Amazon cover image
Image from Amazon.com

Successful cybersecurity professionals : how to change your behavior to protect your organization / Dr. Steven Brown, CISSP, CCSBP.

By: Material type: TextTextSeries: Business law and corporate risk management collectionPublisher: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, [(c)2020.]Edition: First editionDescription: 1 online resource (268 pages) : illustrations (some color)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781952538438
Subject(s): Genre/Form: Additional physical formats: Print version:: No titleLOC classification:
  • QA76.9.A25
Online resources: Available additional physical forms:
Contents:
Chapter 1. Cybersecurity and behavior -- Chapter 2. Behaviorism -- Chapter 3. Traits -- Chapter 4. Perceptions -- Chapter 5. So, how do we even think? -- Chapter 6. Memory -- Chapter 7. How are we motivated -- Chapter 8. Social influence -- Chapter 9. Stereotypes -- Chapter 10. Fight or flight -- Chapter 11. Language -- Chapter 12. Differences in opinion -- Chapter 13. Cyber maturity and ethics -- Chapter 14. Theory of cybersecurity -- Chapter 15. Future.
Abstract: This book provides a unique perspective into the mindset of psychology and cybersecurity. It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals' behavior, but our behavior as well, and to realize that some of behaviors could lead us in making bad cybersecurity decisions. Dr. Brown also presents even a possible theory of cybersecurity. Key areas include: Behaviorism, Learning models, Cybersecurity vulnerabilities, Stereotypes, Cybersecurity traits, Conditioned response, Social engineering, Deep fakes.By using models and literature rooted in psychology and comparing those to cybersecurity attacks, this book will help those who make crucial cybersecurity decisions to protect their organization, even better decisions.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number URL Status Date due Barcode
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) G. Allen Fleece Library ONLINE QA76.9.A25 (Browse shelf(Opens below)) Link to resource Available BEP9781952538438
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) G. Allen Fleece Library Non-fiction QA76.9.A25 (Browse shelf(Opens below)) Link to resource Available 9781952538438

Chapter 1. Cybersecurity and behavior -- Chapter 2. Behaviorism -- Chapter 3. Traits -- Chapter 4. Perceptions -- Chapter 5. So, how do we even think? -- Chapter 6. Memory -- Chapter 7. How are we motivated -- Chapter 8. Social influence -- Chapter 9. Stereotypes -- Chapter 10. Fight or flight -- Chapter 11. Language -- Chapter 12. Differences in opinion -- Chapter 13. Cyber maturity and ethics -- Chapter 14. Theory of cybersecurity -- Chapter 15. Future.

Access restricted to authorized users and institutions.

This book provides a unique perspective into the mindset of psychology and cybersecurity. It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals' behavior, but our behavior as well, and to realize that some of behaviors could lead us in making bad cybersecurity decisions. Dr. Brown also presents even a possible theory of cybersecurity. Key areas include: Behaviorism, Learning models, Cybersecurity vulnerabilities, Stereotypes, Cybersecurity traits, Conditioned response, Social engineering, Deep fakes.By using models and literature rooted in psychology and comparing those to cybersecurity attacks, this book will help those who make crucial cybersecurity decisions to protect their organization, even better decisions.

COPYRIGHT NOT covered - Click this link to request copyright permission:

https://lib.ciu.edu/copyright-request-form

Mode of access: World Wide Web.

System requirements: Adobe Acrobat reader.

Description based on PDF viewed 09/22/2020.

There are no comments on this title.

to post a comment.