Hacking the Human

  • Chapter
  • First Online:
Cyberwarfare

Abstract

Hacking the human has three main parts. The first part analyzes social engineering methods and practices. The second part is the world of professional nation-state espionage and their intelligence agencies. The third analyzes insider threats, physical security, and mitigation methods bearing in mind the global skills gap in ICT with people widely recognized as the weakest link in the cyber security fence. In so doing it considers spear phishing and human intelligence, outsider and insider threats, the Confidentiality, Integrity, and Availability triad, Computer Emergency Response Teams, and industry and government-backed self-help groups.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 106.99
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 137.14
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 137.14
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kristan Stoddart .

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Stoddart, K. (2022). Hacking the Human. In: Cyberwarfare. Palgrave Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-97299-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-97299-8_5

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-97298-1

  • Online ISBN: 978-3-030-97299-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation