Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Deception in the Digital Age -  Terry Gudaitis,  Thomas Holt,  Max Kilger,  Cameron H. Malin

Deception in the Digital Age (eBook)

Exploiting and Defending Human Targets through Computer-Mediated Communications
eBook Download: EPUB
2017 | 1. Auflage
284 Seiten
Elsevier Science (Verlag)
978-0-12-411639-9 (ISBN)
Systemvoraussetzungen
48,76 inkl. MwSt
(CHF 47,60)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks-and conversely postmortem insight about attackers-presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process. - Deeply examines the psychology of deception through the lens of misdirection and other techniques used by master magicians - Explores cognitive vulnerabilities that cyber attackers use to exploit human targets - Dissects the underpinnings and elements of deception narratives - Examines group dynamics and deception factors in cyber attacker underground markets - Provides deep coverage on how cyber attackers leverage psychological influence techniques in the trajectory of deception strategies - Explores the deception strategies used in today's threat landscape-phishing, watering hole, scareware and ransomware attacks - Gives unprecedented insight into deceptive Internet video communications - Delves into the history and deception pathways of nation-state and cyber terrorism attackers - Provides unique insight into honeypot technologies and strategies - Explores the future of cyber deception

Cameron H. Malin is a Behavioral Profiler with over 20 years of experience investigating, analyzing and profiling cyber adversaries across the spectrum of criminal to national security. He is the founder of the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC) and the longest serving FBI Cyber Profiler. He is a co-author of the authoritative cyber deception book, Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications (published by Academic Press, an imprint of Elsevier, Inc.) and co-author of the Malware Forensics book series: Malware Forensics: Investigating and Analyzing Malicious Code, Malware Forensics Field Guide for Windows Systems, and Malware Forensics Field Guide for Linux Systems (all published by Syngress, an imprint of Elsevier, Inc.). Cameron is the creator of Digital Behavioral Criminalistics - a combined application of numerous forensic disciplines-digital forensics, criminalistics, and behavioral sciences-to meaningfully uncovering offender thoughts and actions in digital artifacts-as well as the Cyber Pathway to Intended Violence (CPIV)-a model for assessing violent offenders who have engaged computer systems, devices, and/or online resources before, during, and/or after a premeditated, violent act. These important emerging topics were published in his book chapter Digital Behavioral Criminalistics to Elucidate the Cyber Pathway to Intended Violence in the International Handbook of Threat Assessment, 2nd Edition (Oxford University Press, 2021). Prior to working for the FBI, Cameron was an Assistant State Attorney (ASA) and Special Assistant United States Attorney in Miami, Florida, where he specialized in computer crime prosecutions. During his tenure as an ASA, he was also an Assistant Professorial Lecturer in the Computer Fraud Investigations Master's Program at George Washington University.
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks and conversely postmortem insight about attackers presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process. - Deeply examines the psychology of deception through the lens of misdirection and other techniques used by master magicians- Explores cognitive vulnerabilities that cyber attackers use to exploit human targets- Dissects the underpinnings and elements of deception narratives- Examines group dynamics and deception factors in cyber attacker underground markets- Provides deep coverage on how cyber attackers leverage psychological influence techniques in the trajectory of deception strategies- Explores the deception strategies used in today's threat landscape phishing, watering hole, scareware and ransomware attacks- Gives unprecedented insight into deceptive Internet video communications- Delves into the history and deception pathways of nation-state and cyber terrorism attackers- Provides unique insight into honeypot technologies and strategies- Explores the future of cyber deception
Erscheint lt. Verlag 30.6.2017
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Software Entwicklung
Recht / Steuern
ISBN-10 0-12-411639-6 / 0124116396
ISBN-13 978-0-12-411639-9 / 9780124116399
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Technische und organisatorische Schutzmaßnahmen gegen Datenverlust …

von Thomas H. Lenhard

eBook Download (2025)
Springer Vieweg (Verlag)
CHF 34,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 45,90
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
CHF 38,95