Human Factors Analysis of 23 Cyberattacks
Human Factors Analysis of 23 Cyberattacks
Moallem, Abbas
Taylor & Francis Ltd
03/2025
182
Dura
9781032608624
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
Contents
Acknowledgments
About the author
Introduction
Part 1: Human and Motivation
Chapter 1: Human Agents
Chapter 2: Cyberattackers versus Hackers
Chapter 3: Cyberattackers' Motivations
Part 2: Cyberwar and Cyberespionage
Chapter 4: SolarWinds
Chapter 5: Pegasus Spyware
Chapter 6: Google Chrome Extension Spyware
Chapter 7: Marriott International
Part 3: Sabotage
Chapter 8: Stuxnet
Chapter 9: Colonial Pipelines
Chapter 10: Ukrainian Power Grid Hack
Part 4: Fake News Shaping People's Opinions
Chapter 11: Facebook-Cambridge Analytica
Chapter 12: Instagram
Part 5: Data Privacy
Chapter 13: Baidu Android Apps
Chapter 14: Zoom
Chapter 15: LinkedIn
Chapter 16: Spotify
Part 6: Trust
Chapter 17: Uber Technologies
Chapter 18: Equifax
Chapter 19: Office of Personnel Management Data
Part 7: Financial Cybercrimes
Chapter 20: Emulators-Mobile Banking Frauds
Chapter 21: Google Store
Chapter 22: British Airways
Chapter 23: Target Data Breach
Chapter 24: TJ Maxx's Data Breach
Part 8: Black Mail-Hacktivism
Chapter 25: Ashley Madison
Chapter 26: Dark Web Hosting Provider Hack
Part 9: Conclusion
Chapter 27: Factors Shaping Vulnerable Behaviors
Index
Acknowledgments
About the author
Introduction
Part 1: Human and Motivation
Chapter 1: Human Agents
Chapter 2: Cyberattackers versus Hackers
Chapter 3: Cyberattackers' Motivations
Part 2: Cyberwar and Cyberespionage
Chapter 4: SolarWinds
Chapter 5: Pegasus Spyware
Chapter 6: Google Chrome Extension Spyware
Chapter 7: Marriott International
Part 3: Sabotage
Chapter 8: Stuxnet
Chapter 9: Colonial Pipelines
Chapter 10: Ukrainian Power Grid Hack
Part 4: Fake News Shaping People's Opinions
Chapter 11: Facebook-Cambridge Analytica
Chapter 12: Instagram
Part 5: Data Privacy
Chapter 13: Baidu Android Apps
Chapter 14: Zoom
Chapter 15: LinkedIn
Chapter 16: Spotify
Part 6: Trust
Chapter 17: Uber Technologies
Chapter 18: Equifax
Chapter 19: Office of Personnel Management Data
Part 7: Financial Cybercrimes
Chapter 20: Emulators-Mobile Banking Frauds
Chapter 21: Google Store
Chapter 22: British Airways
Chapter 23: Target Data Breach
Chapter 24: TJ Maxx's Data Breach
Part 8: Black Mail-Hacktivism
Chapter 25: Ashley Madison
Chapter 26: Dark Web Hosting Provider Hack
Part 9: Conclusion
Chapter 27: Factors Shaping Vulnerable Behaviors
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Inteligência e raciocínio
- Ergonómica
- Fraudes com computadores e hacking
- Privacidade e protecção de dados
- Engenahria civil, levantamentos e construção
- Aspectos jurídicos da Tecnologia Informática
- Engenharia: geral
- Aspectos sanitários e de segurança da computação
- Saude e segurança ocupacional / industrial
- Ciência da Computação
Cybersecurity;Human computer interaction;Data breach;Cybersecurity policy;Privacy policy;Information Technology
Contents
Acknowledgments
About the author
Introduction
Part 1: Human and Motivation
Chapter 1: Human Agents
Chapter 2: Cyberattackers versus Hackers
Chapter 3: Cyberattackers' Motivations
Part 2: Cyberwar and Cyberespionage
Chapter 4: SolarWinds
Chapter 5: Pegasus Spyware
Chapter 6: Google Chrome Extension Spyware
Chapter 7: Marriott International
Part 3: Sabotage
Chapter 8: Stuxnet
Chapter 9: Colonial Pipelines
Chapter 10: Ukrainian Power Grid Hack
Part 4: Fake News Shaping People's Opinions
Chapter 11: Facebook-Cambridge Analytica
Chapter 12: Instagram
Part 5: Data Privacy
Chapter 13: Baidu Android Apps
Chapter 14: Zoom
Chapter 15: LinkedIn
Chapter 16: Spotify
Part 6: Trust
Chapter 17: Uber Technologies
Chapter 18: Equifax
Chapter 19: Office of Personnel Management Data
Part 7: Financial Cybercrimes
Chapter 20: Emulators-Mobile Banking Frauds
Chapter 21: Google Store
Chapter 22: British Airways
Chapter 23: Target Data Breach
Chapter 24: TJ Maxx's Data Breach
Part 8: Black Mail-Hacktivism
Chapter 25: Ashley Madison
Chapter 26: Dark Web Hosting Provider Hack
Part 9: Conclusion
Chapter 27: Factors Shaping Vulnerable Behaviors
Index
Acknowledgments
About the author
Introduction
Part 1: Human and Motivation
Chapter 1: Human Agents
Chapter 2: Cyberattackers versus Hackers
Chapter 3: Cyberattackers' Motivations
Part 2: Cyberwar and Cyberespionage
Chapter 4: SolarWinds
Chapter 5: Pegasus Spyware
Chapter 6: Google Chrome Extension Spyware
Chapter 7: Marriott International
Part 3: Sabotage
Chapter 8: Stuxnet
Chapter 9: Colonial Pipelines
Chapter 10: Ukrainian Power Grid Hack
Part 4: Fake News Shaping People's Opinions
Chapter 11: Facebook-Cambridge Analytica
Chapter 12: Instagram
Part 5: Data Privacy
Chapter 13: Baidu Android Apps
Chapter 14: Zoom
Chapter 15: LinkedIn
Chapter 16: Spotify
Part 6: Trust
Chapter 17: Uber Technologies
Chapter 18: Equifax
Chapter 19: Office of Personnel Management Data
Part 7: Financial Cybercrimes
Chapter 20: Emulators-Mobile Banking Frauds
Chapter 21: Google Store
Chapter 22: British Airways
Chapter 23: Target Data Breach
Chapter 24: TJ Maxx's Data Breach
Part 8: Black Mail-Hacktivism
Chapter 25: Ashley Madison
Chapter 26: Dark Web Hosting Provider Hack
Part 9: Conclusion
Chapter 27: Factors Shaping Vulnerable Behaviors
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Inteligência e raciocínio
- Ergonómica
- Fraudes com computadores e hacking
- Privacidade e protecção de dados
- Engenahria civil, levantamentos e construção
- Aspectos jurídicos da Tecnologia Informática
- Engenharia: geral
- Aspectos sanitários e de segurança da computação
- Saude e segurança ocupacional / industrial
- Ciência da Computação