Author: Rutger Leukfeldt
Publisher: Routledge
ISBN: 0429864175
Category : Computers
Languages : en
Pages : 394
Book Description
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses. Chapter 13 of this book is freely available as a downloadable Open Access PDF at http://www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.
The Human Factor of Cybercrime
Author: Rutger Leukfeldt
Publisher: Routledge
ISBN: 0429864175
Category : Computers
Languages : en
Pages : 394
Book Description
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses. Chapter 13 of this book is freely available as a downloadable Open Access PDF at http://www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.
Publisher: Routledge
ISBN: 0429864175
Category : Computers
Languages : en
Pages : 394
Book Description
Cybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the decision-making process of offenders? Which personal and situational characteristics provide an increased or decreased risk of cybercrime victimization? This book brings together leading criminologists from around the world to consider these questions and examine all facets of victimization, offending, offender networks, and policy responses. Chapter 13 of this book is freely available as a downloadable Open Access PDF at http://www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.
Cybercrime in Context
Author: Marleen Weulen Kranenbarg
Publisher: Springer Nature
ISBN: 3030605272
Category : Social Science
Languages : en
Pages : 405
Book Description
This book is about the human factor in cybercrime: its offenders, victims and parties involved in tackling cybercrime. It takes a diverse international perspective of the response to and prevention of cybercrime by seeking to understand not just the technological, but the human decision-making involved. This edited volume represents the state of the art of research on the human factor in cybercrime, addressing its victims, offenders, and policing. It originated at the Second annual Conference on the Human Factor in Cybercrime, held in The Netherlands in October 2019, bringing together empirical research from a variety of disciplines, and theoretical and methodological approaches. This volume will be of particular interest to researchers and students in cybercrime and the psychology of cybercrime, as well as policy makers and law enforcement interested in prevention and detection.
Publisher: Springer Nature
ISBN: 3030605272
Category : Social Science
Languages : en
Pages : 405
Book Description
This book is about the human factor in cybercrime: its offenders, victims and parties involved in tackling cybercrime. It takes a diverse international perspective of the response to and prevention of cybercrime by seeking to understand not just the technological, but the human decision-making involved. This edited volume represents the state of the art of research on the human factor in cybercrime, addressing its victims, offenders, and policing. It originated at the Second annual Conference on the Human Factor in Cybercrime, held in The Netherlands in October 2019, bringing together empirical research from a variety of disciplines, and theoretical and methodological approaches. This volume will be of particular interest to researchers and students in cybercrime and the psychology of cybercrime, as well as policy makers and law enforcement interested in prevention and detection.
The Oxford Handbook of Cyberpsychology
Author: Alison Attrill-Smith
Publisher:
ISBN: 0198812744
Category : Business & Economics
Languages : en
Pages : 779
Book Description
The internet is so central to everyday life, that it is impossible to contemplate life without it. From finding romance, to conducting business, receiving health advice, shopping, banking, and gaming, the internet opens up a world of possibilities to people across the globe. Yet for all its positive attributes, it is also an environment where we witness the very worst of human behaviour - cybercrime, election interference, fake news, and trolling being just a few examples. What is it about this unique environment that can make people behave in ways they wouldn't contemplate in real life. Understanding the psychological processes underlying and influencing the thinking, interpretation and behaviour associated with this online interconnectivity is the core premise of Cyberpsychology. The Oxford Handbook of Cyberpsychology explores a wide range of cyberpsychological processes and activities through the research and writings of some of the world's leading cyberpsychology experts. The book is divided into eight sections covering topics as varied as online research methods, self-presentation and impression management, technology across the lifespan, interaction and interactivity, online groups and communities, social media, health and technology, video gaming and cybercrime and cybersecurity. The Oxford Handbook of Cyberpsychology will be important reading for those who have only recently discovered the discipline as well as more seasoned cyberpsychology researchers and teachers.
