Deception in the Digital Age

Exploiting and Defending Human Targets through Computer-Mediated Communications
 
 
Elsevier (Verlag)
  • 1. Auflage
  • |
  • erschienen am 30. Juni 2017
  • |
  • 284 Seiten
 
E-Book | ePUB mit Adobe-DRM | Systemvoraussetzungen
E-Book | PDF mit Adobe-DRM | Systemvoraussetzungen
978-0-12-411639-9 (ISBN)
 

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs.

The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks-and conversely postmortem insight about attackers-presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics.

Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

  • Deeply examines the psychology of deception through the lens of misdirection and other techniques used by master magicians
  • Explores cognitive vulnerabilities that cyber attackers use to exploit human targets
  • Dissects the underpinnings and elements of deception narratives
  • Examines group dynamics and deception factors in cyber attacker underground markets
  • Provides deep coverage on how cyber attackers leverage psychological influence techniques in the trajectory of deception strategies
  • Explores the deception strategies used in today's threat landscape-phishing, watering hole, scareware and ransomware attacks
  • Gives unprecedented insight into deceptive Internet video communications
  • Delves into the history and deception pathways of nation-state and cyber terrorism attackers
  • Provides unique insight into honeypot technologies and strategies
  • Explores the future of cyber deception


Cameron H. Malin is a Certified Ethical Hacker (C|EH) and Certified Network Defense Architect (C|NDA) as designated by the International Council of Electronic Commerce Consultants (EC-Council); a GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Forensic Analysis (GCFA), a GIAC Certified Incident Handler (GCIH), GIAC Certified Reverse Engineering Malware professional (GREM), GIAC Penetration Tester (GPEN), and GIAC Certified Unix Security Administrator (GCUX) as designated by the SANS Institute; and a Certified Information Systems Security Professional (CISSP), as designated by the International Information Systems Security Certification Consortium ((ISC)2®).

From 1998 through 2002, Mr. Malin was an Assistant State Attorney (ASA) and Special Assistant United States Attorney in Miami, Florida, where he specialized in computer crime prosecutions. During his tenure as an ASA, he was also an Assistant Professorial Lecturer in the Computer Fraud Investigations Masters Program at George Washington University.

Mr. Malin is currently a Supervisory Special Agent with the Federal Bureau of Investigation assigned to the Behavioral Analysis Unit, Cyber Behavioral Analysis Center. He is also a Subject Matter Expert for the Department of Defense (DoD) Cyber Security & Information Systems Information Analysis Center and Defense Systems Information Analysis Center.

Mr. Malin is co-author of the Malware Forensics book series, Malware Forensics: Investigating and Analyzing Malicious Code, the Malware Forensics Field Guide for Windows Systems, and the Malware Forensics Field Guide for Linux Systems published by Syngress, an imprint of Elsevier, Inc.

The techniques, tools, methods, views, and opinions explained by Cameron Malin are personal to him, and do not represent those of the United States Department of Justice, the Federal Bureau of Investigation, or the government of the United States of America. Neither the Federal government nor any Federal agency endorses this book or its contents in any way.

