Buch, Englisch, 382 Seiten, Format (B × H): 161 mm x 240 mm, Gewicht: 740 g
Buch, Englisch, 382 Seiten, Format (B × H): 161 mm x 240 mm, Gewicht: 740 g
ISBN: 978-1-032-81644-9
Verlag: CRC Press
This book takes readers on a captivating journey through the history of social engineering, tracing its evolution from the mechanical marvels of the clockwork era and the rise of automata to the modern age of artificial intelligence and the looming dawn of quantum computing. It explores how social engineering tactics have adapted alongside technological advancements, exploiting human psychology and vulnerabilities across every era.
Social Cyber Engineering and Advanced Security Algorithms delves into the intricate connections between human behavior, evolving technology, and the ever-changing landscape of cybersecurity. It examines how personal and psychological factors can be exploited in cyberattacks, providing real-world examples and case studies to illustrate these vulnerabilities. Beyond highlighting the challenges, the book offers proactive strategies and potential solutions for organizations and policymakers to navigate this complex terrain. It emphasizes the importance of algorithmic resilience in employee categorization and training and explores the transformative potential of quantum computing in bridging mental health and cybersecurity.
This book serves as a guide for computer scientists, engineers, and professionals interested in understanding the intricate relationship between human behavior, technology, and security in the digital age. It offers a unique perspective on the past, present, and future of social engineering, providing valuable insights for anyone seeking to build a more secure and resilient digital world.
Zielgruppe
Postgraduate, Professional Reference, Professional Training, and Undergraduate Advanced
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1 Personal Security in the Era of Mechanical Marvels: A Historical Perspective
Chapter 2 Individual Cybersecurity in the Era of Digital Computing and the Internet
Chapter 3 Individual Security in the Era of Algorithmic and Artificial Intelligence Advancements
Chapter 4 Algorithmic Insights into the Nexus of Interpersonal Mental Challenges and Social Engineering
Chapter 5 Quantum Breakthrough: Revolutionizing the Historical Challenge of Social Cyber Engineering
Chapter 6 Influence of Multitasking on the Rise of Social Engineering Attacks
Chapter 7 Influence of Surveillance on the Rise of Social Engineering Attacks
Chapter 8 Influence of Cannabis and Drugs on the Rise of Social Engineering Attacks
Chapter 9 Influence of Aging on the Rise of Social Engineering Attacks
Chapter 10 Influence of Depression and Anxiety on the Rise of Social Engineering Attacks
Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of Social Engineering Attacks
Chapter 12 Influence of Bipolar Disorder on the Rise of Social Engineering Attacks
Chapter 13 Influence of Alzheimer’s, Dementia, and PTSD on the Rise of Social Engineering Attacks
Chapter 14 Influence of Pandemic on the Rise of Social Engineering Attacks
Chapter 15 Impacts of Discrimination in Cyber Social Engineering Systems
Chapter 16 Mind Games in the Digital Playground: The Rising Threat of Social Engineering in Online Gaming and the Technological Challenges in Detection
Chapter 17 Digital Surveillance and Trust Erosion
Chapter 18 Virtual Reality and Its Impact on Social Trust
Chapter 19 Augmented Reality and Its Impact on Social and Interpersonal Trust
Chapter 20 Navigating the Intersection of Digital Marketing, Intelligent Advertising with Interpersonal Trust
Chapter 21 Cryptocurrency Markets and Interpersonal Trust, Escalating Social Engineering Risks, and the Technological Challenges in Detection
Chapter 22 A Brief Overview of the Benefits of Implementing Quantum Algorithms in Factorizing Cyber Social Engineering Threats
Chapter 23 A Brief Overview of the Benefits of Implementing Quantum Applications in Factorizing Cyber Social Engineering Threats
Chapter 24 Introduction to Hybrid Structures of the Quantum Probability Theory in Social Engineering
Chapter 25 Introduction to the Quantum Structures of the Fuzzy Set in Cyber Social Engineering Systems
Chapter 26 Introduction to Quantum Logic and Automata Theory in Cyber Social Engineering Systems
Chapter 27 Introduction to Quantum Parallelism and Classical Computation in Cyber Social Engineering Systems




