Synthetic Media, Deepfakes, and Cyber Deception: Attacks, Analysis, and Defenses introduces the only analytical Synthetic Media Analysis Framework (SMAF) to help describe cyber threats and help security professionals anticipate and analyze attacks. This framework encompasses seven dimensions: Credibility, Control, Medium, Interactivity, Familiarity, Intended Target, and Evocation. Synthetic media is a broad term that encompasses the artificial manipulation, modification, and production of information, covering a spectrum from audio-video deepfakes to text-based chatbots. Synthetic media…mehr
Synthetic Media, Deepfakes, and Cyber Deception: Attacks, Analysis, and Defenses introduces the only analytical Synthetic Media Analysis Framework (SMAF) to help describe cyber threats and help security professionals anticipate and analyze attacks. This framework encompasses seven dimensions: Credibility, Control, Medium, Interactivity, Familiarity, Intended Target, and Evocation. Synthetic media is a broad term that encompasses the artificial manipulation, modification, and production of information, covering a spectrum from audio-video deepfakes to text-based chatbots. Synthetic media provides cyber attackers and scammers with a game-changing advantage over traditional ROSE attacks because they have the potential to convincingly impersonate close associates through text, imagery, voice, and video. This burgeoning threat has yet to be meaningfully addressed through any written treatment on the topic. The book is co-authored by three cyber influence and deception experts who have gained deep knowledge and experience on the topic through diverse, true operational pathways and backgrounds. The diversity and perspectives of the author team makes the content in the book the broadest and deepest treatment of synthetic media attacks available to readers.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Cameron H. Malin is a Behavioral Profiler with over 20 years of experience investigating, analyzing and profiling cyber adversaries across the spectrum of criminal to national security. He is the founder of the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC) and the longest serving FBI Cyber Profiler. He is a co-author of the authoritative cyber deception book, Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications (published by Academic Press, an imprint of Elsevier, Inc.) and co-author of the Malware Forensics book series: Malware Forensics: Investigating and Analyzing Malicious Code, Malware Forensics Field Guide for Windows Systems, and Malware Forensics Field Guide for Linux Systems (all published by Syngress, an imprint of Elsevier, Inc.). Cameron is the creator of Digital Behavioral Criminalistics - a combined application of numerous forensic disciplines-digital forensics, criminalistics, and behavioral sciences-to meaningfully uncovering offender thoughts and actions in digital artifacts-as well as the Cyber Pathway to Intended Violence (CPIV)-a model for assessing violent offenders who have engaged computer systems, devices, and/or online resources before, during, and/or after a premeditated, violent act. These important emerging topics were published in his book chapter Digital Behavioral Criminalistics to Elucidate the Cyber Pathway to Intended Violence in the International Handbook of Threat Assessment, 2nd Edition (Oxford University Press, 2021). Prior to working for the FBI, Cameron was an Assistant State Attorney (ASA) and Special Assistant United States Attorney in Miami, Florida, where he specialized in computer crime prosecutions. During his tenure as an ASA, he was also an Assistant Professorial Lecturer in the Computer Fraud Investigations Master's Program at George Washington University.
Inhaltsangabe
Section I: Principles of Influence and Persuasion 1. Psychological Principles of Online Influence 2. Online Credibility Assessment 3. The Psychology of Trust Section II: Principles of Online Deception 4. The Psychology of Deception 5. "Oh what a tangled Web 2.0 we weave": Typologies of Online Deception 6. Nation-State Cyber Deception Practices 7. Synthetic Media Use by Cyber Crime Threat Actors Section III: Understanding the Synthetic Media Assessment Framework 8. The Synthetic Media Kill Chain 9. Overview of the Synthetic Media Assessment Framework 10. Control 11. Medium 12. Interactivity 13. Familiarity 14. Intended Target 15. Evocation Section IV: Applying the Synthetic Media Assessment Framework 16. Putting it All Together-Assessing Attack Scenarios 17. SMAF Best Practices
Section I: Principles of Influence and Persuasion 1. Psychological Principles of Online Influence 2. Online Credibility Assessment 3. The Psychology of Trust Section II: Principles of Online Deception 4. The Psychology of Deception 5. "Oh what a tangled Web 2.0 we weave": Typologies of Online Deception 6. Nation-State Cyber Deception Practices 7. Synthetic Media Use by Cyber Crime Threat Actors Section III: Understanding the Synthetic Media Assessment Framework 8. The Synthetic Media Kill Chain 9. Overview of the Synthetic Media Assessment Framework 10. Control 11. Medium 12. Interactivity 13. Familiarity 14. Intended Target 15. Evocation Section IV: Applying the Synthetic Media Assessment Framework 16. Putting it All Together-Assessing Attack Scenarios 17. SMAF Best Practices
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG i.I. Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309