ABSTRACT

This chapter discusses the cognitive processes involved in user authentication and their application in a cognitive architecture the Cognitive Model of User Authentication. The usable security symmetry inspection method aims to help security designers to design, inspect, and evaluate the usability as well as the security aspects of user authentication mechanisms. To build the usability factors and usability criteria mapping, an adaptation of the Quality in Use Integrated Measurement hierarchical model has been used. Authentication mechanisms in complex systems such as Multifunction Teller Machines for banking are characterized by their user interface components. Furthermore, there is a common but false belief that security is only related to the software functionality and can be designed independently from the software usability which is related to the user interface component. The usable security symmetry integrates usable security earlier into the requirements and design phases of the user authentication methods development lifecycle.