{"guid":"6599cb5e-b7af-11eb-9461-68f728ba22b1","title":"Einführung in Usable Security \u0026 Privacy","subtitle":"Wie lassen sich Usability und IT-Sicherheit sowie Datenschutz miteinander erreichen?","slug":"fiffkon20_stephan_wiefling_-_einfuehrung_in_usable_security_and_privacy","link":"https://2020.fiffkon.de/stephanwiefling.html","description":"Wie lassen sich Usability und IT-Sicherheit sowie Datenschutz miteinander erreichen? Dieser Frage widmet sich der Bereich der Usable Security \u0026 Privacy, welcher immer wichtiger wird. Das Ziel sind gebrauchstaugliche Sicherheitsfunktionen, die Nutzer wahrscheinlicher (richtig) verwenden können, wodurch die Sicherheit von Daten und Anwendungen insgesamt verbessert wird. Wir geben euch einen Einblick in das Thema und zeigen euch, warum die Authentifizierung dabei eine besondere Herausforderung ist.","original_language":"deu","persons":["Stephan Wiefling"],"tags":["fiffkon20","3","2020"],"view_count":393,"promoted":false,"date":"2020-11-14T10:00:00.000+01:00","release_date":"2021-05-18T00:00:00.000+02:00","updated_at":"2026-04-09T14:30:08.327+02:00","length":1969,"duration":1969,"thumb_url":"https://static.media.ccc.de/media/conferences/fiffkon/2020/3-6599cb5e-b7af-11eb-9461-68f728ba22b1.jpg","poster_url":"https://static.media.ccc.de/media/conferences/fiffkon/2020/3-6599cb5e-b7af-11eb-9461-68f728ba22b1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/fiffkon/2020/3-6599cb5e-b7af-11eb-9461-68f728ba22b1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/fiffkon/2020/3-6599cb5e-b7af-11eb-9461-68f728ba22b1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/fiffkon20_stephan_wiefling_-_einfuehrung_in_usable_security_and_privacy","url":"https://api.media.ccc.de/public/events/6599cb5e-b7af-11eb-9461-68f728ba22b1","conference_title":"FIfFKon 2020","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20","related":[],"recordings":[{"size":389,"length":1969,"mime_type":"video/webm","language":"deu","filename":"fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2021-05-18T14:26:48.426+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/webm-hd/fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/53372","event_url":"https://api.media.ccc.de/public/events/6599cb5e-b7af-11eb-9461-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"},{"size":138,"length":1969,"mime_type":"video/webm","language":"deu","filename":"fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2021-05-18T14:13:40.296+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/webm-sd/fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/53359","event_url":"https://api.media.ccc.de/public/events/6599cb5e-b7af-11eb-9461-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"},{"size":71,"length":1969,"mime_type":"video/mp4","language":"deu","filename":"fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2021-05-18T14:00:05.928+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/h264-sd/fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_sd.mp4","url":"https://api.media.ccc.de/public/recordings/53350","event_url":"https://api.media.ccc.de/public/events/6599cb5e-b7af-11eb-9461-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"},{"size":17,"length":1969,"mime_type":"audio/opus","language":"deu","filename":"fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2021-05-18T13:58:34.472+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/opus/fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_opus.opus","url":"https://api.media.ccc.de/public/recordings/53347","event_url":"https://api.media.ccc.de/public/events/6599cb5e-b7af-11eb-9461-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"},{"size":30,"length":1969,"mime_type":"audio/mpeg","language":"deu","filename":"fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2021-05-18T13:58:19.314+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/mp3/fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/53346","event_url":"https://api.media.ccc.de/public/events/6599cb5e-b7af-11eb-9461-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"},{"size":192,"length":1969,"mime_type":"video/mp4","language":"deu","filename":"fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2021-05-18T13:54:36.683+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/h264-hd/fiffkon20-3-deu-Einfuehrung_in_Usable_Security_Privacy_hd.mp4","url":"https://api.media.ccc.de/public/recordings/53344","event_url":"https://api.media.ccc.de/public/events/6599cb5e-b7af-11eb-9461-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"}]}