Cybercrime protecting your business, your family and yourself
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
London, England :
BCS Learning & Development Limited
[2022]
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009671498206719 |
Tabla de Contenidos:
- Front Cover
- BCS, The Chartered Institute for It
- Half-Title Page
- Title Page
- Copyright Page
- Contents
- List of figures and tables
- Author
- Acknowledgements
- Abbreviations
- Preface
- 1. Introduction
- Background and context
- What is cybercrime?
- The impact of cybercrime
- The cybercriminals
- The legalities of cybercrime
- Summary
- References
- 2. Impersonation Cyber Frauds
- Anatomy of impersonation cyber fraud
- Lessons from history
- Social engineering
- Impersonation cyber fraud attack methods
- How are people impacted?
- What the future holds
- Defending against impersonation cyber fraud
- Summary
- References
- 3. Online Advance-Fee Threats
- Anatomy of advance-fee fraud
- Lessons from history
- Advance-fee attack methods
- How are people impacted?
- What the future holds
- Defending against online advance-fee fraud
- Summary
- References
- 4. Online Investment Fraud
- Anatomy of online investment fraud
- Lessons from history
- Online investment fraud attack methods
- Online investment fraud playbook
- How are people impacted?
- What the future holds
- Defending against online investment fraud
- Summary
- References
- 5. Cyber Identity Theft
- Anatomy of identity theft
- Lessons from history
- Identity theft attack methods
- How are people impacted?
- What the future holds
- Defending against cyber identity theft
- Summary
- References
- 6. Cyber Extortion
- Anatomy of cyber extortion
- Lessons from history
- Cyber extortion attack methods
- Ransomware as a service and DDoS as a service
- How are people impacted?
- What the future holds
- Defending against cyber extortion
- Summary
- References
- 7. Cyber Sextortion
- Anatomy of sextortion
- Lessons from history
- Sextortion attack methods
- How are people impacted?
- What the future holds.
- Defending against sextortion attacks
- Summary
- References
- 8. Conclusion
- References
- Further reading
- Glossary
- Index
- Back Cover.