Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exp
357 11 6MB
English Pages 261 Year 2019
Table of contents :
Content: What is cybersecurity? --
Essentials of behavioral science --
Psychology and cybersecurity --
Recent events --
Profiling --
Hack lab 1 : social engineering --
Access control --
The first step : authorization --
Hack lab 2 : assigned passwords in the clear --
Origins of cryptography --
Hack lab 3 : Sweeney method --
Hacker personalities : case studies --
Game theory --
Ethical hacking --
The psychology of gender --
Turing tests --
Personality tests --
Modular arithmetic and other computational methods --
Modern cryptography --
Steganography --
Crypto and stego --
A metric to measure attacks/defenses --
Behavioral economics --
Fake news --
Potpourri --
Hack lab 4 : password meters.