Successful cybersecurity professionals : how to change your behavior to protect your organization / Dr. Steven Brown, CISSP, CCSBP.
Material type: TextSeries: Business law and corporate risk management collectionPublisher: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, [(c)2020.]Edition: First editionDescription: 1 online resource (268 pages) : illustrations (some color)Content type:- text
- computer
- online resource
- 9781952538438
- Computer security
- Computer fraud
- Social engineering
- Self-protective behavior
- Decision making
- Human behavior
- Cognition
- Neurosciences
- Cybersecurity
- Behavior
- Context of association
- Pavlov's dogs
- Sextortion
- Personality traits
- Deepfakes
- Theory of cybersecurity
- Perceptions
- Hackers
- Cognitive economy
- Biases
- Heuristics
- Cybersecurity paradox
- Memory
- Cognitive dissonance
- Chain of events
- Intelligence
- Cyber maturity
- Security intelligence
- Brainjacking
- Cybersecurity education
- QA76.9.A25
- COPYRIGHT NOT covered - Click this link to request copyright permission: https://lib.ciu.edu/copyright-request-form
Item type | Current library | Collection | Call number | URL | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library ONLINE | QA76.9.A25 (Browse shelf(Opens below)) | Link to resource | Available | BEP9781952538438 | |||
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) | G. Allen Fleece Library | Non-fiction | QA76.9.A25 (Browse shelf(Opens below)) | Link to resource | Available | 9781952538438 |
Chapter 1. Cybersecurity and behavior -- Chapter 2. Behaviorism -- Chapter 3. Traits -- Chapter 4. Perceptions -- Chapter 5. So, how do we even think? -- Chapter 6. Memory -- Chapter 7. How are we motivated -- Chapter 8. Social influence -- Chapter 9. Stereotypes -- Chapter 10. Fight or flight -- Chapter 11. Language -- Chapter 12. Differences in opinion -- Chapter 13. Cyber maturity and ethics -- Chapter 14. Theory of cybersecurity -- Chapter 15. Future.
Access restricted to authorized users and institutions.
This book provides a unique perspective into the mindset of psychology and cybersecurity. It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals' behavior, but our behavior as well, and to realize that some of behaviors could lead us in making bad cybersecurity decisions. Dr. Brown also presents even a possible theory of cybersecurity. Key areas include: Behaviorism, Learning models, Cybersecurity vulnerabilities, Stereotypes, Cybersecurity traits, Conditioned response, Social engineering, Deep fakes.By using models and literature rooted in psychology and comparing those to cybersecurity attacks, this book will help those who make crucial cybersecurity decisions to protect their organization, even better decisions.
COPYRIGHT NOT covered - Click this link to request copyright permission:
https://lib.ciu.edu/copyright-request-form
Mode of access: World Wide Web.
System requirements: Adobe Acrobat reader.
Description based on PDF viewed 09/22/2020.
There are no comments on this title.