Desktop version

Home arrow Psychology

  • Increase font
  • Decrease font


Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology

Addressing DDoS AttacksRansomwareFacebook “This is Your Digital Life”Yu PinganThe (US) Department of Justice Success in Prosecuting Cybercriminals: Who’s Winning?“Fake News” Concerning the CoronavirusProblemsReferencesBehavioral CybersecurityCybersecurity Without the Human: Is it Only a Matter of Time?Cybersecurity and Personality Psychology: Why this Field of Psychological Science?ReferencesPersonality Theory and Methods of AssessmentPersonality Traits and the “Social Actor”Personality Characteristic Adaptations and “The Motivated Agent”Extrinsic Motivation Versus Intrinsic MotivationPower Motivation: Striving for PowerSocial Motivation: The Striving for AffiliationAchievement Motivation: The Striving for AchievementThe Narrative Identity Dimension of Human Personality: The Autobiographical AuthorConclusionReferencesHacker Case Studies: Personality Analysis and Ethical HackingComradeAdrian LamoGabrielHacker Personality DescriptionsEthical HackingPrograms to Encourage the Development of Ethical HackersProblemsReferencesProfilingProfiling in the Cybersecurity ContextSony Pictures HackProfiling MatricesThe “ABCD” AnalysisProblemsReferenceAccess ControlAuthenticationSomething You Know: PasswordsGood Password ChoicePassword MetersTokens: What You HaveBiometrics: What You AreProblemsReferenceThe First Step: AuthorizationSecurity LevelsPartial and Total OrderCovert ChannelInference ControlInference Control and ResearchA Naïve Answer to Inference ControlRandomizationFirewallsProblemsReferencesOrigins of CryptographyCaesar ShiftSubstitution and TranspositionThe Keyword Mixed Alphabet CryptosystemThe Vigenère CryptosystemOne-time Pad EncryptionThe Playfair SquareRotor MachinesWorld War II and the Enigma MachineProblemsReferencesGame TheoryPayoffMatrix GamesMixed StrategySaddle PointsSolution of All 2 × 2 GamesDominated StrategiesGraphical Solutions: 2 × n and m × 2 GamesUsing Game Theory to Choose a Strategy in the Sony/North Korea CaseReferencesThe Psychology of GenderDefinitions and Analysis of GenderGender-as-Trait: The Sex Differences ApproachGender in Social Context: The Within Gender Variability ApproachGender Linked to Power Relations ApproachGender as Intersectional: The Identity Role, Social Identity, and Social Structural ApproachThe Nature Versus Nurture Debate in Gender PsychologyConclusionReferencesTuring TestsIntroductionThe Role of the Turing Test in Behavioral CybersecurityA Final Exam QuestionWhile GradingTuring’s Paper in MindThe Imitation GameRespondentsSummary of Results“Coaching” RespondentsFuture ResearchProblemsReferencesModular Arithmetic and Other Computational MethodsZ[sub(n)] or Arithmetic Modulo nWhat are the Differences in the Tables?Finite FieldsThe Main Result Concerning Galois FieldsMatrix Algebra or Linear AlgebraProblemsModern CryptographyModern Cryptographic TechniquesThe Advanced Encryption StandardSubbytesShiftRowMixcolumnsAddroundkeyTest VectorsSymmetric Encryption or Public Key CryptologyThe PKC Model for Key ManagementCan We Devise a PKC?The RSA Public Key CryptosystemWhat is the RSA Cryptosystem?ProblemsReferencesSteganography and Relation to CryptoA History of SteganographyTransmission IssuesImage SteganographyImage File FormatsAn ExampleUsing Cryptography and Steganography in Tandem or in SequenceCommentsProblemsReferencesA Metric to Assess CyberattacksDefining a Cybersecurity MetricThe Attacker/Defender ScenarioRivest–Shamir–Adleman: An Interesting ExampleAttack/Defense ScenariosConclusionProblemsReferencesBehavioral EconomicsOrigins of Behavioral EconomicsUtilityChallenge to Utility TheoryApplication of the Kahneman–Tversky Approach to CybersecurityNudgeAn Application of Nudge Theory to CybersecurityProblemsReferencesFake NewsA Fake News HistoryFake News Resurgence, Acceleration, and ElectionsWhat is Fake News?Satire or Fake News?Distinguishing Satire from Fake YorkerEmpirenews.netBeforeitsnews.comCenters for Disease ControlAssessing Fake (or Not-Fake) NewsProblemsReferencesExercises: Hack LabsHack Lab 1: Social Engineering: Find Cookie’s PasswordHack Lab 2: Assigned Passwords in the ClearHack Lab 3: Sweeney Privacy StudyHack Lab 4: Password MetersProblemsReferencesProfilingSocial EngineeringSweeney PrivacyUnderstanding HackersGame Theory Application to ProfilngTuring TestsCrypto and StegoBehavioral EconomicsFake NewsPassword MetersNext Steps

Related topics