  • Englisch
  • San Diego
  • |
  • USA
  • 7,20 MB
978-0-12-411639-9 (9780124116399)
weitere Ausgaben werden ermittelt
  • Front Cover
  • Deception in the Digital Age
  • Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications
  • Copyright
  • Dedication
  • Contents
  • About the Authors
  • Acknowledgments
  • Introduction: Cyberanthropology of Deception
  • The Digital Evolution: Cyberanthropology of Deception
  • How to Use This Book
  • References
  • 1 - The Psychology of Deception
  • Misdirection and the Psychological Principles Behind Effective Magic
  • Active and Passive Misdirection: Factors Toward Influence by Suggestion
  • General, Particular, and Post Misdirection
  • Misdirection Through Disguise and Attention Control
  • Physical and Psychological Misdirection
  • Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection
  • Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal
  • Misdirection Through Distraction, Diversion, or Relaxation
  • Degrees of Misdirection
  • Magician's Weapons of Deception
  • Direct Forcing
  • Indirect Forcing
  • Magic, Illusion, and the Prevalence of Deception
  • Neuropsychology of Magic and Deception
  • Early Attempts at Explaining Digital Deception
  • Traditional Deception Research via Verbal and Nonverbal Cues
  • Deception Detection Through the Analysis of Words and Images
  • Deception Through the Practice of Social Engineering
  • The Psychology of Deception
  • Summary
  • References
  • 2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings
  • Urban Myths and Legends
  • Elements of Urban Legends
  • Urban Myths Online
  • Traditional Chain Letters
  • Hoax Messages
  • Scare Chains
  • Threat Chains
  • Weaponizing Online Urban Legends, Hoaxes, and Chain Communications
  • Defending Against Online Urban Legends, Chains, and Hoax Communications
  • Element Analysis
  • Open Source Intelligence Analysis
  • References
  • 3 - Viral Influence: Deceptive Computing Attacks Through Persuasion
  • Psychological Principles of Influence
  • Factors, Sequence, and Timing of Persuasive Communications
  • Dual Process Models
  • The Yale Information Processing Model
  • The Objectives of Persuasive Communications
  • Social Influence and Persuasion in Computer-Mediated Communications
  • Social Influence Over Computer-Mediated Communications and Digital Platforms
  • Adapting Traditional Social Cues Communicator Salience
  • Persuasive Technology
  • Deceptive Computing Attacks Through Persuasion
  • Hoax Virus Communications
  • Principles of Persuasion in Hoax Virus Narratives
  • Scareware
  • Principles of Persuasion in Scareware Attack "Storyboards"
  • Tech Support Scams
  • Principles of Persuasion in Tech Support Scam "Storyboards"
  • Ransomware
  • Principles of Persuasion in Ransomware Attacks
  • The Future of Viral Influence
  • Conclusion
  • References
  • 4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures
  • Social Dynamics in Computer-Mediated Communications
  • The Process of Buying and Selling
  • Trust Inducing Mechanisms
  • Subcultural Norms and the Role of Trust
  • No Honor Among Cyber Thieves: Deception Within Underground Markets
  • Virtual False Flags
  • Sock Puppets
  • Persuasive Technology
  • Impersonation
  • Attacking Trust Within Underground Markets
  • References
  • 5 - Phishing, Watering Holes, and Scareware
  • Phishing
  • Watering Hole Attacks (Strategic Web Compromises)
  • The Watering Hole Attack Deception Chain
  • Passive Misdirection
  • Technical Persuasion
  • Scareware
  • Ransomware
  • Social Engineering
  • References
  • 6 - Seeing is Not Believing: Deceptive Internet Video Communications
  • A Bit of History
  • One of Photography's Early Deceptions
  • Film Fakes
  • Video Software and Tools
  • Deciphering Fantasy From Reality
  • Alternative Perspectives and Augmented Reality
  • Going on the Offensive: Deceiving Video
  • References
  • 7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative
  • Introduction
  • Al Qaeda: Reinvigorating Cyber Jihad
  • ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State
  • ISIS and the Evolution of Sophisticated Online Propaganda
  • Cyber Jihad and Digital Deception
  • Summary
  • References
  • 8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks
  • The Role of Nation State Versus Non-nation State Attacks
  • China: Enter the Digital Dragon
  • From Cyber Nationalism to Cyber Espionage
  • Virtual "No-Flag" Operations: Non-nation State Cover and Concealment
  • Cyberwar and the Nation State
  • Future of Nation State Cyber Conflict
  • Summary
  • References
  • 9 - Sweet Deception: Honeypots
  • Introduction
  • A Bit of History
  • Honeypots and Honeynets
  • Honeytokens
  • Summary
  • References
  • 10 - Looking Forward: Deception in the Future
  • False Online Communities
  • Disruptive Technology
  • Holograms
  • Nanotechnology and Quantum Stealth
  • Advanced Drones
  • Neurohacking/Neuromarketing and Texting by Thinking
  • The Man in the Middle Conundrum
  • The Impact on Humans and Psychology
  • References
  • Index
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • Y
  • Back Cover

Dateiformat: ePUB
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat ePUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie bei der Verwendung der Lese-Software Adobe Digital Editions: wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie bei der Verwendung der Lese-Software Adobe Digital Editions: wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

54,68 €
inkl. 5% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe-DRM
siehe Systemvoraussetzungen
PDF mit Adobe-DRM
siehe Systemvoraussetzungen
Hinweis: Die Auswahl des von Ihnen gewünschten Dateiformats und des Kopierschutzes erfolgt erst im System des E-Book Anbieters
E-Book bestellen