Human dimensions of cybersecurity:
Case studies -- Networks and norms -- Consumer choice -- Risk perspectives in cybersecurity -- Government policy and statecraft in cyber security -- Technical perspectives -- The future.
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
[2020]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Zusammenfassung: | Case studies -- Networks and norms -- Consumer choice -- Risk perspectives in cybersecurity -- Government policy and statecraft in cyber security -- Technical perspectives -- The future. "The book identifies the technological features that give rise to security issues. It describes the structure of the Internet and how it is compromised by malware, and examines some of the more common security issues. It then looks at aspects of human persuasion and consumer choice, and how these affect cyber security. It argues that social networks and the related norms play a key role as does government policy, as each impact on individual behavior of computer use. The book identifies the most important human and social factors that affect cybersecurity. It illustrates each factor using case studies, and examines possible solutions from both technical and human acceptability viewpoints"-- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 199 Seiten Illustrationen |
ISBN: | 9781138590403 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV046617371 | ||
003 | DE-604 | ||
005 | 20200612 | ||
007 | t | ||
008 | 200306s2020 a||| |||| 00||| eng d | ||
020 | |a 9781138590403 |c hardback |9 978-1-138-59040-3 | ||
035 | |a (OCoLC)1164660017 | ||
035 | |a (DE-599)KXP1679406043 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
050 | 0 | |a QA76.9.A25 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Bossomaier, Terry R. J. |d 1951- |e Verfasser |0 (DE-588)156652471 |4 aut | |
245 | 1 | 0 | |a Human dimensions of cybersecurity |c Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c [2020] | |
300 | |a 199 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a Case studies -- Networks and norms -- Consumer choice -- Risk perspectives in cybersecurity -- Government policy and statecraft in cyber security -- Technical perspectives -- The future. | |
520 | 3 | |a "The book identifies the technological features that give rise to security issues. It describes the structure of the Internet and how it is compromised by malware, and examines some of the more common security issues. It then looks at aspects of human persuasion and consumer choice, and how these affect cyber security. It argues that social networks and the related norms play a key role as does government policy, as each impact on individual behavior of computer use. The book identifies the most important human and social factors that affect cybersecurity. It illustrates each factor using case studies, and examines possible solutions from both technical and human acceptability viewpoints"-- | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer security / Case studies | |
653 | 0 | |a Computer security / Social aspects | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Data protection | |
653 | 0 | |a Computer security / Government policy | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a D'Alessandro, Steven |e Verfasser |0 (DE-588)1036794504 |4 aut | |
700 | 1 | |a Bradbury, Roger |d 1950- |e Verfasser |0 (DE-588)1047955946 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-0-429-49098-9 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032029152&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032029152&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032029152 |
Datensatz im Suchindex
_version_ | 1812535792841523200 |
---|---|
adam_text |
Contents Foreword. xi Preface. xiii Glossary. xv List of Cyber Nuggets. xxiii Authors.xxvii 1 Introduction. 1 1.1 1.2 That Could Have Been Me . A Brief History of Cybersecurity. 1.2.1 The German Celebrity Hack. 1.2.2 The Australian Parliamentary Hack. The Big Picture. Overview. 1 3 5 6 6 7 Case Studies. 9 1.3 1.4 2 2.1 2.2 2.3 Denial of Service. 2.1.1 Motivation and Frequency of DoSAttacks. 2.1.2 Preventing and Countering a DoS Attack.
