
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
This book takes a fresh look at the underappreciated role of human psychology in cybersecurity and information technology management. It discusses the latest insights from practice and scholarly work on the role of cognitive bias and human factors in critical decisions that could affect the lives of many people.
Written by an experienced chief information security officer (CISO) and an academic with over two decades of lived experience dealing with cybersecurity risks, this book considers the psychological drivers and pitfalls of the four key personas in cybersecurity – from hackers and defenders, to targeted individuals and organisational leaders. It bridges state-of-the-art research findings with real-world examples and case studies to show how understanding the psychological factors in cybersecurity can help people protect themselves and their organisations better.
Full of advice on security best practices that consider the human element of cybersecurity, this book will be of great interest to professionals and managers in the cybersecurity domain, information technology, and governance and risk management. It will also be relevant to students and those aspiring to grow in this field.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Table of Contents
- Foreword
- Part 1 Enter the world of cybercrime
- Part 2 Inside the line of defence
- Part 3 The target’s perspective
- Part 4 The Psychology of a Chief Information Security Officer (CISO)
- Glossary
- Index