
by Cameron H. Malin JD CISSP
Rating: 3.0 ⭐
• 1 recommendation ❤️
Deception in the Digital Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception―and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience’s perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks―and conversely postmortem insight about attackers―presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.
by Cameron H. Malin JD CISSP
Synthetic Media, Deepfakes, and Cyber Attacks, Analysis, and Defenses introduces the only analytical Synthetic Media Analysis Framework (SMAF) to help describe cyber threats and help security professionals anticipate and analyze attacks. This framework encompasses seven Credibility, Control, Medium, Interactivity, Familiarity, Intended Target, and Evocation. Synthetic media is a broad term that encompasses the artificial manipulation, modification, and production of information, covering a spectrum from audio-video deepfakes to text-based chatbots. Synthetic media provides cyber attackers and scammers with a game-changing advantage over traditional ROSE attacks because they have the potential to convincingly impersonate close associates through text, imagery, voice, and video. This burgeoning threat has yet to be meaningfully addressed through any written treatment on the topic. The book is co-authored by three cyber influence and deception experts who have gained deep knowledge and experience on the topic through diverse, true operational pathways and backgrounds. The diversity and perspectives of the author team makes the content in the book the broadest and deepest treatment of synthetic media attacks available to readers.