Buch, Englisch, 293 Seiten, Format (B × H): 159 mm x 241 mm, Gewicht: 427 g
Protect Your Identity and Data
Buch, Englisch, 293 Seiten, Format (B × H): 159 mm x 241 mm, Gewicht: 427 g
ISBN: 978-81-321-1122-1
Verlag: Sage Publications India
Sailing Safe in Cyberspace is an excellent resource on safe computing. It gives in-depth exposure to the various ways in which security of information might be compromised, how cybercrime markets work and measures that can be taken to ensure safety at individual and organizational levels.
Cyber security is not just a technical subject that can be resolved like any other IT-related problem—it is a ‘risk’ that can be mitigated by creating awareness and getting the right combination of technology and practices based on careful analysis. This book combines insights on cybersecurity from academic research, media reports, vendor reports, practical consultation and research experience.
The first section of the book discusses motivation and types of cybercrimes that can take place. The second lists the major types of threats that users might encounter. The third discusses the impact, trend and role of the government in combating cybercrime. The fourth section of the book tells the readers about ways to protect themselves and secure their data/information stored in computers and the cyberspace. It concludes by offering suggestions for building a secure cyber environment.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Preface
I: MOTIVATION AND TYPES OF CYBERCRIME
Introduction
Identifying Cybercrime Motives
How Can You Be Affected by Cybercrime
II: THREATS AND METHODS
Spam Methods
Malware Tools
Phishing Ways
Identity Theft Methods
Denial-of-Service Attack
Damage by Botnets
Hacking and Structured Query Language Injection
Social Engineering Techniques
Newer Threats
III: IMPACT, TRENDS AND ROLE OF GOVERNMENT IN COMBATING CYBERCRIME
Impact of Cybercrime
Trends in Cybercrime
Role of Government and Regulatory Mechanisms
IV: BEING SAFE, BEING CYBER SECURE
Sailing Safe
Suggestions for Building a Security Program and Concluding Remarks
Bibliography




