ABSTRACT

It may be puzzling to the reader as to why a section of a work on behavioral cybersecurity would be devoted to “fake news.” If one considers the realm of cybersecurity to be concerned with potential intrusions into a computing or cyberenvironment designed to provide gain for the intruder and therefore a deficit to the defender, it should be clear that the well-publicized events in the public realm over the past few years are intimately related to the strategies, methods, and payoffs for potential attackers and defenders in any cyberenvironment.