History and Evolution of Cyber Psychology
Expert-defined terms from the Advanced Skill Certificate in Cyber Psychology and Security Assessments course at Greenwich School of Business and Finance. Free to read, free to share, paired with a globally recognised certification pathway.
Advanced Skill Certificate in Cyber Psychology and Security Assessments #
A program that provides students with a comprehensive understanding of the psychological principles and security assessments related to cybercrime and online behavior.
Behavioral Analytics #
The use of data and statistical methods to understand and predict human behavior. In the context of cyber psychology, behavioral analytics can be used to identify patterns of behavior that may indicate malicious intent or suspicious activity.
Cybercrime #
Illegal activities that occur online, including hacking, identity theft, and the spread of malware.
Cybersecurity #
The practice of protecting internet-connected systems, including hardware, software, and data, from attack, damage, or unauthorized access.
Dark Web #
A part of the internet that is not indexed by search engines and is only accessible through special software. The dark web is often associated with illegal activities, such as the sale of drugs and weapons.
Hacking #
The unauthorized access to or control of a computer or network. Hacking can be used for a variety of purposes, including espionage, financial gain, and malicious mischief.
Identity Theft #
The unauthorized use of someone else's personal information, such as their name, social security number, or credit card information, to commit fraud or other crimes.
Malware #
Software that is designed to harm a computer or network, including viruses, worms, and Trojan horses.
Online Behavior #
The ways in which individuals interact with and use the internet. Online behavior can be influenced by a variety of factors, including an individual's personality, values, and experiences.
Phishing #
The use of email or other electronic communication to trick individuals into revealing sensitive information, such as passwords or credit card numbers.
Psychological Principles #
The fundamental concepts and theories of psychology, including cognitive, developmental, and social psychology. These principles can be applied to understand and predict human behavior in the context of cybercrime and online security.
Security Assessments #
The process of evaluating the security of a system or network to identify vulnerabilities and potential threats. Security assessments can be used to develop strategies for improving the security of a system and protecting it from attack.
Social Engineering #
The use of deception to manipulate individuals into revealing sensitive information or performing actions that compromise their security. Social engineering can be used to gain unauthorized access to a system or network, or to trick individuals into divulging personal information.
Spyware #
Software that is installed on a computer or network without the user's knowledge or consent, and is used to monitor the user's activities or collect sensitive information.
Threat Intelligence #
The collection and analysis of information about potential threats to a system or network. Threat intelligence can be used to identify and mitigate risks, and to develop strategies for protecting against attacks.
Two #
Factor Authentication: A security process that requires users to provide two forms of identification in order to access a system or network. Two-factor authentication typically involves something the user knows, such as a password, and something the user has, such as a physical token or a code sent to their mobile phone.
User Experience (UX) #
The overall experience of an individual using a system or network, including their perceptions of usability, functionality, and aesthetics. A positive user experience can contribute to the security of a system, as users are more likely to follow best practices and take appropriate precautions when they feel comfortable and confident using the system.
Virtual Private Network (VPN) #
A secure, encrypted connection between a user's device and a remote network. VPNs are often used to protect online privacy and security, as they allow users to browse the internet anonymously and access blocked or restricted websites.
Vulnerability #
A weakness in a system or network that can be exploited by an attacker to gain unauthorized access or cause damage. Vulnerabilities can be caused by a variety of factors, including outdated software, poor configuration, and human error.
White Hat Hacker #
A hacker who uses their skills to identify and report vulnerabilities in systems and networks, rather than exploiting them for malicious purposes. White hat hackers often work as ethical hackers or penetration testers, helping organizations to improve their security and protect against attacks.