Book contents
- Security in the Cyber Age
- Reviews
- Security in the Cyber Age
- Copyright page
- Epigraph
- Contents
- Boxes
- Preface
- Acknowledgments
- Introduction
- 1 The Emergence of Cyberspace and Its Implications
- 2 From the Abacus to the Computer
- 3 Communicating through Cyberspace
- 4 The Human Dimensions of Cyberspace
- 5 Strategy and Cyberspace
- 6 Domestic Regulation of Cyberspace
- 7 Internet Governance and International Institutions
- 8 International Law and Norms in Cyberspace
- 9 Artificial Intelligence and Ethics
- 10 Conclusions and Future Directions of Cybersecurity Policy
- 11 Leading in the Cyber Age
- Glossary
- References
- Index
4 - The Human Dimensions of Cyberspace
Published online by Cambridge University Press: 02 November 2023
- Security in the Cyber Age
- Reviews
- Security in the Cyber Age
- Copyright page
- Epigraph
- Contents
- Boxes
- Preface
- Acknowledgments
- Introduction
- 1 The Emergence of Cyberspace and Its Implications
- 2 From the Abacus to the Computer
- 3 Communicating through Cyberspace
- 4 The Human Dimensions of Cyberspace
- 5 Strategy and Cyberspace
- 6 Domestic Regulation of Cyberspace
- 7 Internet Governance and International Institutions
- 8 International Law and Norms in Cyberspace
- 9 Artificial Intelligence and Ethics
- 10 Conclusions and Future Directions of Cybersecurity Policy
- 11 Leading in the Cyber Age
- Glossary
- References
- Index
Summary
Chapter 4 explores the human dimensions of cybersecurity. Steps that nation-state attackers use to penetrate an organization through phishing and social engineering are described as well as responses that defenders can take to protect themselves. These include hardening facilities, controlling remote access, educating security personnel and users on security hazards, using reputational services, and running an effective security operations center. Because people play a central role in cybersecurity, the chapter also examines limitations on human judgment, captured in the phrase “cognitive biases,” where preconceived notions and biases shape how we organize and respond to challenges. The chapter closes with discussions of applications of economics to cybersecurity and cybersecurity risk evaluation.
- Type
- Chapter
- Information
- Security in the Cyber AgeAn Introduction to Policy and Technology, pp. 108 - 140Publisher: Cambridge University PressPrint publication year: 2023