Deception in the Digital Age :Exploiting and Defending Human Targets through Computer-Mediated Communications

Publication subTitle :Exploiting and Defending Human Targets through Computer-Mediated Communications

Author: Malin   Cameron H.;Gudaitis   Terry;Holt   Thomas  

Publisher: Elsevier Science‎

Publication year: 2017

E-ISBN: 9780124116399

P-ISBN(Paperback): 9780124116306

Subject: D919 法医学;TP301.6 algorithm theory;TP309 安全保密;TP31 computer software

Keyword: 法医学,计算机软件,算法理论,安全保密

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception—and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience’s perceptions and beliefs.

The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks—and conversely postmortem insight about attackers—presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics.

Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

  • Deeply examines the psychology of deception through the lens of misdirection and other techniques used by master magicians
  • Explores cognitive vulnerabilities that cyber attackers use to exploit human targets
  • Dissects the underpinnings and elements of deception narratives
  • Examines group dynamics and deception factors in cyber attacker underground markets
  • Provides deep

Chapter

Acknowledgments

Introduction: Cyberanthropology of Deception

The Digital Evolution: Cyberanthropology of Deception

How to Use This Book

References

1 - The Psychology of Deception

Misdirection and the Psychological Principles Behind Effective Magic

Active and Passive Misdirection: Factors Toward Influence by Suggestion

General, Particular, and Post Misdirection

Misdirection Through Disguise and Attention Control

Physical and Psychological Misdirection

Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection

Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal

Misdirection Through Distraction, Diversion, or Relaxation

Degrees of Misdirection

Magician’s Weapons of Deception

Direct Forcing

Indirect Forcing

Magic, Illusion, and the Prevalence of Deception

Neuropsychology of Magic and Deception

Early Attempts at Explaining Digital Deception

Traditional Deception Research via Verbal and Nonverbal Cues

Deception Detection Through the Analysis of Words and Images

Deception Through the Practice of Social Engineering

The Psychology of Deception

Summary

References

2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings

Urban Myths and Legends

Elements of Urban Legends

Urban Myths Online

Traditional Chain Letters

Hoax Messages

Scare Chains

Threat Chains

Weaponizing Online Urban Legends, Hoaxes, and Chain Communications

Defending Against Online Urban Legends, Chains, and Hoax Communications

Element Analysis

Open Source Intelligence Analysis

References

3 - Viral Influence: Deceptive Computing Attacks Through Persuasion

Psychological Principles of Influence

Factors, Sequence, and Timing of Persuasive Communications

Dual Process Models

The Yale Information Processing Model

The Objectives of Persuasive Communications

Social Influence and Persuasion in Computer-Mediated Communications

Social Influence Over Computer-Mediated Communications and Digital Platforms

Adapting Traditional Social Cues Communicator Salience

Persuasive Technology

Deceptive Computing Attacks Through Persuasion

Hoax Virus Communications

Principles of Persuasion in Hoax Virus Narratives

Scareware

Principles of Persuasion in Scareware Attack “Storyboards”

Tech Support Scams

Principles of Persuasion in Tech Support Scam “Storyboards”

Ransomware

Principles of Persuasion in Ransomware Attacks

The Future of Viral Influence

Conclusion

References

4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures

Social Dynamics in Computer-Mediated Communications

The Process of Buying and Selling

Trust Inducing Mechanisms

Subcultural Norms and the Role of Trust

No Honor Among Cyber Thieves: Deception Within Underground Markets

Virtual False Flags

Sock Puppets

Persuasive Technology

Impersonation

Attacking Trust Within Underground Markets

References

5 - Phishing, Watering Holes, and Scareware

Phishing

Watering Hole Attacks (Strategic Web Compromises)

The Watering Hole Attack Deception Chain

Passive Misdirection

Technical Persuasion

Scareware

Ransomware

Social Engineering

References

6 - Seeing is Not Believing: Deceptive Internet Video Communications

A Bit of History

One of Photography’s Early Deceptions

Film Fakes

Video Software and Tools

Deciphering Fantasy From Reality

Alternative Perspectives and Augmented Reality

Going on the Offensive: Deceiving Video

References

7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative

Introduction

Al Qaeda: Reinvigorating Cyber Jihad

ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State

ISIS and the Evolution of Sophisticated Online Propaganda

Cyber Jihad and Digital Deception

Summary

References

8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks

The Role of Nation State Versus Non-nation State Attacks

China: Enter the Digital Dragon

From Cyber Nationalism to Cyber Espionage

Virtual “No-Flag” Operations: Non-nation State Cover and Concealment

Cyberwar and the Nation State

Future of Nation State Cyber Conflict

Summary

References

9 - Sweet Deception: Honeypots

Introduction

A Bit of History

Honeypots and Honeynets

Honeytokens

Summary

References

10 - Looking Forward: Deception in the Future

False Online Communities

Disruptive Technology

Holograms

Nanotechnology and Quantum Stealth

Advanced Drones

Neurohacking/Neuromarketing and Texting by Thinking

The Man in the Middle Conundrum

The Impact on Humans and Psychology

References

Index

A

B

C

D

E

F

G

H

I

L

M

N

O

P

Q

R

S

T

U

V

W

Y

Back Cover

The users who browse this book also browse