10.08.2015 Views

Usability and Security

Usability and Security - Vurore

Usability and Security - Vurore

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

To answer our main research question: "To what extent is it possible to have a sufficient level of security,without losing usability?We have performed literary studies <strong>and</strong> analyzed case studies of tradeoffs between usability <strong>and</strong> securityfor various authentication mechanisms. We can conclude that a balanced level of usability <strong>and</strong> securitycan be obtained for each authentication mechanism <strong>and</strong> that security is not at the expense of usability orvice versa. <strong>Usability</strong> <strong>and</strong> security can co-exist <strong>and</strong> the extent to which an optimal balance between thesetwo aspects can be achieved is particularly determined by the following factors:• type of organization;• type of process;• the importance <strong>and</strong> sensitivity of the information that needs to be protected;• target audience.7 ReflectionTerren ChongI have always been very interested in doing business online (e-commerce) <strong>and</strong> have been involved (<strong>and</strong>still is) in various website projects. Already familiar with the term web usability <strong>and</strong> research papers ofJacob Nielsen (some say, the ‘usability guru’), I knew I had to do something with usability. In thebeginning, I wasn’t sure how to incorporate the subject so it would relate to the postgraduate IT auditprogram, but found out soon that this would not be an issue.The idea to investigate the relationship between usability <strong>and</strong> security started when a client told me thattheir employees were writing their passwords down because they could not remember it. I was actually abit surprised, because the password policy at that time was not in line with best practice.The ‘real work’ started for me in January when I came back from my holidays. We had h<strong>and</strong>ed over ourplan of approach the month before <strong>and</strong> the actual work was ahead of us. Not sure what we would find onliterature, we kicked-off our literary study mid-January. The initial plan was to write the thesis in Dutch,but after a few days searching on the Internet, including electronic book repositories (e-books), I realizedthat there wasn’t sufficient material available or studies conducted in Dutch that would support theresearch question <strong>and</strong> overall topic. One-fourth of the thesis was already written in Dutch <strong>and</strong> with a busyperiod at work <strong>and</strong> overseeing that the actual time left to work on the thesis was limited, Andrew <strong>and</strong> Idecided to ‘switch’ to English. In my opinion it was the right choice to make. The risk of a possible delaywas accepted, but could not be avoided as the pressure was clearly felt in the last two weeks. Sundaysbecame a typical ‘thesis day’ were I would meet with Andrew for the day.The financial statement audit is important in meeting investor expectations. As an IT-auditor <strong>and</strong> havingkey-role in the financial statement audit, I feel that we need to pay more attention when writing ourrecommendations <strong>and</strong> not only recommend because it is considered to be a best practice, but to make therecommendation a piece of advise that the company would actually use or at least consider to implement.A good example is e.g. our advice on password policies. This not only concerns our role in financialstatement audits, but any audit <strong>and</strong> assurance related assignments where we are involved in.26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!