Publisher:
ISBN: 0198812744
Category : Business & Economics
Languages : en
Pages : 779
Book Description
The internet is so central to everyday life, that it is impossible to contemplate life without it. From finding romance, to conducting business, receiving health advice, shopping, banking, and gaming, the internet opens up a world of possibilities to people across the globe. Yet for all its positive attributes, it is also an environment where we witness the very worst of human behaviour - cybercrime, election interference, fake news, and trolling being just a few examples. What is it about this unique environment that can make people behave in ways they wouldn't contemplate in real life. Understanding the psychological processes underlying and influencing the thinking, interpretation and behaviour associated with this online interconnectivity is the core premise of Cyberpsychology. The Oxford Handbook of Cyberpsychology explores a wide range of cyberpsychological processes and activities through the research and writings of some of the world's leading cyberpsychology experts. The book is divided into eight sections covering topics as varied as online research methods, self-presentation and impression management, technology across the lifespan, interaction and interactivity, online groups and communities, social media, health and technology, video gaming and cybercrime and cybersecurity. The Oxford Handbook of Cyberpsychology will be important reading for those who have only recently discovered the discipline as well as more seasoned cyberpsychology researchers and teachers.
Psychological and Behavioral Examinations in Cyber Security
Author: McAlaney, John
Publisher: IGI Global
ISBN: 1522540547
Category : Computers
Languages : en
Pages : 358
Book Description
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.
Publisher: IGI Global
ISBN: 1522540547
Category : Computers
Languages : en
Pages : 358
Book Description
Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.
Research Anthology on Artificial Intelligence Applications in Security
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799877485
Category : Computers
Languages : en
Pages : 2253
Book Description
As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.
Publisher: IGI Global
ISBN: 1799877485
Category : Computers
Languages : en
Pages : 2253
Book Description
As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various security issues. However, even with the tremendous progress AI has made within the sphere of security, it’s important to understand the impacts, implications, and critical issues and challenges of AI applications along with the many benefits and emerging trends in this essential field of security-based research. Research Anthology on Artificial Intelligence Applications in Security seeks to address the fundamental advancements and technologies being used in AI applications for the security of digital data and information. The included chapters cover a wide range of topics related to AI in security stemming from the development and design of these applications, the latest tools and technologies, as well as the utilization of AI and what challenges and impacts have been discovered along the way. This resource work is a critical exploration of the latest research on security and an overview of how AI has impacted the field and will continue to advance as an essential tool for security, safety, and privacy online. This book is ideally intended for cyber security analysts, computer engineers, IT specialists, practitioners, stakeholders, researchers, academicians, and students interested in AI applications in the realm of security research.
Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention
Author: Conteh, Nabie Y.
Publisher: IGI Global
ISBN: 1799865061
Category : Computers
Languages : en
Pages : 168
Book Description
As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should protect individuals from cyber-threats, it also should be eliminating any and all vulnerabilities. The use of hacking to prevent cybercrime and contribute new countermeasures towards protecting computers, servers, networks, web applications, mobile devices, and stored data from black hat attackers who have malicious intent, as well as to stop against unauthorized access instead of using hacking in the traditional sense to launch attacks on these devices, can contribute emerging and advanced solutions against cybercrime. Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention is a comprehensive text that discusses and defines ethical hacking, including the skills and concept of ethical hacking, and studies the countermeasures to prevent and stop cybercrimes, cyberterrorism, cybertheft, identity theft, and computer-related crimes. It broadens the understanding of cybersecurity by providing the necessary tools and skills to combat cybercrime. Some specific topics include top cyber investigation trends, data security of consumer devices, phases of hacking attacks, and stenography for secure image transmission. This book is relevant for ethical hackers, cybersecurity analysts, computer forensic experts, government officials, practitioners, researchers, academicians, and students interested in the latest techniques for preventing and combatting cybercrime.
Publisher: IGI Global
ISBN: 1799865061
Category : Computers
Languages : en
Pages : 168
Book Description
As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should protect individuals from cyber-threats, it also should be eliminating any and all vulnerabilities. The use of hacking to prevent cybercrime and contribute new countermeasures towards protecting computers, servers, networks, web applications, mobile devices, and stored data from black hat attackers who have malicious intent, as well as to stop against unauthorized access instead of using hacking in the traditional sense to launch attacks on these devices, can contribute emerging and advanced solutions against cybercrime. Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention is a comprehensive text that discusses and defines ethical hacking, including the skills and concept of ethical hacking, and studies the countermeasures to prevent and stop cybercrimes, cyberterrorism, cybertheft, identity theft, and computer-related crimes. It broadens the understanding of cybersecurity by providing the necessary tools and skills to combat cybercrime. Some specific topics include top cyber investigation trends, data security of consumer devices, phases of hacking attacks, and stenography for secure image transmission. This book is relevant for ethical hackers, cybersecurity analysts, computer forensic experts, government officials, practitioners, researchers, academicians, and students interested in the latest techniques for preventing and combatting cybercrime.