Ransomware . 2.2.1 WannaCry. 2.2.2 Petya and NotPetya. Check Before You Send: Business Email Compromise (ВЕС) Attacks . 9 12 13 18 18 20 22
vi ■ Contents 2.3.1 Blockchain Land Titles. When Too Much Concern over Cybersecurity Is Too Much: Opting Out of My Health Records in Australia. Corporate Data Breaches . 2.5.1 Supply Chain Attacks. 2.5.2 Illustrative Floods. 2.5.2.1 Guard Your CV. 2.5.2.2 The Equifax Hack. 2.5.2.3 Don’t Organize anAffair Online. 2.5.2.4 Flood Prevention. The Nation State and CyberSecurity: Firewalls, Friends, and Enemies. 2.6.1 The Great Firewall, Golden Shield, and the Great Cannon of China. 2.6.2 Social Credits Anyone?. Encryption: The Government Is YourFriend but Not Always Your Best Friend . 2.7.1 Can the Law of the Land Defeat the Law of Mathematics?. 2.7.2 Who Watches the Watchers and the Impact on the Economy. Cambridge Analytica. Trampling
over Transport Layer Security. Beware the Insider . 24 Networks and Norms. 41 3.1 3.2 3.3 42 42 44 44 44 45 47 47 47 47 48 49 50 50 51 51 2.4 2.5 2.6 2.7 է֊Օ Ю 2.8 .9 . 10 3 Introduction. Mindsets . Social Networks . 3.3.1 Some Elementary Graph Theory. 3.3.1.1 Small Worlds . 3.3.1.2 Scale-Free Networks. 3.3.1.3 Network Motifs. 3.3.2 Some Measures on Networks. 3.3.2.1 Clustering and Assortativeness . 3.3.2.2 Betweenness Centrality. 3.3.2.3 Modularity. 3.3.3 Network Discovery. 3.3.4 Using and Transforming Networks. 3.3.5 Friends of Friends. 3.3.6 Secure Networks. 3.4 Social Norms. 24 26 26 27 27
27 28 28 29 29 30 31 31 33 33 36 37
Contents ■ vii 3.4.1 3.4.2 3.4.3 4 Emergent versus Agreed Norms . Trends and Social Media Marketing. Some Adverse Social Norms in Cybersecurity. 3.4.3.1 Terms and Conditions. 3.4.3.2 Data Security . 3.4.3.3 Cyber Hygiene. 3.4.3.4 Distributed Trust. 3.4.3.5 Slack Email. 3.4.3.6 Good and Bad Advice. 3.4.3.7 The Ups and Downs ofVirtual Private Networks . 3.4.3.8 Data Fragility. 3.5 Modularity in Cybersecurity . 3.5.1 Concluding Comments. 57 57 58 59 Consumer Choice. 61 4.1 4.2 4.3 4.4 4.5 62 63 65 67 Introduction. Cybersecurity as Predicted by Demographics. Cybersecurity and the Theory of Reasoned Action. Motivation To Avoid Harm (MTAH) and Cybersecurity . The Technology Acceptance Model (TAM) and the Adoption of New Technologies in Cybersecurity . Social and Situational Factors in
Cybersecurity. 4.6.1 Trust and Risk in the Online Environment. 4.6.2 Cybersecurity as Predicted by Personality. 4.6.3 Stress and Time Pressures on Users. 4.6.4 Information Overload. Improving the Security Behavior of Users . 4.7.1 A Need for a Systematic Approach to Cybersecurity . . 70 72 72 73 73 74 74 75 Risk Perspectives in Cybersecurity. 77 5.1 5.2 5.3 77 78 80 80 83 84 86 86 87 90 4.6 4.7 5 52 53 53 53 54 55 56 56 56 Introduction. Costs and Occurrences of Cyberattacks as of 2018. Types of Threats and Their Associated Risks. 5.3.1 Threats by Source of Attack . 5.3.2 Threats by Type of Attack . 5.3.2.1 DDoS Attacks. 5.3.2.2 Middleware Attacks. 5.3.2.3 Spoofing Attacks. 5.3.2.4 Social Engineering Attacks. 5.3.2.5 Advanced Persistent Threat (APT).
