Desktop version
Home
Psychology
>>
Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology
Addressing DDoS Attacks
Ransomware
Facebook “This is Your Digital Life”
Yu Pingan
The (US) Department of Justice Success in Prosecuting Cybercriminals: Who’s Winning?
“Fake News” Concerning the Coronavirus
Problems
References
Behavioral Cybersecurity
Cybersecurity Without the Human: Is it Only a Matter of Time?
Cybersecurity and Personality Psychology: Why this Field of Psychological Science?
References
Personality Theory and Methods of Assessment
Personality Traits and the “Social Actor”
Personality Characteristic Adaptations and “The Motivated Agent”
Extrinsic Motivation Versus Intrinsic Motivation
Power Motivation: Striving for Power
Social Motivation: The Striving for Affiliation
Achievement Motivation: The Striving for Achievement
The Narrative Identity Dimension of Human Personality: The Autobiographical Author
Conclusion
References
Hacker Case Studies: Personality Analysis and Ethical Hacking
Comrade
Adrian Lamo
Gabriel
Hacker Personality Descriptions
Ethical Hacking
Programs to Encourage the Development of Ethical Hackers
Problems
References
Profiling
Profiling in the Cybersecurity Context
Sony Pictures Hack
Profiling Matrices
The “ABCD” Analysis
Problems
Reference
Access Control
Authentication
Something You Know: Passwords
Good Password Choice
Password Meters
Tokens: What You Have
Biometrics: What You Are
Problems
Reference
The First Step: Authorization
Security Levels
Partial and Total Order
Covert Channel
Inference Control
Inference Control and Research
A Naïve Answer to Inference Control
Randomization
Firewalls
Problems
References
Origins of Cryptography
Caesar Shift
Substitution and Transposition
The Keyword Mixed Alphabet Cryptosystem
The Vigenère Cryptosystem
One-time Pad Encryption
The Playfair Square
Rotor Machines
World War II and the Enigma Machine
Problems
References
Game Theory
Payoff
Matrix Games
Mixed Strategy
Saddle Points
Solution of All 2 × 2 Games
Dominated Strategies
Graphical Solutions: 2 × n and m × 2 Games
Using Game Theory to Choose a Strategy in the Sony/North Korea Case
References
The Psychology of Gender
Definitions and Analysis of Gender
Gender-as-Trait: The Sex Differences Approach
Gender in Social Context: The Within Gender Variability Approach
Gender Linked to Power Relations Approach
Gender as Intersectional: The Identity Role, Social Identity, and Social Structural Approach
The Nature Versus Nurture Debate in Gender Psychology
Conclusion
References
Turing Tests
Introduction
The Role of the Turing Test in Behavioral Cybersecurity
A Final Exam Question
While Grading
Turing’s Paper in Mind
The Imitation Game
Respondents
Summary of Results
“Coaching” Respondents
Future Research
Problems
References
Modular Arithmetic and Other Computational Methods
Z[sub(n)] or Arithmetic Modulo n
What are the Differences in the Tables?
Finite Fields
The Main Result Concerning Galois Fields
Matrix Algebra or Linear Algebra
Problems
Modern Cryptography
Modern Cryptographic Techniques
The Advanced Encryption Standard
Subbytes
ShiftRow
Mixcolumns
Addroundkey
Test Vectors
Symmetric Encryption or Public Key Cryptology
The PKC Model for Key Management
Can We Devise a PKC?
The RSA Public Key Cryptosystem
What is the RSA Cryptosystem?
Problems
References
Steganography and Relation to Crypto
A History of Steganography
Transmission Issues
Image Steganography
Image File Formats
An Example
Using Cryptography and Steganography in Tandem or in Sequence
Comments
Problems
References
A Metric to Assess Cyberattacks
Defining a Cybersecurity Metric
The Attacker/Defender Scenario
Rivest–Shamir–Adleman: An Interesting Example
Attack/Defense Scenarios
Conclusion
Problems
References
Behavioral Economics
Origins of Behavioral Economics
Utility
Challenge to Utility Theory
Application of the Kahneman–Tversky Approach to Cybersecurity
Nudge
An Application of Nudge Theory to Cybersecurity
Problems
References
Fake News
A Fake News History
Fake News Resurgence, Acceleration, and Elections
What is Fake News?
Satire or Fake News?
Distinguishing Satire from Fake News
Dailybuzzlive.com
AbCnews.com.co
TheOnion.com
Infowars.com
New Yorker
Empirenews.net
Beforeitsnews.com
Centers for Disease Control
Assessing Fake (or Not-Fake) News
Problems
References
Exercises: Hack Labs
Hack Lab 1: Social Engineering: Find Cookie’s Password
Hack Lab 2: Assigned Passwords in the Clear
Hack Lab 3: Sweeney Privacy Study
Hack Lab 4: Password Meters
Problems
References
Profiling
Social Engineering
Sweeney Privacy
Understanding Hackers
Game Theory Application to Profilng
Turing Tests
Crypto and Stego
Behavioral Economics
Fake News
Password Meters
Next Steps
>>
Related topics
Academic library - free online college e textbooks - info{at}ebrary.net - © 2014 - 2023