The adversarial element is an intrinsic part of the design of secure systems, but our assumptions about attackers and threat is often limited or stereotypical. Although there has been previous work on applying User-Centered Design on Persona development to build personas for possible attackers, such work is only speculative and fails to build upon recent research. This paper presents an approach for developing Attacker Personas which is both grounded and validated by structured data about attackers. We describe a case study example where the personas were developed and used to support the development of a Context of Use description for the EU FP7 webinos project
Because human factors are a root cause of security breaches in many organisations, security awarenes...
Real-world data collection poses an important challenge in the security field. Insider and masquerad...
Personas are a popular technique in User-Centered Design, however their validity can be called into ...
The adversarial element is an intrinsic part of the design of secure systems, but our assumptions ab...
Personas are useful for obtaining an empirically grounded understanding of a secure system's user po...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
This paper aims to present an approach where assumption personas are used to engage stakeholders in ...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
The increasing use of the Internet for social purposes enriches the data available online about all ...
Purpose – This paper aims to present an approach where assumption personas are used to engage s...
Abstract. Personas are useful for obtaining an empirically grounded understanding of a secure system...
System stakeholders fail to engage with security until comparatively late in the design and developm...
System stakeholders fail to engage with security until comparatively late in the design and developm...
This paper aims to present a tool-supported approach for visualising personas as social goal models,...
Because human factors are a root cause of security breaches in many organisations, security awarenes...
Because human factors are a root cause of security breaches in many organisations, security awarenes...
Real-world data collection poses an important challenge in the security field. Insider and masquerad...
Personas are a popular technique in User-Centered Design, however their validity can be called into ...
The adversarial element is an intrinsic part of the design of secure systems, but our assumptions ab...
Personas are useful for obtaining an empirically grounded understanding of a secure system's user po...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
This paper aims to present an approach where assumption personas are used to engage stakeholders in ...
Building secure and usable systems means specifying systems for the people using it and the tasks th...
The increasing use of the Internet for social purposes enriches the data available online about all ...
Purpose – This paper aims to present an approach where assumption personas are used to engage s...
Abstract. Personas are useful for obtaining an empirically grounded understanding of a secure system...
System stakeholders fail to engage with security until comparatively late in the design and developm...
System stakeholders fail to engage with security until comparatively late in the design and developm...
This paper aims to present a tool-supported approach for visualising personas as social goal models,...
Because human factors are a root cause of security breaches in many organisations, security awarenes...
Because human factors are a root cause of security breaches in many organisations, security awarenes...
Real-world data collection poses an important challenge in the security field. Insider and masquerad...
Personas are a popular technique in User-Centered Design, however their validity can be called into ...