USEC: Lecture 2: Usable Security and Privacy Thinking & Threat Modeling
Lecture Slides
See attached file
Materials
Reading for this lecture:
- Ion, I., Reeder, R. and Consolvo, S., 2015. {“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015) (pp. 327-346).
Take-home
- Worlds Shoretest Threat Modelling Course - Adam Shostack
- (Blog) Munyendo, C., Acar, Y. and Aviv, A.J., 2023, May. “In Eighty Percent of the Cases, I Select the Password for Them”: Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya. In 2023 IEEE Symposium on Security and Privacy.
- (Blog) Hielscher, J. and Parkin, S., 2024. " What Keeps People Secure is That They Met The Security Team": Deconstructing Drivers And Goals of Organizational Security Awareness. In 2024 USENIX Security and Privacy.
License
All rights reserved The University of Edinburgh