Behavioral Cybersecurity : Applications of Personality Psychology and Computer Science

個数:

Behavioral Cybersecurity : Applications of Personality Psychology and Computer Science

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • 提携先の海外書籍取次会社に在庫がございます。通常約2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 290 p.
  • 言語 ENG
  • 商品コード 9781032924663
  • DDC分類 005.8019

Full Description

Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation.

Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in cybersecurity over many years, has been done by those with computer science, electrical engineering, and mathematics backgrounds.

However, many cybersecurity researchers have come to realize that to gain a full understanding of how to protect a cyber environment requires not only the knowledge of those researchers in computer science, engineering and mathematics, but those who have a deeper understanding of human behavior: researchers with expertise in the various branches of behavioral science, such as psychology, behavioral economics, and other aspects of brain science.

The authors, one a computer scientist and the other a psychologist, have attempted over the past several years to understand the contributions that each approach to cybersecurity problems can benefit from this integrated approach that we have tended to call "behavioral cybersecurity."

The authors believe that the research and curriculum approaches developed from this integrated approach provide a first book with this approach to cybersecurity. This book incorporates traditional technical computational and analytic approaches to cybersecurity, and also psychological and human factors approaches, as well.

Features

Discusses profiling approaches and risk management
Includes case studies of major cybersecurity events and "Fake News"
Presents analyses of password attacks and defenses
Addresses game theory, behavioral economics and their application to cybersecurity
Supplies research into attacker/defender personality and motivation traits
Techniques for measuring cyber attacks/defenses using crypto and stego

Contents

Chapter 1. What is Cybersecurity? Chapter 2. Essentials of Behavioral Science. Chapter 3. Psychology and Cybersecurity. Chapter 4. Recent Events. Chapter 5. Profiling. Chapter 6. Hack Lab 1: Social Engineering Practice: Who Am I? Chapter 7. Access Control. Chapter 8. The First Step:Authorization. Chapter 9. Hack Lab 2: Assigned Passwords in the Clear. Chapter 10. Origins of Cryptography. Chapter 11. Hack Lab 3: Sweeny Method. Chapter 12. Hacker Personalities: Case Studies. Chapter 13. Game Theory. Chapter 14. Ethical Hacking. Chapter 15. The Psychology of Gender. Chapter 16. Turing Tests. Chapter 17. Personality Tests, Methods, and Assessments. Chapter 18. Modular Arithmetic and Other Computational Methods. Chapter 19. Modern Cryptography. Chapter 20. Steganography. Chapter 21. Using Cryptography and Steganography in Tandem or in Sequence.Chapter 22. A Metric to Assess Cyberattacks. Chapter 23. Behavioral Economics. Chapter 24. Fake News. Chapter 25. Potpourri. Chapter 26. Hack Lab 4: Contradictions in Password Meters. Chapter 27. Conclusion.

最近チェックした商品