Cargando…

Successful Cybersecurity Management How To Change Your Behavior to Protect Your Organization.

This book provides a unique perspective into the mindset of psychology and cybersecurity. It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals' behavior, but our behavior as well, and t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Brown, Steven
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Business Expert Press, 2020.
Colección:Issn Ser.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_on1223091856
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 201121s2020 nyu o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d YDX  |d UPM  |d OCLCO  |d OCLCF  |d N$T  |d LIP  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1196375394 
020 |a 1952538432 
020 |a 9781952538438  |q (electronic bk.) 
029 1 |a AU@  |b 000070077881 
035 |a (OCoLC)1223091856  |z (OCoLC)1196375394 
050 4 |a QA76.9.A25  |b B76 2020eb 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Brown, Steven. 
245 1 0 |a Successful Cybersecurity Management  |h [electronic resource] :  |b How To Change Your Behavior to Protect Your Organization. 
260 |a New York :  |b Business Expert Press,  |c 2020. 
300 |a 1 online resource (282 p.). 
490 1 |a Issn Ser. 
500 |a Description based upon print version of record. 
505 0 |a Chapter 1. Cybersecurity and behavior -- Chapter 2. Behaviorism -- Chapter 3. Traits -- Chapter 4. Perceptions -- Chapter 5. So, how do we even think? -- Chapter 6. Memory -- Chapter 7. How are we motivated -- Chapter 8. Social influence -- Chapter 9. Stereotypes -- Chapter 10. Fight or flight -- Chapter 11. Language -- Chapter 12. Differences in opinion -- Chapter 13. Cyber maturity and ethics -- Chapter 14. Theory of cybersecurity -- Chapter 15. Future. 
520 3 |a This book provides a unique perspective into the mindset of psychology and cybersecurity. It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals' behavior, but our behavior as well, and to realize that some of behaviors could lead us in making bad cybersecurity decisions. Dr. Brown also presents even a possible theory of cybersecurity. Key areas include: Behaviorism, Learning models, Cybersecurity vulnerabilities, Stereotypes, Cybersecurity traits, Conditioned response, Social engineering, Deep fakes.By using models and literature rooted in psychology and comparing those to cybersecurity attacks, this book will help those who make crucial cybersecurity decisions to protect their organization, even better decisions. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 0 |a Computer fraud. 
650 0 |a Social engineering. 
650 0 |a Self-protective behavior. 
650 0 |a Decision making. 
650 0 |a Human behavior. 
650 0 |a Cognition. 
650 0 |a Neurosciences. 
650 2 |a Computer Security 
650 2 |a Decision Making 
650 2 |a Behavior 
650 2 |a Cognition 
650 2 |a Neurosciences 
650 6 |a Sécurité informatique. 
650 6 |a Fraude informatique. 
650 6 |a Ingénierie sociale. 
650 6 |a Autoprotection. 
650 6 |a Prise de décision. 
650 6 |a Comportement humain. 
650 6 |a Cognition. 
650 6 |a Neurosciences. 
650 7 |a decision making.  |2 aat 
650 7 |a human behavior.  |2 aat 
650 7 |a cognition.  |2 aat 
650 7 |a Cognition  |2 fast 
650 7 |a Computer fraud  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Decision making  |2 fast 
650 7 |a Human behavior  |2 fast 
650 7 |a Neurosciences  |2 fast 
650 7 |a Self-protective behavior  |2 fast 
650 7 |a Social engineering  |2 fast 
776 0 8 |i Print version:  |a Brown, Steven  |t Successful Cybersecurity Management : How To Change Your Behavior to Protect Your Organization  |d New York : Business Expert Press,c2020 
830 0 |a Issn Ser. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6352009  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6352009 
938 |a Business Expert Press  |b BEPR  |n 9781952538438 
938 |a YBP Library Services  |b YANK  |n 301542059 
938 |a EBSCOhost  |b EBSC  |n 2627851 
994 |a 92  |b IZTAP