Cyberdanger
Author: Eddy Willems
Publisher: Springer
ISBN: 3030045315
Category : Computers
Languages : en
Pages : 231
Book Description
This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It’s also a valuable introduction for the general reader who wants to learn about cybersecurity.
Publisher: Springer
ISBN: 3030045315
Category : Computers
Languages : en
Pages : 231
Book Description
This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers insights about the human factor, the people involved on both sides and their styles and motivations. He writes in an accessible, often humorous way about real-world cases in industry, and his collaborations with police and government agencies worldwide, and the text features interviews with leading industry experts. The book is important reading for all professionals engaged with securing information, people, and enterprises. It’s also a valuable introduction for the general reader who wants to learn about cybersecurity.
Scene of the Cybercrime
Author: Debra Littlejohn Shinder
Publisher: Elsevier
ISBN: 0080486991
Category : Computers
Languages : en
Pages : 745
Book Description
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard. Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws. - Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations - Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard - Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones
Publisher: Elsevier
ISBN: 0080486991
Category : Computers
Languages : en
Pages : 745
Book Description
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard. Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the "letter of the law" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as "traditional" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws. - Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations - Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard - Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones
The Secret to Cybersecurity
Author: Scott Augenbaum
Publisher: Simon and Schuster
ISBN: 1948677091
Category : Business & Economics
Languages : en
Pages : 229
Book Description
Cybercrimes are a threat and as dangerous as an armed intruder—yet millions of Americans are complacent or simply uninformed of how to protect themselves. The Secret to Cybersecurity closes that knowledge gap by using real-life examples to educate readers. It’s 2 a.m.—do you know who your child is online with? According to author Scott Augenbaum, between 80 to 90 percent of students say they do whatever they want on their smartphones—and their parents don’t have a clue. Is that you? What about your online banking passwords, are they safe? Has your email account or bank/debit card ever been compromised? In 2018, there were data breaches at several major companies—If those companies have your credit or debit information, that affects you. There are bad people in the world, and they are on the internet. They want to hurt you. They are based all over the world, so they’re hard at “work” when even you’re sleeping. They use automated programs to probe for weaknesses in your internet security programs. And they never stop. Cybercrime is on the increase internationally, and it’s up to you to protect yourself. But how? The Secret to Cybersecurity is the simple and straightforward plan to keep you, your family, and your business safe. Written by Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes, it uses real-life examples to educate and inform readers, explaining who/why/how so you’ll have a specific takeaway to put into action for your family. Learn about the scams, methods, and ways that cyber criminals operate—and learn how to avoid being the next cyber victim.
Publisher: Simon and Schuster
ISBN: 1948677091
Category : Business & Economics
Languages : en
Pages : 229
Book Description
Cybercrimes are a threat and as dangerous as an armed intruder—yet millions of Americans are complacent or simply uninformed of how to protect themselves. The Secret to Cybersecurity closes that knowledge gap by using real-life examples to educate readers. It’s 2 a.m.—do you know who your child is online with? According to author Scott Augenbaum, between 80 to 90 percent of students say they do whatever they want on their smartphones—and their parents don’t have a clue. Is that you? What about your online banking passwords, are they safe? Has your email account or bank/debit card ever been compromised? In 2018, there were data breaches at several major companies—If those companies have your credit or debit information, that affects you. There are bad people in the world, and they are on the internet. They want to hurt you. They are based all over the world, so they’re hard at “work” when even you’re sleeping. They use automated programs to probe for weaknesses in your internet security programs. And they never stop. Cybercrime is on the increase internationally, and it’s up to you to protect yourself. But how? The Secret to Cybersecurity is the simple and straightforward plan to keep you, your family, and your business safe. Written by Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes, it uses real-life examples to educate and inform readers, explaining who/why/how so you’ll have a specific takeaway to put into action for your family. Learn about the scams, methods, and ways that cyber criminals operate—and learn how to avoid being the next cyber victim.
