000 | 03890cam a22005651i 4500 | ||
---|---|---|---|
001 | 9781003052029 | ||
003 | FlBoTFG | ||
005 | 20220509193034.0 | ||
006 | m d | ||
007 | cr ||||||||||| | ||
008 | 200903r20202019flua ob 001 0 eng d | ||
040 |
_aOCoLC-P _beng _erda _epn _cOCoLC-P |
||
020 |
_a9781000258332 _q(ePub ebook) |
||
020 | _a1000258335 | ||
020 |
_a9781000258257 _q(PDF ebook) |
||
020 | _a1000258254 | ||
020 |
_a9781000258295 _q(Mobipocket ebook) |
||
020 | _a1000258297 | ||
020 |
_a9781003052029 _q(ebook) |
||
020 | _a1003052029 | ||
020 | _z9780367509798 (hbk.) | ||
020 | _z0367509792 | ||
024 | 7 |
_a10.1201/9781003052029 _2doi |
|
035 |
_a(OCoLC)1222806311 _z(OCoLC)1201675705 _z(OCoLC)1222799725 |
||
035 | _a(OCoLC-P)1222806311 | ||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x083000 _2bisacsh |
|
072 | 7 |
_aJMAL _2bicssc |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aPatterson, Wayne, _d1945- _eauthor. |
|
245 | 1 | 0 |
_aBehavioral cybersecurity : _bfundamental principles and applications of personality psychology / _cWayne Patterson, Cynthia E. Winston-Proctor. |
250 | _a1st. | ||
264 | 1 |
_aBoca Raton : _bCRC Press, _c2020. |
|
300 |
_a1 online resource : _billustrations (black and white) |
||
336 |
_atext _2rdacontent |
||
336 |
_astill image _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
500 | _aOriginally published: 2019. | ||
500 | _a1. Recent Events. 2. Behavioral Cybersecurity. 3. Personality Psychology Theory and Methods of Assessment. 4. Hacker Case Study Personality Analysis and Ethical Hacking. 5. Profiling. 6. Access Control. 7. The First Step: Authorization. 8. Origins of Cryptography. 9. Game Theory. 10. The Psychology of Gender. 11. Turing Tests. 12. Modular Arithmetic and Other Computational Methods. 13. Modern Cryptography. 14. Steganography and Relation to Crypto. 15. A Metric to Measure Attacks/Defenses. 16 Behavioral Economics. 17. Fake News. 18. Exercises: "Hack Labs". 19. Conclusions. | ||
520 | _aThis book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists. Since the introduction and proliferation of the Internet, cybersecurity maintenance issues have grown exponentially. The importance of behavioral cybersecurity has recently been amplified by current events, such as misinformation and cyber-attacks related to election interference in the United States and internationally. More recently, similar issues have occurred in the context of the COVID-19 pandemic. The book presents profiling approaches, offers case studies of major cybersecurity events and provides analysis of password attacks and defenses. Discussing psychological methods used to assess behavioral cybersecurity, alongside risk management, the book also describes game theory and its applications, explores the role of cryptology and steganography in attack and defense scenarios and brings the reader up to date with current research into motivation and attacker/defender personality traits. Written for practitioners in the field, alongside nonspecialists with little prior knowledge of cybersecurity, computer science, or psychology, the book will be of interest to all who need to protect their computing environment from cyber-attacks. The book also provides source materials for courses in this growing area of behavioral cybersecurity. | ||
588 | _aOCLC-licensed vendor bibliographic record. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aComputer fraud. | |
650 | 0 | _aHacking. | |
650 | 0 | _aSocial engineering. | |
650 | 7 |
_aCOMPUTERS / Cryptography _2bisacsh |
|
700 | 1 |
_aWinston-Proctor, Cynthia E., _eauthor. |
|
856 | 4 | 0 |
_3Taylor & Francis _uhttps://www.taylorfrancis.com/books/9781003052029 |
856 | 4 | 2 |
_3OCLC metadata license agreement _uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
999 |
_c128685 _d128685 |