Cybersecurity and Cognitive Science
- 1st Edition - May 27, 2022
- Editor: Ahmed Moustafa
- Language: English
- Paperback ISBN:9 7 8 - 0 - 3 2 3 - 9 0 5 7 0 - 1
- eBook ISBN:9 7 8 - 0 - 3 2 3 - 9 0 6 9 6 - 8
Cybersecurity and Cognitive Science provides the reader with multiple examples of interactions between cybersecurity, psychology and neuroscience. Specifically, reviewing curren… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteCybersecurity and Cognitive Science provides the reader with multiple examples of interactions between cybersecurity, psychology and neuroscience. Specifically, reviewing current research on cognitive skills of network security agents (e.g., situational awareness) as well as individual differences in cognitive measures (e.g., risk taking, impulsivity, procrastination, among others) underlying cybersecurity attacks. Chapters on detection of network attacks as well as detection of cognitive engineering attacks are also included. This book also outlines various modeling frameworks, including agent-based modeling, network modeling, as well as cognitive modeling methods to both understand and improve cybersecurity.
- Outlines cognitive modeling within cybersecurity problems
- Reviews the connection between intrusion detection systems and human psychology
- Discusses various cognitive strategies for enhancing cybersecurity
- Summarizes the cognitive skills of efficient network security agents, including the role of situational awareness
Researchers in psychology who study human. Professionals in computer science, engineering, tech development, cyber security, and policy-making
- Cover image
- Title page
- Table of Contents
- Copyright
- Contributors
- Part I: Social engineering, security, and cyber attacks
- Chapter 1: Social engineering attacks and defenses in the physical world vs. cyberspace_ A contrast study
- Abstract
- Acknowledgments
- 1: Introduction
- 2: Terminology and methodology
- 3: Characterizing social engineering attack model, techniques, and defenses in the physical world
- 4: Characterizing social engineering attack model, techniques, and defenses in cyberspace
- 5: Contrast analysis
- 6: Conclusions
- References
- Chapter 2: A dual integrated dynamic intrusion detection system (DID-IDS) for protection against network and social engineering attacks
- Abstract
- 1: Introduction
- 2: Detection of information system and social engineering intrusion attacks
- 3: Prior computer system intrusion detection systems
- 4: Prior social engineering intrusion detection methods
- 5: A new dual integrated dynamic intrusion detection system (DID-IDS)
- References
- Chapter 3: Working from home users at risk of COVID-19 ransomware attacks
- Abstract
- 1: Introduction
- 2: Overview of ransomware
- 3: Challenges and issues with ransomware
- 4: Ransomware attack vectors
- 5: Existing defense mechanism and control gaps
- 6: Mitigation model against ransomware
- 7: Regular and consistent data backup
- 8: Conclusion
- References
- Chapter 4: Individual differences in cyber security behavior using personality-based models to predict susceptibility to sextortion attacks
- Abstract
- 1: Introduction
- 2: Social engineering and cyber sextortion
- 3: Personality-based models
- 4: Current study
- 5: Method
- 6: Results
- 7: Discussion
- 8: Conclusion
- References
- Chapter 5: Deconstructing security and privacy issues: The development of a logic for capturing mismorphisms
- Abstract
- 1: Introduction
- 2: A brief background on semiotics
- 3: A semiotic model for mismorphisms
- 4: Beyond semiotic triads
- 5: A logic for mismorphisms
- 6: A preliminary catalog of mismorphisms
- 7: Future work
- 8: Conclusion
- References
- Part II: Behavioral studies of cybersecurity
- Chapter 6: Are you anonymous? Social-psychological processes of hacking groups
- Abstract
- 1: Introduction
- 2: Context
- 3: Social identity
- 4: Interpersonal perception
- 5: Group processes
- 6: Informed decision making
- 7: Conclusion
- References
- Chapter 7: On the relation between hacking and autism or autistic traits: A systematic review of the scientific evidence
- Abstract
- 1: Introduction
- 2: Methods
- 3: Results
- 4: Conclusions and future directions
- References
- Further reading
- Chapter 8: An introduction to cyberbullying
- Abstract
- 1: A brief overview of traditional bullying
- 2: The emergence of digital technologies and cyberbullying
- 3: Definitional issues of cyberbullying
- 4: Unique features of cyberbullying
- 5: The different forms of cyberbullying
- 6: The prevalence of cyberbullying
