• Complain

Terry Bossomaier - Human Dimensions of Cybersecurity

Here you can read online Terry Bossomaier - Human Dimensions of Cybersecurity full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: CRC Press, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

Human Dimensions of Cybersecurity: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Human Dimensions of Cybersecurity" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see many hazards in cybersecurity. It emphasizes the need for a multidisciplinary approach, as cybersecurity has become a fundamental issue of risk management for individuals, at work, and with government and nation states.This book explains the issues of cybersecurity with rigor, but also in simple language, so individuals can see how they can address these issues and risks. The book provides simple suggestions, or cybernuggets, that individuals can follow to learn the dos and donts of cybersecurity.The book also identifies the most important human and social factors that affect cybersecurity. It illustrates each factor, using case studies, and examines possible solutions from both technical and human acceptability viewpoints.

Terry Bossomaier: author's other books


Who wrote Human Dimensions of Cybersecurity? Find out the surname, the name of the author of the book and a list of all author's works by series.

Human Dimensions of Cybersecurity — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Human Dimensions of Cybersecurity" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Human Dimensions of Cybersecurity CRC Press Taylor Francis Group 6000 Broken - photo 1
Human Dimensions of
Cybersecurity

CRC Press

Taylor & Francis Group

6000 Broken Sound Parkway NW, Suite 300

Boca Raton, FL 33487-2742

2020 by Taylor & Francis Group, LLC

CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

International Standard Book Number-13: 978-1-138-59040-3 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

Library of Congress Cataloging-in-Publication Data

Names: Bossomaier, Terry R. J. (Terry Richard John), author. |

DAlessandro, Steven, author. | Bradbury, R. H. (Roger H.), author.

Title: Human dimensions of cybersecurity / by Terry Bossomaier, Steven

DAlessandro, Roger Bradbury.

Description: Boca Raton : CRC Press, [2020] | Includes bibliographical

references and index. | Summary: The book identifies the technological

features that give rise to security issues. It describes the structure

of the Internet and how it is compromised by malware, and examines some

of the more common security issues. It then looks at aspects of human

persuasion and consumer choice, and how these affect cyber security. It

argues that social networks and the related norms play a key role as

does government policy, as each impact on individual behavior of

computer use. The book identifies the most important human and social

factors that affect cybersecurity. It illustrates each factor using case

studies, and examines possible solutions from both technical and human

acceptability viewpoints Provided by publisher.

Identifiers: LCCN 2019038924 (print) | LCCN 2019038925 (ebook) |

ISBN 9781138590403 (hardback) | ISBN (ebook)

Subjects: LCSH: Computer securityCase studies. | Computer

securitySocial aspects. | Computer networksSecurity measures. |

Data protection. | Computer securityGovernment policy.

Classification: LCC QA76.9.A25 B6395 2020 (print) | LCC QA76.9.A25

(ebook) | DDC 005.8dc23

LC record available at https://lccn.loc.gov/2019038924

LC ebook record available at https://lccn.loc.gov/2019038925

Visit the Taylor & Francis Web site at

http://www.taylorandfrancis.com

and the CRC Press Web site at

http://www.crcpress.com

Professor Paul Cornish
Visiting Professor, LSE IDEAS, London School of Economics
Editor, The Oxford Handbook to Cyber Security (Oxford University Press,
forthcoming 2020)
Associate Director, Global Cyber Security Capacity Centre, University of
Oxford (201318)

Cybersecurity has several dimensions and characteristics. The first, the most obvious and the most important of these, is that cybersecurity is concerned with an environment that is not natural, but man-made. In other words, this environment, which we know as cyberspace, is an artifact, defined in the Concise Oxford Dictionary as a product of human art and workmanship. For all its technological sophistication, which many of us can scarcely comprehend, cyberspace is essentially human. Cyberspace was invented, developed, and is validated by human beings: by men and women who devised ways to encode and decode and encrypt and decrypt vast amounts of information at extraordinary speed; by people who could design and build a global digital communication infrastructure; by experts who can maintain cyberspace as a system of networks and processes and who constantly find ways to improve and develop that system; and by the ever-increasing proportion of humanity who use cyberspace in many aspects of our daily life. And we should not forget that there are also more than enough people devoting substantial time and resources to subvert this system for various malign reasons. Another distinctive feature of cybersecurity is that it is a discussion that never stands still; it evolves very rapidly, while our ideas about the proper governance, management, security, and safety of cyberspace often seem to move at a glacially slow pace at best. But whenever the technology seems just too bewildering, the pace of change just too uncomfortable, and our security just a little too precarious, it is vital that we remember the importance of our own, human agency (both constructive and destructive). Unlike the natural environments of land, sea, air, and outer space, cyberspace is our own work in progress; humans are in charge and, for the time being at least, we make the decisions.

Cybersecurity is concerned with the avoidance, management, and mitigation of riskthe risk of harm and damage that might occur as the result of everything, from individual carelessness to organized criminality, to industrial and national security espionage and, at the extreme end of the scale, to disabling attacks against a countrys critical national infrastructure. But as any university lecture on international and national security would point out, the pursuit of security from financial loss, physical damage, etc., should not be seen as an end in itself. Security must also be for something; more than simply the avoidance of risk, security is also the maximization of benefit. This important point is often explained by analogy: we lock our front door to protect our house, ourselves, and our property from thieves and predators. But we dont do this because we see ourselves as an arm of law enforcement: we do so in order that we can enjoy what we have, live as we choose and grow as we need. Securityincluding cybersecurityis protective, but it is also liberating and enabling. This applies at every levelindividually, nationally, and globally. The central purpose of cyber-security could not therefore be clearer or more positiveand, again, it could hardly be more human.

Finally, it is because cyberspace is technologically sophisticated, because it reaches into everything that we do, and because it affects individual freedom, quality of life, and fulfilment that we need a rounded, inclusive approach to our understanding and management of it. Just as Georges Clemenceau once quipped that war is too important to be left to military men, so we might say, rather dismissively perhaps, that cyberspace is too important to be left to computer scientists. But what Clemenceau probably meant was that generals were a necessary yet not sufficient component of any reasonable and useful discussion of war and all that it entails. Something similar can be said of cybersecurity. It would be just as absurd for nonscientific users of cyberspace (i.e., most of humanity) to ignore the science of cyberspace (perhaps on the grounds that its too difficult to understand or moves too fast) as it would be for computer scientists, mathematicians, and physicists to insist that the social sciences (such as politics, sociology, economics, psychology, and development studies) have nothing useful to say about cyberspace and generate questions that are little more than derivative.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Human Dimensions of Cybersecurity»

Look at similar books to Human Dimensions of Cybersecurity. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Human Dimensions of Cybersecurity»

Discussion, reviews of the book Human Dimensions of Cybersecurity and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.