Cybercrime Through Social Engineering: The New Global Crisis
Author: Christopher S. Kayser
Publisher: ISBN Canada - Library and Archives Canada
ISBN: 9780995859241
Category : Social Science
Languages : en
Pages : 326
Book Description
For the 4 billion users of cyber technology, the author has provided a non-technical anecdotal journey through cyberspace. Citing experiences of real people, organizations, and governments, readers will learn about the massive illicit wealth transfer, ideological differences, and state-crafted cyberwarfare that continues to increase globally on an exponential basis.From his introduction to bits and bytes as a programmer, and multiple decades in the computer industry, Chris envisioned computers making our lives easier and more productive, never anticipating that technology would provide a conduit to what has become the most impactive form of crime in history - cybercrime! In his quest to learn how cybercriminals continue to stay one step ahead of efforts to reduce rates of cyber-victimization, one reason continues to dominate - how cybercriminals use social engineering to dupe their targets into becoming cybervictims.Social engineering has become the backbone of cybercrime - a means to morph technology into a weapon. Cybercriminals have become masterful at manipulating emotions that invoke us to react in specific ways not characteristic with our human nature when confronted with a malicious cyberattack. To better understand these tactics, Chris developed a new theory - RESCAT (Required Elements for a Social Engineered Cyber Attack Theory), that explores various decision processes when these emotions are triggered. RESCAT helps explain these processes, and how the ultimate outcome of becoming a cybervictims is determined by our actions. The author discusses many other factors pertaining to becoming more cyber-safe: pros and cons of passwords, password managers, cloud service providers, multi-factor authentication, cryptocurrencies, ransomware, multiple forms of phishing and spear phishing, the integrity of the apps we use, and more. He also questions whether adoption of technology during early stages in our lives could be interfering with the development of our cognitive skills and explains why encouraging children in their earliest years to grasp the world of technology may be counter-productive to their long-term development.Christopher also examines how existing efforts to provide cybercrime prevention education are not working, and how they need to be designed to address different generations, and their familiarity with technology.
Publisher: ISBN Canada - Library and Archives Canada
ISBN: 9780995859241
Category : Social Science
Languages : en
Pages : 326
Book Description
For the 4 billion users of cyber technology, the author has provided a non-technical anecdotal journey through cyberspace. Citing experiences of real people, organizations, and governments, readers will learn about the massive illicit wealth transfer, ideological differences, and state-crafted cyberwarfare that continues to increase globally on an exponential basis.From his introduction to bits and bytes as a programmer, and multiple decades in the computer industry, Chris envisioned computers making our lives easier and more productive, never anticipating that technology would provide a conduit to what has become the most impactive form of crime in history - cybercrime! In his quest to learn how cybercriminals continue to stay one step ahead of efforts to reduce rates of cyber-victimization, one reason continues to dominate - how cybercriminals use social engineering to dupe their targets into becoming cybervictims.Social engineering has become the backbone of cybercrime - a means to morph technology into a weapon. Cybercriminals have become masterful at manipulating emotions that invoke us to react in specific ways not characteristic with our human nature when confronted with a malicious cyberattack. To better understand these tactics, Chris developed a new theory - RESCAT (Required Elements for a Social Engineered Cyber Attack Theory), that explores various decision processes when these emotions are triggered. RESCAT helps explain these processes, and how the ultimate outcome of becoming a cybervictims is determined by our actions. The author discusses many other factors pertaining to becoming more cyber-safe: pros and cons of passwords, password managers, cloud service providers, multi-factor authentication, cryptocurrencies, ransomware, multiple forms of phishing and spear phishing, the integrity of the apps we use, and more. He also questions whether adoption of technology during early stages in our lives could be interfering with the development of our cognitive skills and explains why encouraging children in their earliest years to grasp the world of technology may be counter-productive to their long-term development.Christopher also examines how existing efforts to provide cybercrime prevention education are not working, and how they need to be designed to address different generations, and their familiarity with technology.