Cyber Crime and its Prevention in Easy Steps

Availability :
In Stock
₹ 251.16 M.R.P.:₹ 299 You Save: ₹47.84  (16.00% OFF)
  (Inclusive of all taxes)
₹ 0.00 Delivery charge
Author: Debtoru Chatterjee
Publisher: Khanna Publishing
Edition: First
ISBN-10: 9355380747
ISBN-13: 9789355380746
Publishing year: 2023
No of pages: 240
Weight: 330 grams
Book binding: Paperback

Qty :

Debtoru Chatterjee, a senior civil servant, has served 11 years in a central police organization, including as an Inspector General, besides a five-year stint as an army Colonel. An honors graduate from Presidency College Calcutta, he holds an M.Sc.(Distinction) in Cyber Forensics and Information Security from the University of Madras; an MBA (IT Systems) (Distinction) from ICFAI; and a Masters in Business Laws from National Law School, Bangalore. Besides being a keen student of Kali Linux and Python, he is the author of Presidential Discretion, a constitutional study.

<p>This book has been divided into two parts. The learning outcomes from each are as follows:</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;PART -1</p><p>The reader will gain awareness of how fraudsters:</p><p><br></p><p>-&nbsp; &nbsp; &nbsp;acquire one-time passwords via social engineering to commit OTP- based crimes.</p><p>-&nbsp; &nbsp; &nbsp;exploit vulnerabilities to create false ATMs.</p><p>-&nbsp; &nbsp; &nbsp;take advantage of poor over-sight mechanisms to remain undetected.</p><p>-&nbsp; &nbsp; &nbsp;exploit air gaps to manipulate data in transit for fraud.</p><p>-&nbsp; &nbsp; &nbsp;mislink accounts in a cross-institutional content to syphon off funds.</p><p>-&nbsp; &nbsp; &nbsp;launder stolen proceeds.</p><p>-&nbsp; &nbsp; &nbsp;take advantage of default configurations to gain unauthorized network privileges and how to devise counter-measures to deter such frauds.</p><p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; PART -2</p><p>The Reader will gain awareness of how:</p><p><br></p><p>-&nbsp; &nbsp; &nbsp;hackers break into android smartphones to steal OTP and other confidential information</p><p>-&nbsp; &nbsp; &nbsp;encrypted information to and from your smartphone or computer can be intercepted</p><p>-&nbsp; &nbsp; &nbsp;the computer can be hacked with or without social-engineering</p><p>-&nbsp; &nbsp; &nbsp;websites are scanned for vulnerabilities and exploited</p><p>-&nbsp; &nbsp; &nbsp;enemy computers are targeted in cyber wars</p><p>-&nbsp; &nbsp; &nbsp;Security Operations Centers function and tactical and policy measures to counter such threats.</p>