ABSTRACT

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018

Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cybersecurity focus on, both from a human–computer interaction point of view, and that of human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices, and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.

Features

  • Covers all areas of human–computer interaction and human factors in cybersecurity
  • Includes information for IT specialists, who often desire more knowledge about the human side of cybersecurity
  • Provides a reference for other disciplines such as psychology, behavioral science, software engineering, and security management
  • Offers a source of information for cybersecurity practitioners in government agencies and private enterprises
  • Presents new areas such as smart networking and devices

section section one|2 pages

Authentication and access management

chapter chapter one|26 pages

User authentication

Alternatives, effectiveness, and usability

chapter chapter two|20 pages

Biometrics

chapter chapter three|26 pages

Machine identities

Foundational to cybersecurity

section section two|2 pages

Trust and privacy

chapter chapter five|20 pages

Trust

section section three|2 pages

Threats

chapter chapter six|20 pages

Insider threat

The forgotten, yet formidable foe

chapter chapter seven|18 pages

Social engineering

chapter chapter eight|18 pages

Money laundering and black markets

section section four|2 pages

Smart networks and devices

section section five|2 pages

Governance

chapter chapter fourteen|22 pages

US cybersecurity and privacy regulations

chapter chapter sixteen|16 pages

Privacy and security in the IoT—Legal issues

chapter chapter seventeen|8 pages

US government and law enforcement

chapter chapter eighteen|22 pages

Enterprise solutions and technologies

section section six|2 pages

Perspective

chapter chapter twenty|14 pages

Movies and media