000 03946nam a22006618i 4500
001 BDZ0050255835
003 StDuBDS
005 20230331113849.0
006 m|||||o||d||||||||
007 cr |||||||||||
008 220413s2022 enk fo 000|0|eng|d
020 _a9781780175867 (PDF ebook) :
_c22.49
040 _aStDuBDS
_beng
_erda
_epn
_cStDuBDS
_dStDuBDSZ
072 7 _aCRI
_2ukslc
072 7 _aJK
_2bicssc
072 7 _aURH
_2bicssc
072 7 _aUR
_2bicssc
072 7 _aURJ
_2bicssc
072 7 _aURS
_2bicssc
072 7 _aURW
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aJK
_2thema
072 7 _aURH
_2thema
072 7 _aUR
_2thema
072 7 _aURJ
_2thema
072 7 _aURS
_2thema
072 7 _aURW
_2thema
072 7 _aURY
_2thema
072 7 _aURD
_2thema
082 0 4 _a364.163
_223
100 1 _aWade, Todd,
_eauthor.
245 1 0 _aCybercrime :
_bprotecting your business, your family and yourself /
_cTodd Wade.
263 _a202206
264 1 _aLondon :
_bBCS,
_c2022.
300 _a1 online resource (180 pages)
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
366 _b20220615
_cAvailable
505 0 _aIntroduction -- Impersonation Cyber Frauds -- Cyber Advance-fee Threats -- Cyber Investment Fraud -- Cyber Identity Theft -- Cyber Extortion -- Cyber Sextortion -- Conclusion
520 8 _aWith a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
_bCybercrime is a sad, ever-developing reality of our digital lives. Cybercriminals are ruthless and know how to use persuasion and manipulation to get what they want. We are all in danger of falling victim to their tricks, which can lead to serious consequences for our business, our family and ourselves. Cybercrime is a broad topic. This book isn't an attempt to cover all types of cybercrime. It will cover the two most common and most costly types of cybercrime seen today for individuals and businesses: cyber fraud and cyber extortion. There are four categories of cyber fraud (impersonation fraud, advance- fee fraud, investment fraud, identity theft) and two categories of cyber extortion (cyber extortion and sextortion). There's a chapter for each of these categories, with coverage including key methodologies, attack methods cybercriminals use, advice on how to protect yourself to avoid becoming a victim, and what to do if you do find yourself in the situation of being a victim of cybercrime. Historical examples of the type of fraud or extortion will be shown, explaining and demonstrating how the same methods are still in use today, albeit in a modern context - cyber. Real cases of cybercrime will be reviewed and dissected. Glimpses of how future attacks might look will be shown. Cybercriminals target everyone. It does not matter if you are at work or at home. They will go after your family, including your children. Reading this book will help you to be prepared for when that occurs.
588 _aDescription based on CIP data; resource not viewed.
650 0 _aComputer fraud.
650 0 _aInternet fraud.
650 0 _aComputer crimes.
650 7 _aTrue Crime.
_2ukslc
650 7 _aSocial services & welfare, criminology
_2thema
650 7 _aComputer fraud & hacking
_2thema
650 7 _aComputer security
_2thema
650 7 _aComputer viruses, Trojans & worms
_2thema
650 7 _aSpam
_2thema
650 7 _aSpyware
_2thema
650 7 _aData encryption
_2thema
650 7 _aPrivacy & data protection
_2thema
776 0 8 _iPrint version :
_z9781780175850
856 4 0 _uhttps://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&accId=8832856&isbn=9781780175867
_zOpen e-book
942 _2ddc
999 _c83152
_d83152