Human Factors Analysis of 23 Cyberattacks (The Human Element in Smart and Intelligent Systems)

個数:

Human Factors Analysis of 23 Cyberattacks (The Human Element in Smart and Intelligent Systems)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 182 p.
  • 言語 ENG
  • 商品コード 9781032608624
  • DDC分類 005.8

Full Description

As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.4 billion a day. While technical issue analyses are fundamental in understanding how to improve system security, analyzing the roles of human agents is crucial. Human Factors Analysis of 23 Cyberattacks addresses, through examples, the human factors behind cybersecurity attacks.

Focusing on human factors in individual attack cases, this book aims to understand the primary behaviors that might result in the success of attacks. Each chapter looks at a series of cases describing the nature of the attack through the reports and reviews of the experts, followed by the role and human factors analysis. It investigates where a human agent's intervention was a factor in starting, discovering, monitoring, or suffering from the attacks. Written in an easy-to-understand way and free from technical jargon, the reader will develop a thorough understanding of why cyberattacks occur and how they can be mitigated by comparison to the practical examples provided.

This title will appeal to students and practitioners in the fields of ergonomics, human factors, cybersecurity, computer engineering, industrial engineering, and computer science.

Contents

Contents

Acknowledgments

About the author

Introduction

Part 1: Human and Motivation

Chapter 1: Human Agents

Chapter 2: Cyberattackers versus Hackers

Chapter 3: Cyberattackers' Motivations

Part 2: Cyberwar and Cyberespionage

Chapter 4: SolarWinds

Chapter 5: Pegasus Spyware

Chapter 6: Google Chrome Extension Spyware

Chapter 7: Marriott International

Part 3: Sabotage

Chapter 8: Stuxnet

Chapter 9: Colonial Pipelines

Chapter 10: Ukrainian Power Grid Hack

Part 4: Fake News Shaping People's Opinions

Chapter 11: Facebook-Cambridge Analytica

Chapter 12: Instagram

Part 5: Data Privacy

Chapter 13: Baidu Android Apps

Chapter 14: Zoom

Chapter 15: LinkedIn

Chapter 16: Spotify

Part 6: Trust

Chapter 17: Uber Technologies

Chapter 18: Equifax

Chapter 19: Office of Personnel Management Data

Part 7: Financial Cybercrimes

Chapter 20: Emulators-Mobile Banking Frauds

Chapter 21: Google Store

Chapter 22: British Airways

Chapter 23: Target Data Breach

Chapter 24: TJ Maxx's Data Breach

Part 8: Black Mail-Hacktivism

Chapter 25: Ashley Madison

Chapter 26: Dark Web Hosting Provider Hack

Part 9: Conclusion

Chapter 27: Factors Shaping Vulnerable Behaviors

Index

最近チェックした商品