Cybercrime : protecting your business, your family and yourself / Todd Wade.
Material type: TextPublisher: London : BCS, 2022Description: 1 online resource (180 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9781780175867 (PDF ebook) :Subject(s): Computer fraud | Internet fraud | Computer crimes | True Crime | Social services & welfare, criminology | Computer fraud & hacking | Computer security | Computer viruses, Trojans & worms | Spam | Spyware | Data encryption | Privacy & data protectionAdditional physical formats: Print version :: No titleDDC classification: 364.163 Online access: Open e-bookItem type | Current library | Home library | Class number | Status | Date due | Barcode | Item reservations | |
---|---|---|---|---|---|---|---|---|
E-book | Electronic publication | Electronic publication | Available |
Introduction -- Impersonation Cyber Frauds -- Cyber Advance-fee Threats -- Cyber Investment Fraud -- Cyber Identity Theft -- Cyber Extortion -- Cyber Sextortion -- Conclusion
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim. Cybercrime is a sad, ever-developing reality of our digital lives. Cybercriminals are ruthless and know how to use persuasion and manipulation to get what they want. We are all in danger of falling victim to their tricks, which can lead to serious consequences for our business, our family and ourselves. Cybercrime is a broad topic. This book isn't an attempt to cover all types of cybercrime. It will cover the two most common and most costly types of cybercrime seen today for individuals and businesses: cyber fraud and cyber extortion. There are four categories of cyber fraud (impersonation fraud, advance- fee fraud, investment fraud, identity theft) and two categories of cyber extortion (cyber extortion and sextortion). There's a chapter for each of these categories, with coverage including key methodologies, attack methods cybercriminals use, advice on how to protect yourself to avoid becoming a victim, and what to do if you do find yourself in the situation of being a victim of cybercrime. Historical examples of the type of fraud or extortion will be shown, explaining and demonstrating how the same methods are still in use today, albeit in a modern context - cyber. Real cases of cybercrime will be reviewed and dissected. Glimpses of how future attacks might look will be shown. Cybercriminals target everyone. It does not matter if you are at work or at home. They will go after your family, including your children. Reading this book will help you to be prepared for when that occurs.
Description based on CIP data; resource not viewed.
There are no comments on this title.