{"guid":"edc54a6c-b7af-11eb-8d34-68f728ba22b1","title":"Menschengerechte IT-Sicherheit","subtitle":"","slug":"fiffkon20_zinaida_benenson_-_menschengerechte_it-sicherheit","link":"https://2020.fiffkon.de/zinaidabenenson.html","description":"Gestaltungeffektive IT-Sicherheit erfordert die Berücksichtigung der Fähigkeiten der nicht fachkundigen Nutzer. Leider sind dabei die Anforderungen an die Nutzer oft unrealistisch. Den Nutzern wird unsicheres Verhalten vorgeworfen, ohne zu fragen: sind sie überhaupt in der Lage, sich „sicher“ zu benehmen? Statt der zum Scheitern verurteilten Versuche, die Nutzer durch Sensibilisierung und Schuldzuweisung an die IT-Systeme anzupassen, sollen die IT-Systeme an die Nutzer angepasst werden. Wie das gelingen könnte, wird in diesem Vortrag dargestellt.","original_language":"deu","persons":["Zinaida Benenson"],"tags":["fiffkon20","4","2020"],"view_count":161,"promoted":false,"date":"2020-11-14T11:00:00.000+01:00","release_date":"2021-05-18T00:00:00.000+02:00","updated_at":"2026-02-21T15:15:06.252+01:00","length":3618,"duration":3618,"thumb_url":"https://static.media.ccc.de/media/conferences/fiffkon/2020/4-edc54a6c-b7af-11eb-8d34-68f728ba22b1.jpg","poster_url":"https://static.media.ccc.de/media/conferences/fiffkon/2020/4-edc54a6c-b7af-11eb-8d34-68f728ba22b1_preview.jpg","timeline_url":"https://static.media.ccc.de/media/conferences/fiffkon/2020/4-edc54a6c-b7af-11eb-8d34-68f728ba22b1.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/conferences/fiffkon/2020/4-edc54a6c-b7af-11eb-8d34-68f728ba22b1.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/fiffkon20_zinaida_benenson_-_menschengerechte_it-sicherheit","url":"https://api.media.ccc.de/public/events/edc54a6c-b7af-11eb-8d34-68f728ba22b1","conference_title":"FIfFKon 2020","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20","related":[],"recordings":[{"size":321,"length":3618,"mime_type":"video/webm","language":"deu","filename":"fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1440,"height":1080,"updated_at":"2021-05-18T14:32:43.874+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/webm-hd/fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/53375","event_url":"https://api.media.ccc.de/public/events/edc54a6c-b7af-11eb-8d34-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"},{"size":157,"length":3618,"mime_type":"video/webm","language":"deu","filename":"fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2021-05-18T14:14:09.151+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/webm-sd/fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/53360","event_url":"https://api.media.ccc.de/public/events/edc54a6c-b7af-11eb-8d34-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"},{"size":107,"length":3618,"mime_type":"video/mp4","language":"deu","filename":"fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2021-05-18T14:06:13.833+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/h264-sd/fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_sd.mp4","url":"https://api.media.ccc.de/public/recordings/53357","event_url":"https://api.media.ccc.de/public/events/edc54a6c-b7af-11eb-8d34-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"},{"size":55,"length":3618,"mime_type":"audio/mpeg","language":"deu","filename":"fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2021-05-18T14:01:04.935+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/mp3/fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/53352","event_url":"https://api.media.ccc.de/public/events/edc54a6c-b7af-11eb-8d34-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"},{"size":38,"length":3618,"mime_type":"audio/opus","language":"deu","filename":"fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2021-05-18T14:00:32.668+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/opus/fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_opus.opus","url":"https://api.media.ccc.de/public/recordings/53351","event_url":"https://api.media.ccc.de/public/events/edc54a6c-b7af-11eb-8d34-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"},{"size":202,"length":3618,"mime_type":"video/mp4","language":"deu","filename":"fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1440,"height":1080,"updated_at":"2021-05-18T13:58:16.129+02:00","recording_url":"https://cdn.media.ccc.de/events/fiffkon/2020/h264-hd/fiffkon20-4-deu-Menschengerechte_IT-Sicherheit_hd.mp4","url":"https://api.media.ccc.de/public/recordings/53345","event_url":"https://api.media.ccc.de/public/events/edc54a6c-b7af-11eb-8d34-68f728ba22b1","conference_url":"https://api.media.ccc.de/public/conferences/fiffkon20"}]}