This book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business, falls victim to cybercrime. With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Front Cover BCS, The Chartered Institute for It Half-Title Page Title Page Copyright Page Contents List of figures and tables Author Acknowledgements Abbreviations Preface 1. Introduction Background and context What is cybercrime? The impact of cybercrime The cybercriminals The legalities of cybercrime Summary References 2. Impersonation Cyber Frauds Anatomy of impersonation cyber fraud Lessons from history Social engineering Impersonation cyber fraud attack methods How are people impacted? What the future holds Defending against impersonation cyber fraud Summary References 3. Online Advance-Fee Threats Anatomy of advance-fee fraud Lessons from history Advance-fee attack methods How are people impacted? What the future holds Defending against online advance-fee fraud Summary References 4. Online Investment Fraud Anatomy of online investment fraud Lessons from history Online investment fraud attack methods Online investment fraud playbook How are people impacted? What the future holds Defending against online investment fraud Summary References 5. Cyber Identity Theft Anatomy of identity theft Lessons from history Identity theft attack methods How are people impacted? What the future holds Defending against cyber identity theft Summary References 6. Cyber Extortion Anatomy of cyber extortion Lessons from history Cyber extortion attack methods Ransomware as a service and DDoS as a service How are people impacted? What the future holds Defending against cyber extortion Summary References 7. Cyber Sextortion Anatomy of sextortion Lessons from history Sextortion attack methods How are people impacted? What the future holds Defending against sextortion attacks Summary References 8. Conclusion References Further reading Glossary Index Back Cover
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.