Abstract
Hacking the human has three main parts. The first part analyzes social engineering methods and practices. The second part is the world of professional nation-state espionage and their intelligence agencies. The third analyzes insider threats, physical security, and mitigation methods bearing in mind the global skills gap in ICT with people widely recognized as the weakest link in the cyber security fence. In so doing it considers spear phishing and human intelligence, outsider and insider threats, the Confidentiality, Integrity, and Availability triad, Computer Emergency Response Teams, and industry and government-backed self-help groups.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Stoddart, K. (2022). Hacking the Human. In: Cyberwarfare. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-97299-8_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-97299-8_5
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-97298-1
Online ISBN: 978-3-030-97299-8
eBook Packages: Computer ScienceComputer Science (R0)