34. Security and Usability

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

According to the context, what is avoidance of harm from use related to in human-centred design?

  • Positive outcomes from interaction
  • Ergonomic aspects of product design
  • Negative outcomes that could arise from inappropriate forms of interaction or outputs (correct)
  • User satisfaction with the system

Why is security considered part of avoidance of harm from use?

  • Because it is an aspect of usability
  • Because it is an ergonomic consideration
  • Because it tries to avoid security-related harm (correct)
  • Because it enhances user satisfaction

What does flexibility in a computer system refer to?

  • Ability to adapt to the environment and users' needs (correct)
  • Ability to withstand attacks
  • Ability to recover from system failures
  • Ability to sustain for a longer term

Why is security often not what users want?

<p>Because users want to focus on getting their work done (B)</p> Signup and view all the answers

What is the primary goal of a security system in the context of human-centred design?

<p>To provide a sufficient level of security (C)</p> Signup and view all the answers

What is the relationship between security and usability in the context of human-centred design?

<p>Security and usability are separate but related considerations (A)</p> Signup and view all the answers

What is the main focus of 'satisfaction' in the context of usability?

<p>A collective goal of achieving specified goals (D)</p> Signup and view all the answers

What is the term for 'meeting the widest range of user needs' in diverse contexts of use?

<p>Accessibility (D)</p> Signup and view all the answers

Which of the following OECD guidelines emphasizes the importance of 'human rights and fundamental values' in digital security risk management?

<p>OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity (2015) (C)</p> Signup and view all the answers

What is the term for 'the extent to which a system, product or service can be used by specified users to achieve specified goals'?

<p>Usability (D)</p> Signup and view all the answers

What is the primary goal of a transdisciplinary approach to protection?

<p>To understand how adversaries attack and compromise systems (B)</p> Signup and view all the answers

What is the term for 'the person's perceptions and responses that result from the use and/or anticipated use of a system, product or service'?

<p>User experience (C)</p> Signup and view all the answers

What is the primary focus of the 4 principles in NIST Special Publication 800-27 related to security foundations?

<p>Ease of use and usability (A)</p> Signup and view all the answers

What is the importance of basing security on open standards, as stated in NIST SP 800-27?

<p>To promote portability and interoperability (A)</p> Signup and view all the answers

What is the primary focus of NIST SP 800-160 Vol. 1 in relation to security?

<p>Security architecture and design (C)</p> Signup and view all the answers

What is the importance of designing security to allow for regular adoption of new technology, as stated in NIST SP 800-27?

<p>To enable the integration of new technologies and reduce legacy system risks (A)</p> Signup and view all the answers

What is the primary focus of the 8 principles in NIST SP 800-27 related to resilience?

<p>System redundancy and fault tolerance (D)</p> Signup and view all the answers

What is the importance of striving for operational ease of use, as stated in NIST SP 800-27?

<p>To enhance the user experience (D)</p> Signup and view all the answers

A security system tries to avoid some ______-related harm(s).

<p>security</p> Signup and view all the answers

A computer system should be ______ enough to adapt to the environment and the users’ needs.

<p>flexible</p> Signup and view all the answers

Security is often NOT what users want , users want their work done and they don’t know what ______ really means!

<p>security</p> Signup and view all the answers

According to the OECD Guidelines for the Security of Information Systems and Networks, one of the principles is ______ which includes human rights and fundamental values.

<p>Democracy</p> Signup and view all the answers

The ______ approach to protection requires consideration across all assets where loss could occur.

<p>transdisciplinary</p> Signup and view all the answers

Part of effectiveness: A ______ system is not effective if it does not provide a sufficient level of security.

<p>security</p> Signup and view all the answers

Part of satisfaction: You will not be satisfied if a ______ system does not provide a sufficient level of security.

<p>security</p> Signup and view all the answers

In the context of security, human factors are critical as humans can be the weakest ______ in the system.

<p>link</p> Signup and view all the answers

A computer system should be ______ and robust enough to attacks, system failures and errors, and can recover easily to support continuity of use.

<p>resilient</p> Signup and view all the answers

The OECD Recommendation on Digital Security Risk Management for Economic and Social Prosperity (2015) outlines ______ principles for security risk management.

<p>8</p> Signup and view all the answers

According to the ISO 9241-11:2018, ______ is the extent to which a system can be used by specified users to achieve specified goals with effectiveness, efficiency, and satisfaction.

<p>usability</p> Signup and view all the answers

In security design, it is essential to consider the ______ in the system, including how adversaries attack and compromise systems.

<p>adversities</p> Signup and view all the answers

The Parkerian Hexad includes _______ and Integrity.

<p>Utility</p> Signup and view all the answers

NIST SP 800-160 Vol. 1 provides considerations for a _______ Approach in the Engineering of Trustworthy Secure Systems.

<p>Multidisciplinary</p> Signup and view all the answers

According to NIST SP 800-27, security should be designed to allow for regular adoption of new _______ technology.

<p>secure</p> Signup and view all the answers

NIST SP 800-160 Vol. 1 includes principles related to _______ Factor Security, among others.

<p>Human</p> Signup and view all the answers

NIST SP 800-27 emphasizes the importance of _______ security foundations, including principles related to ease of use.

<p>Life Cycle</p> Signup and view all the answers

NIST SP 800-160 Vol. 1 discusses the importance of a _______ Approach to protection in system security engineering.

<p>Transdisciplinary</p> Signup and view all the answers

Flashcards are hidden until you start studying

Related Documents

34 (1).docx

More Like This

Use Quizgecko on...
Browser
Browser