Beschreibung:
Cybersecurity has had far too little study and research. Research that has taken place, was done by those with computer science, electrical engineering, and mathematics backgrounds. This book incorporates traditional technical computational and analytic approaches to cybersecurity, and also psychological and human factors approaches.
Chapter 1. What is Cybersecurity? Chapter 2. Essentials of Behavioral Science. Chapter 3. Psychology and Cybersecurity. Chapter 4. Recent Events. Chapter 5. Profiling. Chapter 6. Hack Lab 1: Social Engineering Practice: Who Am I? Chapter 7. Access Control. Chapter 8. The First Step:Authorization. Chapter 9. Hack Lab 2: Assigned Passwords in the Clear. Chapter 10. Origins of Cryptography. Chapter 11. Hack Lab 3: Sweeny Method. Chapter 12. Hacker Personalities: Case Studies. Chapter 13. Game Theory. Chapter 14. Ethical Hacking. Chapter 15. The Psychology of Gender. Chapter 16. Turing Tests. Chapter 17. Personality Tests, Methods, and Assessments. Chapter 18. Modular Arithmetic and Other Computational Methods. Chapter 19. Modern Cryptography. Chapter 20. Steganography. Chapter 21. Using Cryptography and Steganography in Tandem or in Sequence.Chapter 22. A Metric to Assess Cyberattacks. Chapter 23. Behavioral Economics. Chapter 24. Fake News. Chapter 25. Potpourri. Chapter 26. Hack Lab 4: Contradictions in Password Meters. Chapter 27. Conclusion.