viii 6 ■ Government Policy and Statecraft in Cybersecurity. 6.1 6.2 6.3 6.4 6.5 7 Contents 93 Legal Frameworks and Their Effects onReducing Risk . 94 Accreditation and National Frameworks to Reduce Cyber-Risks. 98 6.2.1 CBEST.101 6.2.2 Framework for Improving Critical Infrastructure Cybersecurity or the National Institute of Standards and Technology (NIST) Framework.103 6.2.3 The Australian Signals Directorate Essential Eight . 108 Other Approaches to Corporate Governance to Reduce Cyber-Risk . Ill Cyber Warfare .112 Conclusion and Recommendations.112 Technical Perspectives.115 7.1 7.2 Public-Private Key (PPK) Cryptography. 116 Some Preliminary Concepts . 116 7.2.1 Asymmetric Cyphers. 117 7.2.2 Diffie-Hellman, with Apologies to Mary Poppins . 118 7.2.2.1 Numerical Example. 119 7.2.3 The RSA Algorithm . 119 7.2.3.1 The Really
Hairy Part. 121 7.2.4 Elliptic Curve Cryptography (ECC). 122 7.3 Symmetric Encryption .123 7.3.1 Advanced Encryption Standard (AES).124 7.3.2 Stream Cyphers.124 7.4 Keys Galore.124 7.4.1 Communication Keys. 125 7.4.2 Good and (Very) Bad Signatures. 126 7.4.3 Antiencryption Legislation.127 7.5 Passwords. 122 7.5.1 The Password File . 128 7.5.2 Good Passwords . 129 7.5.3 Password Managers/Safes . 130 7.5.3.1 Using the Browser. 131 7.5.3.2 Rainbow Tables.132 7.5.3.3 Key Exchange Precomputation .133 7.5.3.4 Storing Passwords Locally. 134 7.5.3.5 Online Password Safes.134 7.5.4 Two-Factor Identification. 135 1 ՂՀ 7.6 Biometrics
.
Contents 7.7 7.8 7.9 7.10 7.11 7.12 7.13 7.14 7.15 7.16 8 ■ ix Basic Ideas of Computer Networks. 136 7.7.1 Network Layers. 137 7.7.1.1 Protocol Stacks. A Simple Analogy. 137 7.7.1.2 Abstraction . 138 7.7.1.3 TCP: The Transport Control Protocol . 139 7.7.1.4 UDP: The User Datagram Protocol. 139 7.7.1.5 The Application Layer.139 7.7.2 Addresses of All Sorts.139 7.7.2.1 IP Addresses for the Internet.139 7.7.2.2 Ethernet. 140 7.7.2.3 WiFi.140 7.7.3 Domain Name Server (DNS). 140 Increasing Internet Security.142 7.8.1 IPSec: Going a Bit Deeper. 143 7.8.2 Ports, Firewalls, and Filters. 144 7.8.2.1 Detecting Open Ports.144 Virtual Private Networks . 145 7.9.1 Virtual Private Networks in the Home . 145 7.9.2 Choosing a VPN. 146 7.9.3 Value of a Virtual Private
Network.146 7.9.4 Avoiding the Need for VPNs. 147 Onions and the Dark Web. 147 7.10.1 The Dark Web and Onion Routing.147 Local Threats and Malware. 149 Certificates and Trust. 150 7.12.1 Public Key Infrastructure (PKI). 151 Email.152 7.13.1 Spoofing.154 7.13.2 Email Security. 154 7.13.2.1 Sender Policy Framework Results.156 Blockchains.156 7.14.1 The Hard Fork. 158 EU Data Protection Rules. 159 Quantum Computing . 160 7.16.1 Mr Hyde: Superposition and Parallel Computation . 160 7.16.2 Dr Jekyll: Entanglement.160 The Future. 163 8.1 8.2 8.3 Keeping Nasties Out
. 163 8.1.1 Formal Validation. 164 Use of Encryption. 165 Encouraging Good Cyber Practice . 166
x ■ Contents 8.4 8.5 8.6 8.7 8.8 8.3.1 The Scourge and Salvation of Email.166 Teaching People Safe Practices.167 8.4.1 Gamification. 167 8.4.1.1 Marketing Campaigns for Cybersecurity . . . 167 Changing Criminal Models and the Arms Race with the Authorities . 169 8.5.1 Do People Learn?. 170 8.5.2 New Legal Agendas. 171 Hyperstorage and Machine Learning and Privacy. 172 8.6.1 Protecting the Vulnerablefrom Themselves .172 The Mink and the Porcupine .173 Take It Away, Renatus .173 References Index .175 189
Human Dimensions of Cybersecurity From the Foreword: "In Human Dimensions of Cyber Security. Terry Bossomaier. Steven D'Alessandro, and Roger Bradbury have produced a book that . shows how it is indeed possible to achieve what we all need: a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity — what it is. why it matters, and how to do it." — Professor Paul Cornish. Visiting Professor. LSE IDEAS. London School of Economics Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see mans hazards in cybersecunty. It emphasizes the need for a multidisciplinary approach, as cybersecunty has become a fundamental issue of risk management lor individuals, at work, and with government and nation states. This book explains tlie issues of cybersecunty with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to loam the dos and cion ՛էտ of cybersecunty. The book also Identifies the most important human and social factors that afteel cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints. |
adam_txt |
Contents Foreword. xi Preface. xiii Glossary. xv List of Cyber Nuggets. xxiii Authors.xxvii 1 Introduction. 1 1.1 1.2 That Could Have Been Me . A Brief History of Cybersecurity. 1.2.1 The German Celebrity Hack. 1.2.2 The Australian Parliamentary Hack. The Big Picture. Overview. 1 3 5 6 6 7 Case Studies. 9 1.3 1.4 2 2.1 2.2 2.3 Denial of Service. 2.1.1 Motivation and Frequency of DoSAttacks. 2.1.2 Preventing and Countering a DoS Attack.
Ransomware . 2.2.1 WannaCry. 2.2.2 Petya and NotPetya. Check Before You Send: Business Email Compromise (ВЕС) Attacks . 9 12 13 18 18 20 22
vi ■ Contents 2.3.1 Blockchain Land Titles. When Too Much Concern over Cybersecurity Is Too Much: Opting Out of My Health Records in Australia. Corporate Data Breaches . 2.5.1 Supply Chain Attacks. 2.5.2 Illustrative Floods. 2.5.2.1 Guard Your CV. 2.5.2.2 The Equifax Hack. 2.5.2.3 Don’t Organize anAffair Online. 2.5.2.4 Flood Prevention. The Nation State and CyberSecurity: Firewalls, Friends, and Enemies. 2.6.1 The Great Firewall, Golden Shield, and the Great Cannon of China. 2.6.2 Social Credits Anyone?. Encryption: The Government Is YourFriend but Not Always Your Best Friend . 2.7.1 Can the Law of the Land Defeat the Law of Mathematics?. 2.7.2 Who Watches the Watchers and the Impact on the Economy. Cambridge Analytica. Trampling
over Transport Layer Security. Beware the Insider . 24 Networks and Norms. 41 3.1 3.2 3.3 42 42 44 44 44 45 47 47 47 47 48 49 50 50 51 51 2.4 2.5 2.6 2.7 է֊Օ Ю 2.8 .9 . 10 3 Introduction. Mindsets . Social Networks . 3.3.1 Some Elementary Graph Theory. 3.3.1.1 Small Worlds . 3.3.1.2 Scale-Free Networks. 3.3.1.3 Network Motifs. 3.3.2 Some Measures on Networks. 3.3.2.1 Clustering and Assortativeness . 3.3.2.2 Betweenness Centrality. 3.3.2.3 Modularity. 3.3.3 Network Discovery. 3.3.4 Using and Transforming Networks. 3.3.5 Friends of Friends. 3.3.6 Secure Networks. 3.4 Social Norms. 24 26 26 27 27
27 28 28 29 29 30 31 31 33 33 36 37
Contents ■ vii 3.4.1 3.4.2 3.4.3 4 Emergent versus Agreed Norms . Trends and Social Media Marketing. Some Adverse Social Norms in Cybersecurity. 3.4.3.1 Terms and Conditions. 3.4.3.2 Data Security . 3.4.3.3 Cyber Hygiene. 3.4.3.4 Distributed Trust. 3.4.3.5 Slack Email. 3.4.3.6 Good and Bad Advice. 3.4.3.7 The Ups and Downs ofVirtual Private Networks . 3.4.3.8 Data Fragility. 3.5 Modularity in Cybersecurity . 3.5.1 Concluding Comments. 57 57 58 59 Consumer Choice. 61 4.1 4.2 4.3 4.4 4.5 62 63 65 67 Introduction. Cybersecurity as Predicted by Demographics. Cybersecurity and the Theory of Reasoned Action. Motivation To Avoid Harm (MTAH) and Cybersecurity . The Technology Acceptance Model (TAM) and the Adoption of New Technologies in Cybersecurity . Social and Situational Factors in
Cybersecurity. 4.6.1 Trust and Risk in the Online Environment. 4.6.2 Cybersecurity as Predicted by Personality. 4.6.3 Stress and Time Pressures on Users. 4.6.4 Information Overload. Improving the Security Behavior of Users . 4.7.1 A Need for a Systematic Approach to Cybersecurity . . 70 72 72 73 73 74 74 75 Risk Perspectives in Cybersecurity. 77 5.1 5.2 5.3 77 78 80 80 83 84 86 86 87 90 4.6 4.7 5 52 53 53 53 54 55 56 56 56 Introduction. Costs and Occurrences of Cyberattacks as of 2018. Types of Threats and Their Associated Risks. 5.3.1 Threats by Source of Attack . 5.3.2 Threats by Type of Attack . 5.3.2.1 DDoS Attacks. 5.3.2.2 Middleware Attacks. 5.3.2.3 Spoofing Attacks. 5.3.2.4 Social Engineering Attacks. 5.3.2.5 Advanced Persistent Threat (APT).
viii 6 ■ Government Policy and Statecraft in Cybersecurity. 6.1 6.2 6.3 6.4 6.5 7 Contents 93 Legal Frameworks and Their Effects onReducing Risk . 94 Accreditation and National Frameworks to Reduce Cyber-Risks. 98 6.2.1 CBEST.101 6.2.2 Framework for Improving Critical Infrastructure Cybersecurity or the National Institute of Standards and Technology (NIST) Framework.103 6.2.3 The Australian Signals Directorate Essential Eight . 108 Other Approaches to Corporate Governance to Reduce Cyber-Risk . Ill Cyber Warfare .112 Conclusion and Recommendations.112 Technical Perspectives.115 7.1 7.2 Public-Private Key (PPK) Cryptography. 116 Some Preliminary Concepts . 116 7.2.1 Asymmetric Cyphers. 117 7.2.2 Diffie-Hellman, with Apologies to Mary Poppins . 118 7.2.2.1 Numerical Example. 119 7.2.3 The RSA Algorithm . 119 7.2.3.1 The Really
Hairy Part. 121 7.2.4 Elliptic Curve Cryptography (ECC). 122 7.3 Symmetric Encryption .123 7.3.1 Advanced Encryption Standard (AES).124 7.3.2 Stream Cyphers.124 7.4 Keys Galore.124 7.4.1 Communication Keys. 125 7.4.2 Good and (Very) Bad Signatures. 126 7.4.3 Antiencryption Legislation.127 7.5 Passwords. 122 7.5.1 The Password File . 128 7.5.2 Good Passwords . 129 7.5.3 Password Managers/Safes . 130 7.5.3.1 Using the Browser. 131 7.5.3.2 Rainbow Tables.132 7.5.3.3 Key Exchange Precomputation .133 7.5.3.4 Storing Passwords Locally. 134 7.5.3.5 Online Password Safes.134 7.5.4 Two-Factor Identification. 135 1 ՂՀ 7.6 Biometrics
.
