’ needs.
Signup and view all the answers
Security is often NOT what users want , users want their work done and they don’t know what ______ really means!
Signup and view all the answers
According to the OECD Guidelines for the Security of Information Systems and Networks, one of the principles is ______ which includes human rights and fundamental values.
Signup and view all the answers
The ______ approach to protection requires consideration across all assets where loss could occur.
Signup and view all the answers
Part of effectiveness: A ______ system is not effective if it does not provide a sufficient level of security.
Signup and view all the answers
Part of satisfaction: You will not be satisfied if a ______ system does not provide a sufficient level of security.
Signup and view all the answers
In the context of security, human factors are critical as humans can be the weakest ______ in the system.
Signup and view all the answers
A computer system should be ______ and robust enough to attacks, system failures and errors, and can recover easily to support continuity of use.
Signup and view all the answers
The OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity (2015) outlines ______ principles for security risk management.
Signup and view all the answers
According to the ISO 9241-11:2018, ______ is the extent to which a system can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction.
Signup and view all the answers
In security design, it is essential to consider the ______ in the system, including how adversaries attack and compromise systems.
Signup and view all the answers
The Parkerian Hexad includes _______ and Integrity.
Signup and view all the answers
NIST SP 800-160 Vol. 1 provides considerations for a _______ Approach in the Engineering of Trustworthy Secure Systems.
Signup and view all the answers
According to NIST SP 800-27, security should be designed to allow for regular adoption of new _______ technology.
Signup and view all the answers
NIST SP 800-160 Vol. 1 includes principles related to _______ Factor Security, among others.
Signup and view all the answers
NIST SP 800-27 emphasizes the importance of _______ security foundations, including principles related to ease of use.
Signup and view all the answers
NIST SP 800-160 Vol. 1 discusses the importance of a _______ Approach to protection in system security engineering.
Signup and view all the answers