Patterns are based on scientific sources.
Name | Distinguish Security Levels |
Sources | (Garfinkel, 2005) |
Synonyms | None |
Context | Users can only make informed decisions about security if they are in fact informed. |
Problem | How to distinguish security levels? |
Solution | Give the user a simple way to distinguish between similar operations that are more-secure and less-secure. The visual indications should be consistent across products, packages and vendors. |
Examples | The SSL lock icon; the icons to indicate if email is signed or encrypted. The Windows Security Center indicates if anti-virus protection is enabled or not. Source: (Garfinkel, 2005) |
Implementation | Web browsers display a lock icon when a web page is received over SSL. (They should also indicate if data sent back to the server will be sent over an encrypted channel.) Email clients can indicate whether or not mail is downloaded using SSL. |
Consequences | The user can readily determine whether or not security features are enabled. |
Dependencies | None |
Relationships | [Detailed Notifications about Security] |
Principles | [Identifiability] [Consistent Controls and Placement] |
Guidelines | None |
Check lists | None |
Use cases | None |
Tags | Distinguish Security Levels, Detailed Notifications about Security, Self-descriptiveness |
Log history | [12/21/2015]: Added to repository |
Garfinkel, S.L., 2005. Design principles and patterns for computer systems that are simultaneously secure and usable (PhD thesis). Massachusetts Institute of Technology.