SlideShare a Scribd company logo
1 of 49
Security and UX
Pushing for Change in the Enterprise Environment
“The value of personal financial and health
records is two or three times the value of financial
information alone.” – Post Gazette
http://www.post-gazette.com/news/health/2015/03/16/Healthcare-files-valuable-to-identity-
thieves/stories/201503160013
“Stolen health credentials can go for $10 each,
about 10 or 20 times the value of a U.S. credit card
number” – Reuters
http://www.reuters.com/article/us-cybersecurity-hospitals-idUSKCN0HJ21I20140924
“Criminals are selling the information on the black
market at a rate of $50 for each partial EHR,
compared to $1 for a stolen social security
number or credit card number” – FBI Cyber
Division
http://www.illuminweb.com/wp-content/uploads/ill-mo-uploads/103/2418/health-systems-cyber-
intrusions.pdf
Secure From the Start
Yahoo
500 million email accounts
“To make computer systems more secure, a
company often has to make its products slower
and more difficult to use. It was a trade-off
Yahoo’s leadership was often unwilling to make.” –
New York Times
http://mobile.nytimes.com/2016/09/29/technology/yahoo-data-breach-hacking.html
“-their requests were often overridden because of
concerns that the inconvenience of added
protection would make people stop using the
company’s products” – NY Times
When we aim to improve the user experience of
security, we aren't just challenging convention, we
are challenging culture.
Involve Development from the Beginning
Involve Security from the Beginning
“Design happens when designers aren’t
there.” – Jarod Spool
https://articles.uie.com/designing_without_a_designer/
To solve these problems, we need to have a
common language.
Risk
Risk is any event that could result in the
compromise of assets.
We make a series of design decisions that
make assumptions about risk.
1. Hard to guess (or find out)
2. Easy to remember
3. Doesn’t change over time
Multifactor Authentication
A thing you have.
A thing you know.
A thing you are.
https://arxiv.org/pdf/1309.5344.pdf
Authentication
Authorization
Globalization & Privacy
https://www.dlapiperdataprotection.com/#handbook/world-map-section
1. Share your process.
1. Share your process.
2. Understand the limitations of the other
disciplines.
1. Share your process.
2. Understand the limitations of the other
disciplines.
3. Build those relationships.
Success Story (with a dash of failure)
PAM (Privileged Access Management)
1. Observe your users.
2. Craft Personas.
1. Observe your users.
2. Craft Personas.
1. Observe your users.
3. Integrate into your user’s workflows.
“The Paranoids, the internal name for Yahoo’s
security team, often clashed with other parts of
the business over security costs.” – NY Times
Empathy
Thank you.

More Related Content

Similar to Security and User Experience (by Glenn A. Gustitus at #NUX5)

wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposedNumaan Huq
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The HealthcareTracy Berry
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society Sumama Shakir
 
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxgidmanmary
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearydrewz lin
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteSandraPaiva
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3Asad Zaman
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 

Similar to Security and User Experience (by Glenn A. Gustitus at #NUX5) (20)

wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
Information Security And The Healthcare
Information Security And The HealthcareInformation Security And The Healthcare
Information Security And The Healthcare
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
computer and society impact of Computer in society
computer and society  impact of Computer in society computer and society  impact of Computer in society
computer and society impact of Computer in society
 
Security
SecuritySecurity
Security
 
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
 
Pace IT - Common Security Threats
Pace IT - Common Security ThreatsPace IT - Common Security Threats
Pace IT - Common Security Threats
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 

More from Northern User Experience

NUX Leeds April 2024 - researching with people who have experienced trauma an...
NUX Leeds April 2024 - researching with people who have experienced trauma an...NUX Leeds April 2024 - researching with people who have experienced trauma an...
NUX Leeds April 2024 - researching with people who have experienced trauma an...Northern User Experience
 
10 Easy Ways to Irritate Your Design Team (by Jane Austin at #NUX7)
10 Easy Ways to Irritate Your Design Team (by Jane Austin at #NUX7)10 Easy Ways to Irritate Your Design Team (by Jane Austin at #NUX7)
10 Easy Ways to Irritate Your Design Team (by Jane Austin at #NUX7)Northern User Experience
 
Good Intentions and Bad Actors (by Lisa deBettencourt at #NUX7)
Good Intentions and Bad Actors (by Lisa deBettencourt at #NUX7)Good Intentions and Bad Actors (by Lisa deBettencourt at #NUX7)
Good Intentions and Bad Actors (by Lisa deBettencourt at #NUX7)Northern User Experience
 
Everything Connected (by Christopher Murphy at #NUX7)
Everything Connected (by Christopher Murphy at #NUX7)Everything Connected (by Christopher Murphy at #NUX7)
Everything Connected (by Christopher Murphy at #NUX7)Northern User Experience
 
