Debtoru Chatterjee, a senior civil servant, has served 11 years in a central police organization, including as an Inspector General, besides a five-year stint as an army Colonel. An honors graduate from Presidency College Calcutta, he holds an M.Sc.(Distinction) in Cyber Forensics and Information Security from the University of Madras; an MBA (IT Systems) (Distinction) from ICFAI; and a Masters in Business Laws from National Law School, Bangalore. Besides being a keen student of Kali Linux and Python, he is the author of Presidential Discretion, a constitutional study.
<p>This book has been divided into two parts. The learning outcomes from each are as follows:</p><p> PART -1</p><p>The reader will gain awareness of how fraudsters:</p><p><br></p><p>- acquire one-time passwords via social engineering to commit OTP- based crimes.</p><p>- exploit vulnerabilities to create false ATMs.</p><p>- take advantage of poor over-sight mechanisms to remain undetected.</p><p>- exploit air gaps to manipulate data in transit for fraud.</p><p>- mislink accounts in a cross-institutional content to syphon off funds.</p><p>- launder stolen proceeds.</p><p>- take advantage of default configurations to gain unauthorized network privileges and how to devise counter-measures to deter such frauds.</p><p> PART -2</p><p>The Reader will gain awareness of how:</p><p><br></p><p>- hackers break into android smartphones to steal OTP and other confidential information</p><p>- encrypted information to and from your smartphone or computer can be intercepted</p><p>- the computer can be hacked with or without social-engineering</p><p>- websites are scanned for vulnerabilities and exploited</p><p>- enemy computers are targeted in cyber wars</p><p>- Security Operations Centers function and tactical and policy measures to counter such threats.</p>