000 03890cam a22005651i 4500
001 9781003052029
003 FlBoTFG
005 20220509193034.0
006 m d
007 cr |||||||||||
008 200903r20202019flua ob 001 0 eng d
040 _aOCoLC-P
_beng
_erda
_epn
_cOCoLC-P
020 _a9781000258332
_q(ePub ebook)
020 _a1000258335
020 _a9781000258257
_q(PDF ebook)
020 _a1000258254
020 _a9781000258295
_q(Mobipocket ebook)
020 _a1000258297
020 _a9781003052029
_q(ebook)
020 _a1003052029
020 _z9780367509798 (hbk.)
020 _z0367509792
024 7 _a10.1201/9781003052029
_2doi
035 _a(OCoLC)1222806311
_z(OCoLC)1201675705
_z(OCoLC)1222799725
035 _a(OCoLC-P)1222806311
050 4 _aQA76.9.A25
072 7 _aCOM
_x083000
_2bisacsh
072 7 _aJMAL
_2bicssc
082 0 4 _a005.8
_223
100 1 _aPatterson, Wayne,
_d1945-
_eauthor.
245 1 0 _aBehavioral cybersecurity :
_bfundamental principles and applications of personality psychology /
_cWayne Patterson, Cynthia E. Winston-Proctor.
250 _a1st.
264 1 _aBoca Raton :
_bCRC Press,
_c2020.
300 _a1 online resource :
_billustrations (black and white)
336 _atext
_2rdacontent
336 _astill image
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
500 _aOriginally published: 2019.
500 _a1. Recent Events. 2. Behavioral Cybersecurity. 3. Personality Psychology Theory and Methods of Assessment. 4. Hacker Case Study Personality Analysis and Ethical Hacking. 5. Profiling. 6. Access Control. 7. The First Step: Authorization. 8. Origins of Cryptography. 9. Game Theory. 10. The Psychology of Gender. 11. Turing Tests. 12. Modular Arithmetic and Other Computational Methods. 13. Modern Cryptography. 14. Steganography and Relation to Crypto. 15. A Metric to Measure Attacks/Defenses. 16 Behavioral Economics. 17. Fake News. 18. Exercises: "Hack Labs". 19. Conclusions.
520 _aThis book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists. Since the introduction and proliferation of the Internet, cybersecurity maintenance issues have grown exponentially. The importance of behavioral cybersecurity has recently been amplified by current events, such as misinformation and cyber-attacks related to election interference in the United States and internationally. More recently, similar issues have occurred in the context of the COVID-19 pandemic. The book presents profiling approaches, offers case studies of major cybersecurity events and provides analysis of password attacks and defenses. Discussing psychological methods used to assess behavioral cybersecurity, alongside risk management, the book also describes game theory and its applications, explores the role of cryptology and steganography in attack and defense scenarios and brings the reader up to date with current research into motivation and attacker/defender personality traits. Written for practitioners in the field, alongside nonspecialists with little prior knowledge of cybersecurity, computer science, or psychology, the book will be of interest to all who need to protect their computing environment from cyber-attacks. The book also provides source materials for courses in this growing area of behavioral cybersecurity.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer security.
650 0 _aComputer fraud.
650 0 _aHacking.
650 0 _aSocial engineering.
650 7 _aCOMPUTERS / Cryptography
_2bisacsh
700 1 _aWinston-Proctor, Cynthia E.,
_eauthor.
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003052029
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c128685
_d128685