ABSTRACT

This book discusses the role of human personality in the study of behavioral cybersecurity for non-specialists.

Since the introduction and proliferation of the Internet, cybersecurity maintenance issues have grown exponentially. The importance of behavioral cybersecurity has recently been amplified by current events, such as misinformation and cyber-attacks related to election interference in the United States and internationally. More recently, similar issues have occurred in the context of the COVID-19 pandemic.

The book presents profiling approaches, offers case studies of major cybersecurity events and provides analysis of password attacks and defenses. Discussing psychological methods used to assess behavioral cybersecurity, alongside risk management, the book also describes game theory and its applications, explores the role of cryptology and steganography in attack and defense scenarios and brings the reader up to date with current research into motivation and attacker/defender personality traits.

Written for practitioners in the field, alongside nonspecialists with little prior knowledge of cybersecurity, computer science, or psychology, the book will be of interest to all who need to protect their computing environment from cyber-attacks. The book also provides source materials for courses in this growing area of behavioral cybersecurity.

 

chapter 1|11 pages

Recent Events

chapter 2|4 pages

Behavioral Cybersecurity

chapter 4|7 pages

Hacker Case Studies

Personality Analysis and Ethical Hacking

chapter 5|10 pages

Profiling

chapter 6|7 pages

Access Control

chapter 7|7 pages

The First Step

Authorization

chapter 8|10 pages

Origins of Cryptography

chapter 9|11 pages

Game Theory

chapter 10|6 pages

The Psychology of Gender

chapter 11|11 pages

Turing Tests

chapter 13|17 pages

Modern Cryptography

chapter 14|9 pages

Steganography and Relation to Crypto

chapter 15|6 pages

A Metric to Assess Cyberattacks

chapter 16|9 pages

Behavioral Economics

chapter 17|10 pages

Fake News

chapter 18|7 pages

Exercises: Hack Labs

chapter 19|5 pages

Conclusions