Únase a nosotros en Binding Hook Live el 27 de octubre en el Underbelly Boulevard Soho de Londres
Únase a nosotros en Binding Hook Live

Concienciación sobre seguridad, ingeniería social y amenazas internas

This module examines the human factors in cybersecurity, particularly focusing on security awareness, social engineering tactics, and the risks posed by insider threats. It covers strategies to educate employees, methods used by attackers to exploit human vulnerabilities, and approaches to mitigate the risk of insider breaches.

Portal > Ciberseguridad > Concienciación sobre seguridad, ingeniería social y amenazas internas

Curriculum Builder

Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Bittau, Andrea, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh. “Hacking Blind.” In 2014 IEEE Symposium on Security and Privacy, 227–42. San Jose, CA: IEEE, 2014.

https://doi.org/10.1109/SP.2014.22

Corradini, Isabella. Building a Cybersecurity Culture in Organizations: How to Bridge the Gap Between People and Digital Technology. Vol. 284. Studies in Systems, Decision and Control. Cham: Springer International Publishing, 2020.

https://doi.org/10.1007/978-3-030-43999-6

Solove, Daniel J. “Introduction: Privacy Self-Management and the Consent Dilemma.” Harvard Law Review 126, no. 7 (May 20, 2013).

https://harvardlawreview.org/print/vol-126/introduction-privacy-self-management-and-the-consent-dilemma/

Ur, Blase, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. “‘I Added “!” at the End to Make It Secure’: Observing Password Creation in the Lab.” In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, 123–40. SOUPS ’15. USA: USENIX Association, 2015.

Wen, Zikai Alex, Zhiqiu Lin, Rowena Chen, and Erik Andersen. “What.Hack: Engaging Anti-Phishing Training Through a Role-Playing Phishing Simulation Game.” In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–12. Glasgow Scotland Uk: ACM, 2019.

https://doi.org/10.1145/3290605.3300338

Wash, Rick, and Molly M. Cooper. “Who Provides Phishing Training?: Facts, Stories, and People Like Me.” In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 1–12. Montreal QC Canada: ACM, 2018.

https://doi.org/10.1145/3173574.3174066

Gracias por suscribirse a nuestro boletín.

Thank you! RSVP received for Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Gracias por su solicitud. Nos pondremos en contacto con usted.

Apply for: Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.

Cargando...

Cargando...