Human-Centric Cybersecurity

  1. Usable Security Design
    1. Principles of Usable Security
      1. Security-Usability Trade-offs
        1. Principle of Least Effort
          1. Reducing Security Friction
            1. Workflow Integration
              1. Mental Model Alignment
              2. User-Centered Security Design Process
                1. User Research Methods
                  1. Interviews and Surveys
                    1. Observational Studies
                      1. Persona Development
                        1. Journey Mapping
                        2. Security Requirements Analysis
                          1. Threat Modeling from User Perspective
                            1. Risk Assessment Integration
                              1. Compliance Requirements
                              2. Design and Prototyping
                                1. Iterative Design Process
                                  1. Low-Fidelity Prototyping
                                    1. High-Fidelity Prototyping
                                      1. Design System Development
                                      2. Usability Testing
                                        1. Testing Methods
                                          1. Metrics and Evaluation
                                            1. Accessibility Testing
                                              1. Security-Specific Testing
                                            2. Authentication and Access Control
                                              1. Password Management
                                                1. Password Creation Guidelines
                                                  1. Password Managers
                                                    1. Password Recovery
                                                    2. Multi-Factor Authentication
                                                      1. Factor Types and Selection
                                                        1. User Experience Design
                                                          1. Backup and Recovery
                                                          2. Passwordless Authentication
                                                            1. Biometric Authentication
                                                              1. Hardware Tokens
                                                                1. Mobile-Based Authentication
                                                                2. Single Sign-On Systems
                                                                  1. User Experience Considerations
                                                                    1. Security Implications
                                                                  2. Security Warnings and Notifications
                                                                    1. Warning Design Principles
                                                                      1. Attention and Comprehension
                                                                        1. Warning Fatigue Prevention
                                                                          1. Actionable Guidance
                                                                            1. Contextual Warnings
                                                                            2. Privacy-Enhancing Design
                                                                              1. Privacy by Design Principles
                                                                                1. Data Minimization
                                                                                  1. User Control and Transparency
                                                                                    1. Privacy Dashboards
                                                                                    2. Common Design Anti-Patterns
                                                                                      1. Security Theater
                                                                                        1. Excessive Warnings
                                                                                          1. Complex Security Controls
                                                                                            1. Poor Error Messages
                                                                                              1. Inconsistent Interfaces