Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Deception in the digital age : exploiting and defending human targets through computer-mediated communications
Malin C., Gudaitis T., Holt T., Kilger M., ACADEMIC PRESS, Cambridge, MA, 2017. 284 pp. Type: Book (978-0-124116-30-6)
Date Reviewed: Jul 12 2018

The book’s ten chapters provide background on deception techniques and then examples linked to cyber deception. The introduction, “Cyberanthropology of Deception,” shows that deception is an old tactic, with evidence dating back to 2500 BCE. Examples can be found everywhere, from art to war.

The book begins with one of the longest chapters, “The Psychology of Deception,” which provides insight into how deception works. The last part of this chapter is devoted to the specific area of digital deception. Chapter 2, “Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings,” describes each of these topics and how they are abused. It provides clues for recognizing these deceptions and how to defend against them.

Chapter 3, “Viral Influence: Deceptive Computing Attacks Through Persuasion,” presents two models: the elaboration likelihood model and the heuristic-systematic model. It then shows how deceptive computing attacks like hoaxes, scareware, technical support scams, and ransomware incorporate these elements of persuasion. In chapter 4, “Social Dynamics of Deception,” deception between participants in underground online economies plays a prime role. Market participants advertise their offer, price, and payment method. Chapter 5 covers four main topics: phishing, watering holes, scareware, and ransomware.

Chapter 6 is “Seeing is Not Believing: Deceptive Internet Video Communications.” Photo and film deception dates back to the beginning of the 20th century. Today’s images and videos are likely “enhanced,” and manipulation tools to deceive are readily available and affordable to anyone.

Chapter 7 covers cyber jihad and how deception is used in terrorism, and chapter 8 gives an overview of nation-state cyberattacks and the expected future of these conflicts.

Chapter 9, “Sweet Deception: Honeypots,” looks at the defensive use of deception. Honeypots, honeynets, and honeytokens attempt to look like attractive targets and then monitor anyone abusing them. The book ends with chapter 10, “Looking Forward: Deception in the Future.”

This book brings together two worlds: sociopsychological research and information security. It is one thing to point at the human factor in security and another to actually use research on human behavior to improve protective and detective countermeasures. The book should help readers anticipate the next steps in malicious deception, but may be more effective if read in conjunction with [1,2,3,4].

More reviews about this item: Amazon

Reviewer:  A. Mariën Review #: CR146144 (1810-0536)
1) Watson, G.; Mason, A.; Ackroyd, R. Social engineering penetration testing. Syngress, Waltham, MA, 2014.
2) Mitnick, K. D.; Simon, W. L. The art of deception. Wiley, Indianapolis, IN, 2002.
3) Chen, S.; Chaiken, S. The heuristic-systematic model in its broader context. In: Dual-process theories in social psychology. 73-96, The Guilford Press, 1999.
4) Cacioppo, J. T.; Petty, R. E. The elaboration likelihood model of persuasion. Advances in Experimental Social Psychology 19, (1986), 123–205.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
World Wide Web (WWW) (H.3.4 ... )
 
 
Security and Protection (K.6.5 )
 
 
Systems And Software (H.3.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The dark side of employee email
Sipior J., Ward B. Communications of the ACM 42(7): 88-95, 1999. Type: Article
Aug 1 1999
The very brief history of digital evidence standards
Pollitt M. In Integrity and internal control in information systems V. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Nov 20 2003
Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004)407-411, 2004. Type: Proceedings
May 19 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy