Social Cyber Engineering and Advanced Security Algorithms
eBook - ePub

Social Cyber Engineering and Advanced Security Algorithms

  1. 296 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Social Cyber Engineering and Advanced Security Algorithms

About this book

This book takes readers on a captivating journey through the history of social engineering, tracing its evolution from the mechanical marvels of the clockwork era and the rise of automata to the modern age of artificial intelligence and the looming dawn of quantum computing. It explores how social engineering tactics have adapted alongside technological advancements, exploiting human psychology and vulnerabilities across every era.

Social Cyber Engineering and Advanced Security Algorithms delves into the intricate connections between human behavior, evolving technology, and the ever-changing landscape of cybersecurity. It examines how personal and psychological factors can be exploited in cyberattacks, providing real-world examples and case studies to illustrate these vulnerabilities. Beyond highlighting the challenges, the book offers proactive strategies and potential solutions for organizations and policymakers to navigate this complex terrain. It emphasizes the importance of algorithmic resilience in employee categorization and training and explores the transformative potential of quantum computing in bridging mental health and cybersecurity.

This book serves as a guide for computer scientists, engineers, and professionals interested in understanding the intricate relationship between human behavior, technology, and security in the digital age. It offers a unique perspective on the past, present, and future of social engineering, providing valuable insights for anyone seeking to build a more secure and resilient digital world.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Social Cyber Engineering and Advanced Security Algorithms by Soorena Merat,Wehab Almuhtadi,Wahab Almuhtadi in PDF and/or ePUB format. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2025
eBook ISBN
9781040348086

Table of contents

  1. Cover Page
  2. Half-Title Page
  3. Title Page
  4. Copyright Page
  5. Contents
  6. About the authors
  7. Preface
  8. Chapter 1 Personal Security in the Era of Mechanical Marvels: A Historical Perspective
  9. Chapter 2 Individual Cybersecurity in the Era of Digital Computing and the Internet
  10. Chapter 3 Individual Security in the Era of Algorithmic and Artificial Intelligence Advancements
  11. Chapter 4 Algorithmic Insights into the Nexus of Interpersonal Mental Challenges and Social Engineering
  12. Chapter 5 Quantum Breakthrough: Revolutionizing the Historical Challenge of Social Cyber Engineering
  13. Chapter 6 Influence of Multitasking on the Rise of Social Engineering Attacks
  14. Chapter 7 Influence of Surveillance on the Rise of Social Engineering Attacks
  15. Chapter 8 Influence of Cannabis and Drugs on the Rise of Social Engineering Attacks
  16. Chapter 9 Influence of Aging on the Rise of Social Engineering Attacks
  17. Chapter 10 Influence of Depression and Anxiety on the Rise of Social Engineering Attacks
  18. Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of Social Engineering Attacks
  19. Chapter 12 Influence of Bipolar Disorder on the Rise of Social Engineering Attacks
  20. Chapter 13 Influence of Alzheimer's, Dementia, and PTSD on the Rise of Social Engineering Attacks
  21. Chapter 14 Influence of Pandemic on the Rise of Social Engineering Attacks
  22. Chapter 15 Impacts of Discrimination in Cyber Social Engineering Systems
  23. Chapter 16 Mind Games in the Digital Playground: The Rising Threat of Social Engineering in Online Gaming and the Technological Challenges in Detection
  24. Chapter 17 Digital Surveillance and Trust Erosion
  25. Chapter 18 Virtual Reality and Its Impact on Social Trust
  26. Chapter 19 Augmented Reality and Its Impact on Social and Interpersonal Trust
  27. Chapter 20 Navigating the Intersection of Digital Marketing, Intelligent Advertising with Interpersonal Trust
  28. Chapter 21 Cryptocurrency Markets and Interpersonal Trust, Escalating Social Engineering Risks, and the Technological Challenges in Detection
  29. Chapter 22 A Brief Overview of the Benefits of Implementing Quantum Algorithms in Factorizing Cyber Social Engineering Threats
  30. Chapter 23 A Brief Overview of the Benefits of Implementing Quantum Applications in Factorizing Cyber Social Engineering Threats
  31. Chapter 24 Introduction to Hybrid Structures of the Quantum Probability Theory in Social Engineering
  32. Chapter 25 Introduction to the Quantum Structures of the Fuzzy Set in Cyber Social Engineering Systems
  33. Chapter 26 Introduction to Quantum Logic and Automata Theory in Cyber Social Engineering Systems
  34. Chapter 27 Introduction to Quantum Parallelism and Classical Computation in Cyber Social Engineering Systems
  35. Conclusion
  36. Index