It’s Complicated – Designing in The Age Of Emergence (by Christina Wodtke at ...
It’s Complicated – Designing in The Age Of Emergence (by Christina Wodtke at ...It’s Complicated – Designing in The Age Of Emergence (by Christina Wodtke at ...
It’s Complicated – Designing in The Age Of Emergence (by Christina Wodtke at ...Northern User Experience
 
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)Northern User Experience
 
Agile in depth (by Robert Coop at NUX Leeds November 2017)
Agile in depth (by Robert Coop at NUX Leeds November 2017)Agile in depth (by Robert Coop at NUX Leeds November 2017)
Agile in depth (by Robert Coop at NUX Leeds November 2017)Northern User Experience
 
AB Testing and UX - a love story with numbers and people (by Craig Sullivan a...
AB Testing and UX - a love story with numbers and people (by Craig Sullivan a...AB Testing and UX - a love story with numbers and people (by Craig Sullivan a...
AB Testing and UX - a love story with numbers and people (by Craig Sullivan a...Northern User Experience
 
User research assets: treasure or trash? (by Kate Towsey at #NUX6)
User research assets: treasure or trash? (by Kate Towsey at #NUX6)User research assets: treasure or trash? (by Kate Towsey at #NUX6)
User research assets: treasure or trash? (by Kate Towsey at #NUX6)Northern User Experience
 
Content design what it is and what it isn't
Content design  what it is and what it isn'tContent design  what it is and what it isn't
Content design what it is and what it isn'tNorthern User Experience
 
Witnessing health: impactful user research in the NHS
Witnessing health: impactful user research in the NHSWitnessing health: impactful user research in the NHS
Witnessing health: impactful user research in the NHSNorthern User Experience
 
Everybody Hurts: Content for Kindness (by Sara Wachter-Boettcher at #NUX4)
Everybody Hurts: Content for Kindness (by Sara Wachter-Boettcher at #NUX4)Everybody Hurts: Content for Kindness (by Sara Wachter-Boettcher at #NUX4)
Everybody Hurts: Content for Kindness (by Sara Wachter-Boettcher at #NUX4)Northern User Experience
 
User Research Interviews: All you need to know
User Research Interviews: All you need to knowUser Research Interviews: All you need to know
User Research Interviews: All you need to knowNorthern User Experience
 
Wearables: a show & tell with user stories
Wearables: a show & tell with user storiesWearables: a show & tell with user stories
Wearables: a show & tell with user storiesNorthern User Experience
 
NUX Leeds - 26/03/2015 - The Role of the Graphic Designer in UXD - Simon Jone...
NUX Leeds - 26/03/2015 - The Role of the Graphic Designer in UXD - Simon Jone...NUX Leeds - 26/03/2015 - The Role of the Graphic Designer in UXD - Simon Jone...
NUX Leeds - 26/03/2015 - The Role of the Graphic Designer in UXD - Simon Jone...Northern User Experience
 
NUX Leeds - January 22nd - Can design constraints be freeing and creative fre...
NUX Leeds - January 22nd - Can design constraints be freeing and creative fre...NUX Leeds - January 22nd - Can design constraints be freeing and creative fre...
NUX Leeds - January 22nd - Can design constraints be freeing and creative fre...Northern User Experience
 

More from Northern User Experience (20)

NUX Leeds April 2024 - researching with people who have experienced trauma an...
NUX Leeds April 2024 - researching with people who have experienced trauma an...NUX Leeds April 2024 - researching with people who have experienced trauma an...
NUX Leeds April 2024 - researching with people who have experienced trauma an...
 
10 Easy Ways to Irritate Your Design Team (by Jane Austin at #NUX7)
10 Easy Ways to Irritate Your Design Team (by Jane Austin at #NUX7)10 Easy Ways to Irritate Your Design Team (by Jane Austin at #NUX7)
10 Easy Ways to Irritate Your Design Team (by Jane Austin at #NUX7)
 
Good Intentions and Bad Actors (by Lisa deBettencourt at #NUX7)
Good Intentions and Bad Actors (by Lisa deBettencourt at #NUX7)Good Intentions and Bad Actors (by Lisa deBettencourt at #NUX7)
Good Intentions and Bad Actors (by Lisa deBettencourt at #NUX7)
 
Everything Connected (by Christopher Murphy at #NUX7)
Everything Connected (by Christopher Murphy at #NUX7)Everything Connected (by Christopher Murphy at #NUX7)
Everything Connected (by Christopher Murphy at #NUX7)
 
It’s Complicated – Designing in The Age Of Emergence (by Christina Wodtke at ...
It’s Complicated – Designing in The Age Of Emergence (by Christina Wodtke at ...It’s Complicated – Designing in The Age Of Emergence (by Christina Wodtke at ...
It’s Complicated – Designing in The Age Of Emergence (by Christina Wodtke at ...
 
