ABSTRACT

Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation.

Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in cybersecurity over many years, has been done by those with computer science, electrical engineering, and mathematics backgrounds.

However, many cybersecurity researchers have come to realize that to gain a full understanding of how to protect a cyber environment requires not only the knowledge of those researchers in computer science, engineering and mathematics, but those who have a deeper understanding of human behavior: researchers with expertise in the various branches of behavioral science, such as psychology, behavioral economics, and other aspects of brain science.

The authors, one a computer scientist and the other a psychologist, have attempted over the past several years to understand the contributions that each approach to cybersecurity problems can benefit from this integrated approach that we have tended to call "behavioral cybersecurity."

The authors believe that the research and curriculum approaches developed from this integrated approach provide a first book with this approach to cybersecurity. This book incorporates traditional technical computational and analytic approaches to cybersecurity, and also psychological and human factors approaches, as well.

Features

  • Discusses profiling approaches and risk management
  • Includes case studies of major cybersecurity events and "Fake News"
  • Presents analyses of password attacks and defenses
  • Addresses game theory, behavioral economics and their application to cybersecurity
  • Supplies research into attacker/defender personality and motivation traits
  • Techniques for measuring cyber attacks/defenses using crypto and stego

chapter 1|7 pages

What Is Cybersecurity?

chapter 2|13 pages

Essentials of Behavioral Science

chapter 3|3 pages

Psychology and Cybersecurity

chapter 4|16 pages

Recent Events

chapter 5|8 pages

Profiling

chapter 6|3 pages

Hack Lab 1

Social Engineering Practice: Who Am I?

chapter 7|5 pages

Access Control

chapter 8|12 pages

The First Step

Authorization

chapter 9|1 pages

Hack Lab 2

Assigned Passwords in the Clear

chapter 10|9 pages

Origins of Cryptography

chapter 11|3 pages

Hack Lab 3

Sweeney Method

chapter 12|5 pages

Hacker Personalities

Case Studies

chapter 13|16 pages

Game Theory

chapter 14|4 pages

Ethical Hacking

chapter 15|6 pages

The Psychology of Gender

chapter 16|15 pages

Turing Tests

chapter 17|11 pages

Personality Tests, Methods, and Assessment

chapter 19|22 pages

Modern Cryptography

chapter 20|10 pages

Steganography

chapter 22|15 pages

A Metric to Assess Cyberattacks

chapter 23|13 pages

Behavioral Economics

chapter 24|10 pages

Fake News

chapter 25|18 pages

Potpourri

chapter 26|2 pages

Hack Lab 4

Contradictions in Password Meters

chapter 27|3 pages

Conclusion