The Weakest Link Ebook Tooltip Ebooks kunnen worden gelezen op uw computer en op daarvoor geschikte e-readers. How to Diagnose, Detect, and Defend Users from Phishing
Afbeeldingen
Sla de afbeeldingen overArtikel vergelijken
- Engels
- E-book
- 9780262371971
- 16 augustus 2022
- Adobe ePub
Samenvatting
An expert in cybersecurity lays out an evidence-based approach for assessing user cyber risk and achieving organizational cyber resilience.
Phishing is the single biggest threat to cybersecurity, persuading even experienced users to click on hyperlinks and attachments in emails that conceal malware. Phishing has been responsible for every major cyber breach, from the infamous Sony hack in 2014 to the 2017 hack of the Democratic National Committee and the more recent Colonial Pipleline breach. The cybersecurity community’s response has been intensive user training (often followed by user blaming), which has proven completely ineffective: the hacks keep coming. In The Weakest Link, cybersecurity expert Arun Vishwanath offers a new, evidence-based approach for detecting and defending against phishing—an approach that doesn’t rely on continual training and retraining but provides a way to diagnose user vulnerability.
Vishwanath explains how organizations can build a culture of cyber safety. He presents a Cyber Risk Survey (CRS) to help managers understand which users are at risk and why. Underlying CRS is the Suspicion, Cognition, Automaticity Model (SCAM), which specifies the user thoughts and actions that lead to either deception by or detection of phishing come-ons. He describes in detail how to implement these frameworks, discussing relevant insights from cognitive and behavioral science, and then presents case studies of organizations that have successfully deployed the CRS to achieve cyber resilience. These range from a growing wealth management company with twenty regional offices to a small Pennsylvania nonprofit with forty-five employees.
The Weakest Link will revolutionize the way managers approach cyber security, replacing the current one-size-fits-all methodology with a strategy that targets specific user vulnerabilities.
Productspecificaties
Inhoud
- Taal
- en
- Bindwijze
- E-book
- Oorspronkelijke releasedatum
- 16 augustus 2022
- Ebook Formaat
- Adobe ePub
- Illustraties
- Met illustraties
Betrokkenen
- Hoofdauteur
- Arun Vishwanath
- Hoofduitgeverij
- The Mit Press
Lees mogelijkheden
- Lees dit ebook op
- Desktop (Mac en Windows) | Kobo e-reader | Android (smartphone en tablet) | iOS (smartphone en tablet) | Windows (smartphone en tablet)
Overige kenmerken
- Studieboek
- Nee
EAN
- EAN
- 9780262371971
Je vindt dit artikel in
- Categorieën
- Taal
- Engels
- Beschikbaarheid
- Leverbaar
- Boek, ebook of luisterboek?
- Ebook
- Studieboek of algemeen
- Algemene boeken
Kies gewenste uitvoering
Prijsinformatie en bestellen
De prijs van dit product is 19 euro en 99 cent.- E-book is direct beschikbaar na aankoop
- E-books lezen is voordelig
- Dag en nacht klantenservice
- Veilig betalen
Rapporteer dit artikel
Je wilt melding doen van illegale inhoud over dit artikel:
- Ik wil melding doen als klant
- Ik wil melding doen als autoriteit of trusted flagger
- Ik wil melding doen als partner
- Ik wil melding doen als merkhouder
Geen klant, autoriteit, trusted flagger, merkhouder of partner? Gebruik dan onderstaande link om melding te doen.