Nux 240518-slides
Nux 240518-slidesNux 240518-slides
Nux 240518-slides
 
GDPR: Data protection rights and wrongs
GDPR: Data protection rights and wrongsGDPR: Data protection rights and wrongs
GDPR: Data protection rights and wrongs
 
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)
Usability Lab within Agile (by Ian Franklin at NUX Leeds January 2018)
 
Agile in depth (by Robert Coop at NUX Leeds November 2017)
Agile in depth (by Robert Coop at NUX Leeds November 2017)Agile in depth (by Robert Coop at NUX Leeds November 2017)
Agile in depth (by Robert Coop at NUX Leeds November 2017)
 
AB Testing and UX - a love story with numbers and people (by Craig Sullivan a...
AB Testing and UX - a love story with numbers and people (by Craig Sullivan a...AB Testing and UX - a love story with numbers and people (by Craig Sullivan a...
AB Testing and UX - a love story with numbers and people (by Craig Sullivan a...
 
User research assets: treasure or trash? (by Kate Towsey at #NUX6)
User research assets: treasure or trash? (by Kate Towsey at #NUX6)User research assets: treasure or trash? (by Kate Towsey at #NUX6)
User research assets: treasure or trash? (by Kate Towsey at #NUX6)
 
Content design what it is and what it isn't
Content design  what it is and what it isn'tContent design  what it is and what it isn't
Content design what it is and what it isn't
 
Copywriting is broken
Copywriting is brokenCopywriting is broken
Copywriting is broken
 
Witnessing health: impactful user research in the NHS
Witnessing health: impactful user research in the NHSWitnessing health: impactful user research in the NHS
Witnessing health: impactful user research in the NHS
 
NUX Liverpool UX Utopia
NUX Liverpool UX UtopiaNUX Liverpool UX Utopia
NUX Liverpool UX Utopia
 
Everybody Hurts: Content for Kindness (by Sara Wachter-Boettcher at #NUX4)
Everybody Hurts: Content for Kindness (by Sara Wachter-Boettcher at #NUX4)Everybody Hurts: Content for Kindness (by Sara Wachter-Boettcher at #NUX4)
Everybody Hurts: Content for Kindness (by Sara Wachter-Boettcher at #NUX4)
 
User Research Interviews: All you need to know
User Research Interviews: All you need to knowUser Research Interviews: All you need to know
User Research Interviews: All you need to know
 
Wearables: a show & tell with user stories
Wearables: a show & tell with user storiesWearables: a show & tell with user stories
Wearables: a show & tell with user stories
 
NUX Leeds - 26/03/2015 - The Role of the Graphic Designer in UXD - Simon Jone...
NUX Leeds - 26/03/2015 - The Role of the Graphic Designer in UXD - Simon Jone...NUX Leeds - 26/03/2015 - The Role of the Graphic Designer in UXD - Simon Jone...
NUX Leeds - 26/03/2015 - The Role of the Graphic Designer in UXD - Simon Jone...
 
NUX Leeds - January 22nd - Can design constraints be freeing and creative fre...
NUX Leeds - January 22nd - Can design constraints be freeing and creative fre...NUX Leeds - January 22nd - Can design constraints be freeing and creative fre...
NUX Leeds - January 22nd - Can design constraints be freeing and creative fre...
 

Recently uploaded

NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...Amil baba
 
Call Girls In Ratnagiri Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service En...
Call Girls In Ratnagiri Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service En...Call Girls In Ratnagiri Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service En...
Call Girls In Ratnagiri Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service En...Nitya salvi
 
ab-initio-training basics and architecture
ab-initio-training basics and architectureab-initio-training basics and architecture
ab-initio-training basics and architecturesaipriyacoool
 
Q4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentationQ4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentationZenSeloveres
 
Simple Conference Style Presentation by Slidesgo.pptx
Simple Conference Style Presentation by Slidesgo.pptxSimple Conference Style Presentation by Slidesgo.pptx
Simple Conference Style Presentation by Slidesgo.pptxbalqisyamutia
 
Furniture & Joinery Details_Designs.pptx
Furniture & Joinery Details_Designs.pptxFurniture & Joinery Details_Designs.pptx
Furniture & Joinery Details_Designs.pptxNikhil Raut
 
Top profile Call Girls In eluru [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In eluru [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In eluru [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In eluru [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 
Minimalist Orange Portfolio by Slidesgo.pptx
Minimalist Orange Portfolio by Slidesgo.pptxMinimalist Orange Portfolio by Slidesgo.pptx
Minimalist Orange Portfolio by Slidesgo.pptxbalqisyamutia
 
Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...
Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...
Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...Nitya salvi
 
Jordan_Amanda_DMBS202404_PB1_2024-04.pdf
Jordan_Amanda_DMBS202404_PB1_2024-04.pdfJordan_Amanda_DMBS202404_PB1_2024-04.pdf
Jordan_Amanda_DMBS202404_PB1_2024-04.pdfamanda2495
 
Pondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime Pondicherry
Pondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime PondicherryPondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime Pondicherry
Pondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime Pondicherrymeghakumariji156
 
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...instagramfab782445
 
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样awasv46j
 
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样yhavx
 
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证wpkuukw
 
Eye-Catching Web Design Crafting User Interfaces .docx
Eye-Catching Web Design Crafting User Interfaces .docxEye-Catching Web Design Crafting User Interfaces .docx
Eye-Catching Web Design Crafting User Interfaces .docxMdBokhtiyarHossainNi
 
Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...
Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...
Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...gargpaaro
 
Resume all my skills and educations and achievement
Resume all my skills and educations and  achievement Resume all my skills and educations and  achievement
Resume all my skills and educations and achievement 210303105569
 
How to Create a Productive Workspace Trends and Tips.pdf
How to Create a Productive Workspace Trends and Tips.pdfHow to Create a Productive Workspace Trends and Tips.pdf
How to Create a Productive Workspace Trends and Tips.pdfOffice Furniture Plus - Irving
 

Recently uploaded (20)

NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
NO1 Top Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
 
Call Girls In Ratnagiri Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service En...
Call Girls In Ratnagiri Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service En...Call Girls In Ratnagiri Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service En...
Call Girls In Ratnagiri Escorts ☎️8617370543 🔝 💃 Enjoy 24/7 Escort Service En...
 
ab-initio-training basics and architecture
ab-initio-training basics and architectureab-initio-training basics and architecture
ab-initio-training basics and architecture
 
Q4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentationQ4-W4-SCIENCE-5 power point presentation
Q4-W4-SCIENCE-5 power point presentation
 
Simple Conference Style Presentation by Slidesgo.pptx
Simple Conference Style Presentation by Slidesgo.pptxSimple Conference Style Presentation by Slidesgo.pptx
Simple Conference Style Presentation by Slidesgo.pptx
 
Furniture & Joinery Details_Designs.pptx
Furniture & Joinery Details_Designs.pptxFurniture & Joinery Details_Designs.pptx
Furniture & Joinery Details_Designs.pptx
 
Top profile Call Girls In eluru [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In eluru [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In eluru [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In eluru [ 7014168258 ] Call Me For Genuine Models We ...
 
Minimalist Orange Portfolio by Slidesgo.pptx
Minimalist Orange Portfolio by Slidesgo.pptxMinimalist Orange Portfolio by Slidesgo.pptx
Minimalist Orange Portfolio by Slidesgo.pptx
 
Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...
Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...
Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...
 
Jordan_Amanda_DMBS202404_PB1_2024-04.pdf
Jordan_Amanda_DMBS202404_PB1_2024-04.pdfJordan_Amanda_DMBS202404_PB1_2024-04.pdf
Jordan_Amanda_DMBS202404_PB1_2024-04.pdf
 
Pondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime Pondicherry
Pondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime PondicherryPondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime Pondicherry
Pondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime Pondicherry
 
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...
 
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
 
Hackathon evaluation template_latest_uploadpdf
Hackathon evaluation template_latest_uploadpdfHackathon evaluation template_latest_uploadpdf
Hackathon evaluation template_latest_uploadpdf
 
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
 
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
 
Eye-Catching Web Design Crafting User Interfaces .docx
Eye-Catching Web Design Crafting User Interfaces .docxEye-Catching Web Design Crafting User Interfaces .docx
Eye-Catching Web Design Crafting User Interfaces .docx
 
Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...
Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...
Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...
 
Resume all my skills and educations and achievement
Resume all my skills and educations and  achievement Resume all my skills and educations and  achievement
Resume all my skills and educations and achievement
 
How to Create a Productive Workspace Trends and Tips.pdf
How to Create a Productive Workspace Trends and Tips.pdfHow to Create a Productive Workspace Trends and Tips.pdf
How to Create a Productive Workspace Trends and Tips.pdf
 

Security and User Experience (by Glenn A. Gustitus at #NUX5)

Editor's Notes

  1. Email addresses, names, phone numbers, birthdates, security questions and answers, and potentially passwords
  2. Threat plus consequence
  3. U
  4. Designers, especially in larger corporations can feel understaffed with too small of a budget. That other disciplines don’t understand the value they present. It’s important for us to remember that these other diciplines that we work with are often in the same place we are.