Cyber Crime and its Prevention - Cyber Crime(English, Paperback, unknown)
Quick Overview
Product Price Comparison
This book has been Divided into two parts. The learning outcomes from each are as follows: Part -1•The reader will gain awareness of how fraudsters:•acquire one- time passwords via social engineering to commit OTP- based crime•exploit vulnerabilities to create false ATMs•take advantage of poor over-sight mechanisms to remain undetected•exploit air-gaps to manipulate data in transit for fraud•mislink accounts in a cross-institutional content to syphon off funds•launder stolen proceeds•take advantage of default configurations to gain unauthorised network privileges and how to devise counter- measures to deter such frauds. PART-2•The Reader will gain awareness of how:•hackers break in to android smartphones to steal OTP and other confidential information•encrypted information to and from your smartphone or computer can be intercepted•computer can be hacked with or without social-engineering•websites are scanned for vulnerabilities and exploited•enemy computers are targeted in cyber wars•Security Operations Centers function and tactical and policy measures to counter such threats.