Deception in the Digital Age —— Exploiting and Defending Human Targets through Computer-Mediated Communications

----- 恶意软件剖析:解读犯罪现场和犯罪者行为的恶意代码

ISBN: 9780124116306 出版年:2017 页码:286 Malin, Cameron H Gudaitis, Terry Holt, Thomas Academic Press_RM

知识网络
知识图谱网络
内容简介

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception鈥攁nd how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks鈥攁nd conversely postmortem insight about attackers鈥攑resenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.Deeply examines the psychology of deception through the lens of misdirection and other techniques used by master magiciansExplores cognitive vulnerabilities that cyber attackers use to exploit human targetsDissects the underpinnings and elements of deception narrativesExamines group dynamics and deception factors in cyber attacker underground marketsProvides deep coverage on how cyber attackers leverage psychological influence techniques in the trajectory of deception strategiesExplores the deception strategies used in today threat landscape鈥攑hishing, watering hole, scareware and ransomware attacksGives unprecedented insight into deceptive Internet video communicationsDelves into the history and deception pathways of nation-state and cyber terrorism attackersProvides unique insight into honeypot technologies and strategiesExplores the future of cyber deception

Amazon评论 {{comment.person}}

{{comment.content}}

作品图片
推荐图书