Successful cybersecurity professionals : how to change your behavior to protect your organization /

Brown, Steven,

Successful cybersecurity professionals : how to change your behavior to protect your organization / Dr. Steven Brown, CISSP, CCSBP. - First edition. - 1 online resource (268 pages) : illustrations (some color) - Business law and corporate risk management collection, 2333-6730 . - Business law and corporate risk management collection. .



Chapter 1. Cybersecurity and behavior -- Chapter 2. Behaviorism -- Chapter 3. Traits -- Chapter 4. Perceptions -- Chapter 5. So, how do we even think? -- Chapter 6. Memory -- Chapter 7. How are we motivated -- Chapter 8. Social influence -- Chapter 9. Stereotypes -- Chapter 10. Fight or flight -- Chapter 11. Language -- Chapter 12. Differences in opinion -- Chapter 13. Cyber maturity and ethics -- Chapter 14. Theory of cybersecurity -- Chapter 15. Future.

Access restricted to authorized users and institutions.

This book provides a unique perspective into the mindset of psychology and cybersecurity. It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals' behavior, but our behavior as well, and to realize that some of behaviors could lead us in making bad cybersecurity decisions. Dr. Brown also presents even a possible theory of cybersecurity. Key areas include: Behaviorism, Learning models, Cybersecurity vulnerabilities, Stereotypes, Cybersecurity traits, Conditioned response, Social engineering, Deep fakes.By using models and literature rooted in psychology and comparing those to cybersecurity attacks, this book will help those who make crucial cybersecurity decisions to protect their organization, even better decisions.




Mode of access: World Wide Web.
System requirements: Adobe Acrobat reader.

9781952538438


Computer security.
Computer fraud.
Social engineering.
Self-protective behavior.
Decision making.
Human behavior.
Cognition.
Neurosciences.

Cybersecurity. Behavior. Context of association. Pavlov's dogs. Sextortion. Personality traits. Deepfakes. Theory of cybersecurity. Perceptions. Hackers. Cognitive economy. Biases. Heuristics. Cybersecurity paradox. Memory. Cognitive dissonance. Chain of events. Intelligence. Cyber maturity. Security intelligence. Brainjacking. Cybersecurity education.


[genre]
Electronic books.

QA76.9.A25