Připojte se k nám na Binding Hook Live 27. října v Underbelly Boulevard Soho v Londýně.
Připojte se k nám na Binding Hook Live

Povědomí o bezpečnosti, sociální inženýrství a vnitřní hrozby

This module examines the human factors in cybersecurity, particularly focusing on security awareness, social engineering tactics, and the risks posed by insider threats. It covers strategies to educate employees, methods used by attackers to exploit human vulnerabilities, and approaches to mitigate the risk of insider breaches.

Portál > Kybernetická bezpečnost > Povědomí o bezpečnosti, sociální inženýrství a vnitřní hrozby

Tvůrce učebních osnov

Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Bittau, Andrea, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh. “Hacking Blind.” In 2014 IEEE Symposium on Security and Privacy, 227–42. San Jose, CA: IEEE, 2014.

https://doi.org/10.1109/SP.2014.22

Corradini, Isabella. Building a Cybersecurity Culture in Organizations: How to Bridge the Gap Between People and Digital Technology. Vol. 284. Studies in Systems, Decision and Control. Cham: Springer International Publishing, 2020.

https://doi.org/10.1007/978-3-030-43999-6

Solove, Daniel J. “Introduction: Privacy Self-Management and the Consent Dilemma.” Harvard Law Review 126, no. 7 (May 20, 2013).

https://harvardlawreview.org/print/vol-126/introduction-privacy-self-management-and-the-consent-dilemma/

Ur, Blase, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. “‘I Added “!” at the End to Make It Secure’: Observing Password Creation in the Lab.” In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, 123–40. SOUPS ’15. USA: USENIX Association, 2015.

Wen, Zikai Alex, Zhiqiu Lin, Rowena Chen, and Erik Andersen. “What.Hack: Engaging Anti-Phishing Training Through a Role-Playing Phishing Simulation Game.” In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–12. Glasgow Scotland Uk: ACM, 2019.

https://doi.org/10.1145/3290605.3300338

Wash, Rick, and Molly M. Cooper. “Who Provides Phishing Training?: Facts, Stories, and People Like Me.” In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 1–12. Montreal QC Canada: ACM, 2018.

https://doi.org/10.1145/3173574.3174066

Děkujeme, že jste se přihlásili k odběru našeho newsletteru!

Thank you! RSVP received for Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Děkujeme, že jste se přihlásili! Budeme vás kontaktovat.

Apply for: Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Načítání...

Načítání...