Contents 7.7 7.8 7.9 7.10 7.11 7.12 7.13 7.14 7.15 7.16 8 ■ ix Basic Ideas of Computer Networks. 136 7.7.1 Network Layers. 137 7.7.1.1 Protocol Stacks. A Simple Analogy. 137 7.7.1.2 Abstraction . 138 7.7.1.3 TCP: The Transport Control Protocol . 139 7.7.1.4 UDP: The User Datagram Protocol. 139 7.7.1.5 The Application Layer.139 7.7.2 Addresses of All Sorts.139 7.7.2.1 IP Addresses for the Internet.139 7.7.2.2 Ethernet. 140 7.7.2.3 WiFi.140 7.7.3 Domain Name Server (DNS). 140 Increasing Internet Security.142 7.8.1 IPSec: Going a Bit Deeper. 143 7.8.2 Ports, Firewalls, and Filters. 144 7.8.2.1 Detecting Open Ports.144 Virtual Private Networks . 145 7.9.1 Virtual Private Networks in the Home . 145 7.9.2 Choosing a VPN. 146 7.9.3 Value of a Virtual Private
Network.146 7.9.4 Avoiding the Need for VPNs. 147 Onions and the Dark Web. 147 7.10.1 The Dark Web and Onion Routing.147 Local Threats and Malware. 149 Certificates and Trust. 150 7.12.1 Public Key Infrastructure (PKI). 151 Email.152 7.13.1 Spoofing.154 7.13.2 Email Security. 154 7.13.2.1 Sender Policy Framework Results.156 Blockchains.156 7.14.1 The Hard Fork. 158 EU Data Protection Rules. 159 Quantum Computing . 160 7.16.1 Mr Hyde: Superposition and Parallel Computation . 160 7.16.2 Dr Jekyll: Entanglement.160 The Future. 163 8.1 8.2 8.3 Keeping Nasties Out
. 163 8.1.1 Formal Validation. 164 Use of Encryption. 165 Encouraging Good Cyber Practice . 166
x ■ Contents 8.4 8.5 8.6 8.7 8.8 8.3.1 The Scourge and Salvation of Email.166 Teaching People Safe Practices.167 8.4.1 Gamification. 167 8.4.1.1 Marketing Campaigns for Cybersecurity . . . 167 Changing Criminal Models and the Arms Race with the Authorities . 169 8.5.1 Do People Learn?. 170 8.5.2 New Legal Agendas. 171 Hyperstorage and Machine Learning and Privacy. 172 8.6.1 Protecting the Vulnerablefrom Themselves .172 The Mink and the Porcupine .173 Take It Away, Renatus .173 References Index .175 189
Human Dimensions of Cybersecurity From the Foreword: "In Human Dimensions of Cyber Security. Terry Bossomaier. Steven D'Alessandro, and Roger Bradbury have produced a book that . shows how it is indeed possible to achieve what we all need: a multidisciplinary, rigorously researched and argued, and above all accessible account of cybersecurity — what it is. why it matters, and how to do it." — Professor Paul Cornish. Visiting Professor. LSE IDEAS. London School of Economics Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see mans hazards in cybersecunty. It emphasizes the need for a multidisciplinary approach, as cybersecunty has become a fundamental issue of risk management lor individuals, at work, and with government and nation states. This book explains tlie issues of cybersecunty with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to loam the dos and cion ՛էտ of cybersecunty. The book also Identifies the most important human and social factors that afteel cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints. |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Bossomaier, Terry R. J. 1951- D'Alessandro, Steven Bradbury, Roger 1950- |
author_GND | (DE-588)156652471 (DE-588)1036794504 (DE-588)1047955946 |
author_facet | Bossomaier, Terry R. J. 1951- D'Alessandro, Steven Bradbury, Roger 1950- |
author_role | aut aut aut |
author_sort | Bossomaier, Terry R. J. 1951- |
author_variant | t r j b trj trjb s d sd r b rb |
building | Verbundindex |
bvnumber | BV046617371 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1164660017 (DE-599)KXP1679406043 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000001c 4500</leader><controlfield tag="001">BV046617371</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200612</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200306s2020 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138590403</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-138-59040-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1164660017</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1679406043</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bossomaier, Terry R. J.</subfield><subfield code="d">1951-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)156652471</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Human dimensions of cybersecurity</subfield><subfield code="c">Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">199 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Case studies -- Networks and norms -- Consumer choice -- Risk perspectives in cybersecurity -- Government policy and statecraft in cyber security -- Technical perspectives -- The future.