
ISBN13: | 9781032608624 |
ISBN10: | 1032608625 |
Binding: | Hardback |
No. of pages: | 198 pages |
Size: | 234x156 mm |
Language: | English |
Illustrations: | 5 Illustrations, black & white; 5 Line drawings, black & white; 1 Tables, black & white |
700 |
Human Factors Analysis of 23 Cyberattacks
GBP 81.99
Click here to subscribe.
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing. While technical issues are fundamental in understanding how to improve system security, analyzing the roles of human agents is crucial. This title addresses, through examples, the human factors behind cybersecurity attacks.
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.4 billion a day. While technical issue analyses are fundamental in understanding how to improve system security, analyzing the roles of human agents is crucial. Human Factors Analysis of 23 Cyberattacks addresses, through examples, the human factors behind cybersecurity attacks.
Focusing on human factors in individual attack cases, this book aims to understand the primary behaviors that might result in the success of attacks. Each chapter looks at a series of cases describing the nature of the attack through the reports and reviews of the experts, followed by the role and human factors analysis. It investigates where a human agent's intervention was a factor in starting, discovering, monitoring, or suffering from the attacks. Written in an easy-to-understand way and free from technical jargon, the reader will develop a thorough understanding of why cyberattacks occur and how they can be mitigated by comparison to the practical examples provided.
This title will appeal to students and practitioners in the fields of ergonomics, human factors, cybersecurity, computer engineering, industrial engineering, and computer science.
Contents
Acknowledgments
About the author
Introduction
Part 1: Human and Motivation
Chapter 1: Human Agents
Chapter 2: Cyberattackers versus Hackers
Chapter 3: Cyberattackers? Motivations
Part 2: Cyberwar and Cyberespionage
Chapter 4: SolarWinds
Chapter 5: Pegasus Spyware
Chapter 6: Google Chrome Extension Spyware
Chapter 7: Marriott International
Part 3: Sabotage
Chapter 8: Stuxnet
Chapter 9: Colonial Pipelines
Chapter 10: Ukrainian Power Grid Hack
Part 4: Fake News Shaping People's Opinions
Chapter 11: Facebook-Cambridge Analytica
Chapter 12: Instagram
Part 5: Data Privacy
Chapter 13: Baidu Android Apps
Chapter 14: Zoom
Chapter 15: LinkedIn
Chapter 16: Spotify
Part 6: Trust
Chapter 17: Uber Technologies
Chapter 18: Equifax
Chapter 19: Office of Personnel Management Data
Part 7: Financial Cybercrimes
Chapter 20: Emulators-Mobile Banking Frauds
Chapter 21: Google Store
Chapter 22: British Airways
Chapter 23: Target Data Breach
Chapter 24: TJ Maxx?s Data Breach
Part 8: Black Mail-Hacktivism
Chapter 25: Ashley Madison
Chapter 26: Dark Web Hosting Provider Hack
Part 9: Conclusion
Chapter 27: Factors Shaping Vulnerable Behaviors
Index