Buch, Englisch, 200 Seiten, Format (B × H): 153 mm x 216 mm, Gewicht: 391 g
Buch, Englisch, 200 Seiten, Format (B × H): 153 mm x 216 mm, Gewicht: 391 g
Reihe: Palgrave Studies in Cyberpsychology
ISBN: 978-3-031-85993-9
Verlag: Springer Nature Switzerland
This book explores the intersection of cybersecurity and psychology, examining the motivations and behaviours of cybersecurity professionals, employees, hackers, and cybercriminals. It delves into the psychology of both cyber attackers and defenders, offering insights into their motivations. The book will explore key themes which include cognitive bias, human factors in decision-making, and the impact of threat vectors. The book features numerous case studies and interviews with hackers and whistleblowers, providing a comprehensive understanding of cybersecurity from multiple perspectives. Ideal for tech enthusiasts and psychology lovers, this book highlights the critical connection between human behaviour and digital security.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Sozialwissenschaften Psychologie Psychologische Disziplinen Kriminalpsychologie, Forensische Psychologie
- Sozialwissenschaften Medien- und Kommunikationswissenschaften Medienwissenschaften
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
- Sozialwissenschaften Psychologie Psychologie / Allgemeines & Theorie Psychologie: Allgemeines
- Rechtswissenschaften Strafrecht Kriminologie, Strafverfolgung
Weitere Infos & Material
Foreword.- Chapter 1: Understanding Cybercrime and Criminology.- Chapter 2: Case Studies: Cybercrime.- Chapter 3: Psychology and its impact on Cybersecurity.- Chapter 4: Cognitive Bias.- Chapter 5: Behavioural Economics and Behavioural Science.- Chapter 6: Neuroscience, Sociology and Anthropology.- Chapter 7: Social Engineering: Exploiting Human Psychology.- Chapter 8: Case Studies: Social Engineering Tactics.- Chapter 9: Interview With A Cyber Attack Victim.- Chapter 10: Interview With A CISO.- Chapter 11: Interview With A Convicted Hacker.- Chapter 12: Interview With A People Hacker (Social Engineering).- Chapter 13: Interview With A Cybercriminal.- Chapter 14: Interview With A Cyber Fraudster.- Chapter 15: State-Sponsored Cyber Attacks.- Chapter 16: Case Studies: State-Sponsored Cyber Attacks.- Chapter 17: Conclusion and the Future of Psychology in Cybersecurity.- Index.