This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabili
Cognitive hack : the new battleground in cybersecurity... the human mind
β Scribed by Bone, James
- Publisher
- Auerbach Publications, CRC Press
- Year
- 2017
- Tongue
- English
- Leaves
- 204
- Series
- Internal audit and IT audit
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities.
β¦ Table of Contents
Content: Introduction: the new battleground in cybersecurity --
the human mind --
Cybersecurity: understanding vulnerability --
Cognitive behavior: advances in situational awareness --
The cyber paradox --
why more (of the same) is less --
The risk of weighing the threat by the numbers --
Deception: hacking the mind of the hacker --
Bridge to cognitive risk framework.
β¦ Subjects
Data protection;Computer security;Risk management;Business enterprises;Security measures
π SIMILAR VOLUMES
<p><p>This book identifies the βcognitive humanitiesβ with new approaches to literature and culture that engage with recent theories of the embodied mind in cognitive science. If cognition should be approached less as a matter of internal representationβa Cartesian inner theatreβthan as a form of em
<p><span>What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human - and
What would it take to hack a human? How exploitable are we? In the cybersecurity industry, professionals know that the weakest component of any system sits between the chair and the keyboard. This book looks to speculative fiction, cyberpunk and the digital humanities to bring a human β and humanist
<p>This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automat