Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science
Patterson W., Winston-Proctor C., CRC Press, USA, 2019. 261 pp. Type: Book (978-1-138617-78-0)
Date Reviewed: Jun 21 2022

It is a well-known fact that the weakest element of all cryptographic systems is a human being. No matter how smart mathematical methods are embedded to protect our network and computer infrastructures, nor how precisely we design the precautionary procedures, they will be considerably weakened by careless and unaware users. This book provides some useful information on this phenomenon.

The book is composed of many very short chapters (27 overall) covering various aspects of cybersecurity. They do not follow, consequently, the suggestion given by the title of the book, since some of the chapters simply present basic material on the fundamentals of cybersecurity infrastructures. Nevertheless, I like how the classical cybersecurity material is interwoven with some concepts on how psychological research might deepen our understanding of the area. The book covers the following topics: an introduction to the most fundamental notions and concepts of both cybersecurity and behavioral sciences, as well as the relationships between them (including, for instance, profiling and social engineering), popular attacks with notable stories, access control (with authorization), basics of symmetric and asymmetric cryptography systems (with some mathematical treatment), along with steganography, usage of game theory in cybersecurity, ethical hacking, understanding human behavior and behavioral economics, and also many minor topics.

I appreciate the idea that the book is authored by a specialist in cybersecurity and an expert in human behavior. Thus, both aspects dealt with in the text are properly covered and balanced. In fact, although the title suggests one of many aspects of cybersecurity, the work can be read as a general introduction to the topic. Maybe not as a regular textbook per se, but for sure a beginner’s guide to the issue, for instance, a high school student interested in general computer science. On the other hand, any Internet users interested in protecting themselves should read this kind of work. Interested readers will find a list of various positions related to each of the chapters to make it possible to extend the contents. These positions do not embrace only scientific literature. Additionally, comprehension of the provided data is strengthened by the lists of interesting problems given at the end of the chapters. They also encourage readers to actively seek out additional information to extend their understanding.

The book is full of stories and anecdotes. This way, the content is conveyed in a vivid and attention-grabbing manner. It is a good starting point for one’s journey into the world of cybersecurity.

Reviewer:  Piotr Cholda Review #: CR147457 (2209-0128)
Bookmark and Share
  Featured Reviewer  
 
Security (K.6.m ... )
 
 
Psychology (J.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security": Date
An intrusion-detection model
Denning D. IEEE Transactions on Software Engineering SE-13(2): 222-232, 1987. Type: Article
Oct 1 1987
Data security and confidentiality in Europe
Chamoux J. Computers and Security 4(3): 207-210, 1985. Type: Article
Feb 1 1986
Designing information systems security
Baskerville R., John Wiley & Sons, Inc., New York, NY, 1988. Type: Book (9780471917724)
May 1 1989
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy