
Human Factors Analysis of 23 Cyberattacks
Series: The Human Element in Smart and Intelligent Systems;
- Publisher's listprice GBP 81.99
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 4 150 Ft off)
- Discounted price 37 345 Ft (35 567 Ft + 5% VAT)
41 495 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1
- Publisher CRC Press
- Date of Publication 30 March 2025
- ISBN 9781032608624
- Binding Hardback
- No. of pages198 pages
- Size 234x156 mm
- Weight 530 g
- Language English
- Illustrations 5 Illustrations, black & white; 5 Line drawings, black & white; 1 Tables, black & white 699
Categories
Short description:
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing. While technical issues are fundamental in understanding how to improve system security, analyzing the roles of human agents is crucial. This title addresses, through examples, the human factors behind cybersecurity attacks.
MoreLong description:
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.4 billion a day. While technical issue analyses are fundamental in understanding how to improve system security, analyzing the roles of human agents is crucial. Human Factors Analysis of 23 Cyberattacks addresses, through examples, the human factors behind cybersecurity attacks.
Focusing on human factors in individual attack cases, this book aims to understand the primary behaviors that might result in the success of attacks. Each chapter looks at a series of cases describing the nature of the attack through the reports and reviews of the experts, followed by the role and human factors analysis. It investigates where a human agent's intervention was a factor in starting, discovering, monitoring, or suffering from the attacks. Written in an easy-to-understand way and free from technical jargon, the reader will develop a thorough understanding of why cyberattacks occur and how they can be mitigated by comparison to the practical examples provided.
This title will appeal to students and practitioners in the fields of ergonomics, human factors, cybersecurity, computer engineering, industrial engineering, and computer science.
MoreTable of Contents:
Contents
Acknowledgments
About the author
Introduction
Part 1: Human and Motivation
Chapter 1: Human Agents
Chapter 2: Cyberattackers versus Hackers
Chapter 3: Cyberattackers? Motivations
Part 2: Cyberwar and Cyberespionage
Chapter 4: SolarWinds
Chapter 5: Pegasus Spyware
Chapter 6: Google Chrome Extension Spyware
Chapter 7: Marriott International
Part 3: Sabotage
Chapter 8: Stuxnet
Chapter 9: Colonial Pipelines
Chapter 10: Ukrainian Power Grid Hack
Part 4: Fake News Shaping People's Opinions
Chapter 11: Facebook-Cambridge Analytica
Chapter 12: Instagram
Part 5: Data Privacy
Chapter 13: Baidu Android Apps
Chapter 14: Zoom
Chapter 15: LinkedIn
Chapter 16: Spotify
Part 6: Trust
Chapter 17: Uber Technologies
Chapter 18: Equifax
Chapter 19: Office of Personnel Management Data
Part 7: Financial Cybercrimes
Chapter 20: Emulators-Mobile Banking Frauds
Chapter 21: Google Store
Chapter 22: British Airways
Chapter 23: Target Data Breach
Chapter 24: TJ Maxx?s Data Breach
Part 8: Black Mail-Hacktivism
Chapter 25: Ashley Madison
Chapter 26: Dark Web Hosting Provider Hack
Part 9: Conclusion
Chapter 27: Factors Shaping Vulnerable Behaviors
Index
More