Access "Adrian Perrig: Improve SSL/TLS Security Through Education and Technology"
This article is part of the October 2009 issue of Winners of Information Security magazine's Security 7 Award
Despite much recent progress in the area of user-centric design of secure systems, user error continues to cause a large number of security vulnerabilities in current systems. Both user education and technology can help to improve this situation. At CyLab at Carnegie Mellon University, our goal is to improve security in all aspects of society. First, we developed educational programs to train students in security. Second, CyLab researchers also engage in several efforts to design systems that continue to remain secure despite human errors, as well as develop technologies that provide improved situational awareness to the user. Using the Secure Socket Layer (SSL) / Transport Layer Security (TLS) protocols for secure https Web connections as a case study, we will first describe how education has helped improve Web security, followed by a description of the Perspectives project, which provides additional information for users to make better security decisions. To provide some background for our discussion, we briefly revisit some SSL/TLS security-relevant ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Melissa Hathaway: Government Must Keep Pace with Cybersecurity Threats
by Melissa Hathaway, Contributor
Securing the Internet means to much to the future of the U.S. economy and national security.
-
Bernie Rominski: Communicate Effectively with Management about Risk
by Bernie Rominski
Learn how to communicate with senior management about risk; it's your job.
-
Information Security magazine Security 7 Award winners
Information Security magazine annouces the winners of its fifth annual Security 7 Awards.
-
Jerry Freese: Make Critical Infrastructure Protection a Priority
by Jerry Freese
Critical infrastructure protection must be addressed today to protect our country tomorrow.
-
Adrian Perrig: Improve SSL/TLS Security Through Education and Technology
by Adrian Perrig
Carnegie Mellon University's CyLab designs security to improve all aspects of society.
-
Melissa Hathaway: Government Must Keep Pace with Cybersecurity Threats
by Melissa Hathaway, Contributor
-
-
Bruce Jones: Report Security and Risk Metrics in a Business-Friendly Way
by Bruce Jones
Security metrics must, not only provide a view of security posture, but must support security budgeting and investment processes.
-
Tony Spinelli: Prioritize Information Security over Compliance
by Tony Spinelli
Organizations need to prioritize security over compliance to ensure comprehensive risk mitigation.
-
SOX compliance burdens midmarket security teams
Smaller public companies bear significantly higher pain in terms of revenue and costs per employee complying with Sarbanes-Oxley.
-
Developers Need Help with Security Errors
SQL injection attacks continue to plague Web applications. Companies need to invest in technology and education to hold off hackers.
-
Jon Moore: Build a Security Control Framework for Predictable Compliance
by Jon Moore
Health care provider Humana Inc., has developed a security controls framework that addresses all of the industry and federal regulations it must comply with.
-
Bruce Jones: Report Security and Risk Metrics in a Business-Friendly Way
by Bruce Jones
-
Columns
-
Editor's Desk: Security 7 Winners Chronicle Trends That Shape The Industry
Looking back at five years of award winners provides a timeline of security trends that you need to absorb.
-
How to avoid Internet liability lawsuits
by Jeanne Debus
Enterprises face numerous potential liabilities online. Avoiding lawsuits requires a sound cyber risk management plan.
-
Editor's Desk: Security 7 Winners Chronicle Trends That Shape The Industry
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO