As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing. While technical issues are fundamental in understanding how to improve system security, analyzing the roles of human agents is crucial. This title addresses, through examples, the human factors behind cybersecurity attacks.
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing. While technical issues are fundamental in understanding how to improve system security, analyzing the roles of human agents is crucial. This title addresses, through examples, the human factors behind cybersecurity attacks.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Abbas Moallem, Ph.D., is a consultant and adjunct professor at San Jose State University, California, where he teaches human-computer interaction, cybersecurity, information visualization, and human factors. He is also the program chair of HCI-CPT, the International Conference on HCI for Cybersecurity, Privacy, and Trust, and the track chair of the International Conference on Human Factors in Cybersecurity. Dr. Moallem is the editor of Human-Computer Interaction and Cybersecurity Handbook, Smart and Intelligent Systems, The Human Elements in Artificial Intelligence, Robotics, and Cybersecurity, Cybersecurity Awareness Among Students and Faculty, Understanding Cybersecurity Technologies, A Guide to Selecting the Right Cybersecurity Tools. He is also the editor of a book series from CRC Press titled The Human Element in Smart and Intelligent Systems.
Inhaltsangabe
Contents Acknowledgments About the author Introduction Part 1: Human and Motivation Chapter 1: Human Agents Chapter 2: Cyberattackers versus Hackers Chapter 3: Cyberattackers' Motivations Part 2: Cyberwar and Cyberespionage Chapter 4: SolarWinds Chapter 5: Pegasus Spyware Chapter 6: Google Chrome Extension Spyware Chapter 7: Marriott International Part 3: Sabotage Chapter 8: Stuxnet Chapter 9: Colonial Pipelines Chapter 10: Ukrainian Power Grid Hack Part 4: Fake News Shaping People's Opinions Chapter 11: Facebook-Cambridge Analytica Chapter 12: Instagram Part 5: Data Privacy Chapter 13: Baidu Android Apps Chapter 14: Zoom Chapter 15: LinkedIn Chapter 16: Spotify Part 6: Trust Chapter 17: Uber Technologies Chapter 18: Equifax Chapter 19: Office of Personnel Management Data Part 7: Financial Cybercrimes Chapter 20: Emulators-Mobile Banking Frauds Chapter 21: Google Store Chapter 22: British Airways Chapter 23: Target Data Breach Chapter 24: TJ Maxx's Data Breach Part 8: Black Mail-Hacktivism Chapter 25: Ashley Madison Chapter 26: Dark Web Hosting Provider Hack Part 9: Conclusion Chapter 27: Factors Shaping Vulnerable Behaviors Index