- 7: The impact of cyberbullying
- 8: Conclusion
- References
- Chapter 9: The impact of cyberbullying across the lifespan
- Abstract
- 1: Introduction
- 2: The impact of involvement in cyberbullying during the elementary years
- 3: The impact of involvement in cyberbullying during adolescence
- 4: The impact of involvement in cyberbullying during emerging adulthood
- 5: The impact of involvement in cyberbullying during adulthood
- 6: Challenges associated with understanding the impact of cyberbullying
- 7: Conclusion
- References
- Chapter 10: Cyber situational awareness issues and challenges
- Abstract
- Acknowledgments
- 1: Introduction
- 2: The technological perspective
- 3: The socio-cognitive perspective
- 4: The organizational perspective
- 5: Reasoning about adversarial behavior
- 6: Research directions
- 7: Conclusions
- Appendix A: Interview methodology
- References
- Chapter 11: Development and application of the Information Security Core Human Error Causes (IS-CHEC) technique
- Abstract
- 1: Introduction
- 2: IS-CHEC technique
- 3: General discussion
- 4: Conclusions and future work
- References
- Part III: Machine learning and modeling applications to cybersecurity
- Chapter 12: Machine learning for the security of healthcare systems based on Internet of Things and edge computing
- Abstract
- Acknowledgments
- 1: Big data in health care
- 2: Privacy-preserving machine learning
- 3: Securing IoMT from ML-based attacks
- References
- Chapter 13: Lying trolls: Detecting deception and text-based disinformation using machine learning
- Abstract
- 1: Introduction
- 2: Related work
- 3: Methodology
- 4: Results and analysis
- 5: Conclusion
- References
- Chapter 14: Modeling the effects of network size in a deception game involving honeypots
- Abstract
- 1: Introduction
- 2: Deception game
- 3: Experiment
- 4: Results
- 5: The IBL model
- 6: Discussion
- References
- Chapter 15: Computational modeling of decisions in cyber-security games in the presence or absence of interdependence information
- Abstract
- Acknowledgment
- 1: Introduction
- 2: Background
- 3: Experiment
- 4: Results
- 5: The IBL model
- 6: Execution of IBL model in the security game
- 7: Results
- 8: Discussion
- 9: Conclusion
- References
- Index
- No. of pages: 400
- Language: English
- Edition: 1
- Published: May 27, 2022
- Imprint: Academic Press
- Paperback ISBN: 9780323905701
- eBook ISBN: 9780323906968
AM
Ahmed Moustafa
Dr. Ahmed Moustafa is a Professor of Psychology and Computational Modeling at School of Psychology, Bond University, Gold Coast, Queensland, Australia. Prior to moving to Bond University, Ahmed was an associate professor in Psychology and Neuroscience at Marcs Institute for Brain, Behavior, and Development & School of Psychology, Western Sydney University. Ahmed is trained in computer science, psychology, neuroscience, and cognitive science. His early training took place at Cairo University in mathematics and computer science. Before joining Western Sydney University as a lab director, Ahmed spent 11 years in America working on several psychology and neuroscience projects. Ahmed conducts research on computational and neuropsychological studies of addiction, schizophrenia, Parkinson’s disease, PTSD, depression, Alzheimer’s disease. He has published over 240 papers in high-ranking journals including Science, PNAS, Journal of Neuroscience, Brain, Neuroscience and Biobehavioral Reviews, Nature (Parkinson’s disease), Neuron, among others. Ahmed has obtained grant funding from Australia, USA, Qatar, UAE, Turkey, and other countries. Ahmed has recently published ten books: (1) Computational models of brain and behavior; (2) Social Cognition in Psychosis, (3) computational Neuroscience Models of the Basal Ganglia, (4) Cognitive, Clinical, and Neural Aspects of Drug Addiction; (5) The Nature of Depression: An updated review; (6) Big data in psychiatry and neurology; (7) Alzheimer’s Disease: Understanding Biomarkers, Big Data, and Therapy. Elsevier; (8) Cognitive and Behavioral Dysfunction in Schizophrenia; (9) Female Pioneers from Ancient Egypt and the Middle East; and (10) Mental health effects of COVID-19. In the last 10 years, Ahmed has published collaboratively with 71 colleagues, has more than 510 co-authors, from 35 institutions in 14 countries. Ahmed is now Editor-in-Chief of Discover Psychology, a new journal by Springer Nature.
Affiliations and expertise
School of Psychology, Faculty of Society and Design, Bond University, Gold Coast, Queensland, AustraliaRead Cybersecurity and Cognitive Science on ScienceDirect