Usability and Security of Personal Firewalls

作者: Almut Herzog , Nahid Shahmehri

DOI: 10.1007/978-0-387-72367-9_4

关键词:

摘要: Effective security of a personal firewall depends on (1) the rule granularity and implementation enforcement (2) correctness user decisions at time an alert. A misconfigured or loosely configured may be more dangerous than no all because user’s false sense security. This study assesses effective 13 firewalls by comparing possible rules as well usability set-up its influence

参考文章(19)
Steven M Furnell, Using security Computer Fraud & Security. ,vol. 2004, pp. 6- 10 ,(2004) , 10.1016/S1361-3723(04)00052-1
Steven Furnell, Stamatis Bolakis, Helping us to help ourselves Network Security. ,vol. 2004, pp. 7- 12 ,(2004) , 10.1016/S1353-4858(04)00035-2
Robert C. Miller, David D. Clark, Simson L. Garfinkel, Design principles and patterns for computer systems that are simultaneously secure and usable Massachusetts Institute of Technology. ,(2005)
Alma Whitten, J. D. Tygar, Why Johnny can't encrypt: a usability evaluation of PGP 5.0 usenix security symposium. pp. 14- 14 ,(1999)
Morten Hertzum, Niels J�rgensen, Mie N�rgaard, Usable Security and E-Banking: ease of use vis-a-vis security Australasian Journal of Information Systems. ,vol. 11, ,(2004) , 10.3127/AJIS.V11I2.124
Kai Rannenberg, Simone Fischer Hübner, Stefan Lindskog, Louise Yngström, Security and Privacy in Dynamic Environments : Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006) Springer Scientific Publishers. ,(2006)
Almut Herzog, Nahid Shahmehri, A usability study of security policy management information security conference. pp. 296- 306 ,(2006) , 10.1007/0-387-33406-8_25
J. Johnston, J.H.P. Eloff, L. Labuschagne, Features: Security and human computer interfaces Computers & Security. ,vol. 22, pp. 675- 684 ,(2003) , 10.1016/S0167-4048(03)00006-3
Seny Kamara, Sonia Fahmy, Eugene Schultz, Florian Kerschbaum, Michael Frantzen, Analysis of vulnerabilities in Internet firewalls Computers & Security. ,vol. 22, pp. 214- 232 ,(2003) , 10.1016/S0167-4048(03)00310-9
Steven Furnell, Enemies within: the problem of insider attacks Computer Fraud & Security. ,vol. 2004, pp. 6- 11 ,(2004) , 10.1016/S1361-3723(04)00087-9