2004 | OriginalPaper | Buchkapitel
Secure Interaction Design
verfasst von : Ka-Ping Yee
Erschienen in: Financial Cryptography
Verlag: Springer Berlin Heidelberg
Enthalten in: Professional Book Archive
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Software correctness alone is not sufficient to achieve security, as some viruses and e-mail worms have demonstrated. For example, the Love Letter worm caused widespread damage even though it did not exploit any software flaws. It spread because users were unaware that attempting to view an attachment would damage their files and propagate the worm. User expectations are an essential part of the definition of computer security.