Cybercrime protecting your business, your family and yourself

With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.

Detalles Bibliográficos
Otros Autores: Wade, Todd, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: London, England : BCS Learning & Development Limited [2022]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009671498206719
Tabla de Contenidos:
  • Front Cover
  • BCS, The Chartered Institute for It
  • Half-Title Page
  • Title Page
  • Copyright Page
  • Contents
  • List of figures and tables
  • Author
  • Acknowledgements
  • Abbreviations
  • Preface
  • 1. Introduction
  • Background and context
  • What is cybercrime?
  • The impact of cybercrime
  • The cybercriminals
  • The legalities of cybercrime
  • Summary
  • References
  • 2. Impersonation Cyber Frauds
  • Anatomy of impersonation cyber fraud
  • Lessons from history
  • Social engineering
  • Impersonation cyber fraud attack methods
  • How are people impacted?
  • What the future holds
  • Defending against impersonation cyber fraud
  • Summary
  • References
  • 3. Online Advance-Fee Threats
  • Anatomy of advance-fee fraud
  • Lessons from history
  • Advance-fee attack methods
  • How are people impacted?
  • What the future holds
  • Defending against online advance-fee fraud
  • Summary
  • References
  • 4. Online Investment Fraud
  • Anatomy of online investment fraud
  • Lessons from history
  • Online investment fraud attack methods
  • Online investment fraud playbook
  • How are people impacted?
  • What the future holds
  • Defending against online investment fraud
  • Summary
  • References
  • 5. Cyber Identity Theft
  • Anatomy of identity theft
  • Lessons from history
  • Identity theft attack methods
  • How are people impacted?
  • What the future holds
  • Defending against cyber identity theft
  • Summary
  • References
  • 6. Cyber Extortion
  • Anatomy of cyber extortion
  • Lessons from history
  • Cyber extortion attack methods
  • Ransomware as a service and DDoS as a service
  • How are people impacted?
  • What the future holds
  • Defending against cyber extortion
  • Summary
  • References
  • 7. Cyber Sextortion
  • Anatomy of sextortion
  • Lessons from history
  • Sextortion attack methods
  • How are people impacted?
  • What the future holds.
  • Defending against sextortion attacks
  • Summary
  • References
  • 8. Conclusion
  • References
  • Further reading
  • Glossary
  • Index
  • Back Cover.