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"The book identifies the technological features that give rise to security issues. It describes the structure of the Internet and how it is compromised by malware, and examines some of the more common security issues. It then looks at aspects of human persuasion and consumer choice, and how these affect cyber security. It argues that social networks and the related norms play a key role as does government policy, as each impact on individual behavior of computer use. The book identifies the most important human and social factors that affect cybersecurity. It illustrates each factor using case studies, and examines possible solutions from both technical and human acceptability viewpoints"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Case studies</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Social aspects</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Government policy</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">D'Alessandro, Steven</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1036794504</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bradbury, Roger</subfield><subfield code="d">1950-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1047955946</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-429-49098-9</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032029152&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032029152&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032029152</subfield></datafield></record></collection> |
id | DE-604.BV046617371 |
illustrated | Illustrated |
index_date | 2024-07-03T14:07:02Z |
indexdate | 2024-10-10T14:00:32Z |
institution | BVB |
isbn | 9781138590403 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032029152 |
oclc_num | 1164660017 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | 199 Seiten Illustrationen |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | CRC Press |
record_format | marc |
spelling | Bossomaier, Terry R. J. 1951- Verfasser (DE-588)156652471 aut Human dimensions of cybersecurity Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury Boca Raton ; London ; New York CRC Press [2020] 199 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Case studies -- Networks and norms -- Consumer choice -- Risk perspectives in cybersecurity -- Government policy and statecraft in cyber security -- Technical perspectives -- The future. "The book identifies the technological features that give rise to security issues. It describes the structure of the Internet and how it is compromised by malware, and examines some of the more common security issues. It then looks at aspects of human persuasion and consumer choice, and how these affect cyber security. It argues that social networks and the related norms play a key role as does government policy, as each impact on individual behavior of computer use. The book identifies the most important human and social factors that affect cybersecurity. It illustrates each factor using case studies, and examines possible solutions from both technical and human acceptability viewpoints"-- Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computer security / Case studies Computer security / Social aspects Computer networks / Security measures Data protection Computer security / Government policy Computersicherheit (DE-588)4274324-2 s DE-604 D'Alessandro, Steven Verfasser (DE-588)1036794504 aut Bradbury, Roger 1950- Verfasser (DE-588)1047955946 aut Erscheint auch als Online-Ausgabe 978-0-429-49098-9 Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032029152&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032029152&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Bossomaier, Terry R. J. 1951- D'Alessandro, Steven Bradbury, Roger 1950- Human dimensions of cybersecurity Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Human dimensions of cybersecurity |
title_auth | Human dimensions of cybersecurity |
title_exact_search | Human dimensions of cybersecurity |
title_exact_search_txtP | Human dimensions of cybersecurity |
title_full | Human dimensions of cybersecurity Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury |
title_fullStr | Human dimensions of cybersecurity Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury |
title_full_unstemmed | Human dimensions of cybersecurity Terry Bossomaier, Steven D'Alessandro, and Roger Bradbury |
title_short | Human dimensions of cybersecurity |
title_sort | human dimensions of cybersecurity |
topic | Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032029152&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032029152&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT bossomaierterryrj humandimensionsofcybersecurity AT dalessandrosteven humandimensionsofcybersecurity AT bradburyroger humandimensionsofcybersecurity |