This chapter is focused on the technology of the human brain and how that technology interfaces with other devices and operations associated with cybersecurity. Much of the human-made technology in this area does not interface with humans very well at all. The systems and methods used to protect humans need to accept and account for human errors and manipulation.
Key Concepts
- 1.
Cybersecurity is largely a battle of wits where the best thinker wins.
- 2.
There will never be a ...