Skip to content Skip to footer
Home » Products » Computer Books - English » Cyber Crime and its Prevention in Easy Steps
25%
Cyber Crime and its Prevention in Easy Steps

1 2 3 4 5 0

0.0 out of 5 stars
1381 Views
(0 customer reviews)
25% off

Additional information

ISBN 13

ISBN 10

E-ISBN 13

Edition

Page

Type of book

Year

Language

Publisher

Discount 25% Off
Price 224.25
Categories Computer Books - English , Emerging Technologies , Khanna Publishing House , New Arrivals
Condition Type New
Country Origin India

Only 5 left in stock

Description

This book has been divided into two parts. The learning outcomes from each are as follows:

                                                         PART -1

The reader will gain awareness of how fraudsters:

–     acquire one-time passwords via social engineering to commit OTP- based crimes. –     exploit vulnerabilities to create false ATMs. –     take advantage of poor over-sight mechanisms to remain undetected. –     exploit air gaps to manipulate data in transit for fraud. –     mislink accounts in a cross-institutional content to syphon off funds. –     launder stolen proceeds. –     take advantage of default configurations to gain unauthorized network privileges and how to devise counter-measures to deter such frauds.

                                                            PART -2

The Reader will gain awareness of how:

–     hackers break into android smartphones to steal OTP and other confidential information –     encrypted information to and from your smartphone or computer can be intercepted –     the computer can be hacked with or without social-engineering –     websites are scanned for vulnerabilities and exploited –     enemy computers are targeted in cyber wars –     Security Operations Centers function and tactical and policy measures to counter such threats.

Table of Contents

PART-l

1.    
Introduction

2.    
Hijacking
the One-Time Password

3.    
Confusing
the Watchdog

4.    
Mismatching
of Customer Accounts

5.    
Closing
Air- Gaps

6.     Two-Factor Authentication of Micro ATM Devices

7.    
Enforcing
Accountability at choke-points

8.    
Electronic Money
Laundering

9.    
Hardening
Default Configurations

10.  
Fraud
in the Call Centre


PART-lI

11.  
Man
in the middle attacks on Banking Devices

12.  
Attack
on Android Customer Phones

13.  
Hacking
Windows 10 Personal Computers

14.  
The
Anatomy of Cyber War

15.  
Inside
a Security Operations Centre

16.  
Towards
a National Cyber Security Policy

Appendix-1

Appendix-2

Author

Debtoru Chatterjee
Debtoru Chatterjee, a senior civil servant, has served 11 years in a central police organization, including as an Inspector General, besides a five-year stint as an army Colonel. An honors graduate from Presidency College Calcutta, he holds an M.Sc.(Distinction) in Cyber Forensics and Information Security from the University of Madras; an MBA (IT Systems) (Distinction) from ICFAI; and a Masters in Business Laws from National Law School, Bangalore. Besides being a keen student of Kali Linux and Python, he is the author of Presidential Discretion, a constitutional study.

Reviews

There are no reviews yet.

Be the first to review “Cyber Crime and its Prevention in Easy Steps”

Your email address will not be published. Required fields are marked *

You may also like…

  • 25% Cyber Attacks and Counter-Measures Made Simple

    Cyber Attacks and Counter-Measures Made Simple

    1 2 3 4 5 (0)

    1178 Views
    224.25
    Buy now

Recently viewed products

  • 25% Cyber Crime and its Prevention in Easy Steps

    Cyber Crime and its Prevention in Easy Steps

    1 2 3 4 5 (0)

    1381 Views
    224.25
    Buy now
  • 25% Basic Mechanical Engineering

    Basic Mechanical Engineering

    1 2 3 4 5 (0)

    1631 Views
    371.25
    Buy now
  • 20% Information Technology Infrastructure & Its Management

    Information Technology Infrastructure & Its Management

    1 2 3 4 5 (0)

    438 Views
    156.00
    Buy now
  • Out of stock ASP.Net 3.5 Projects (w/CD)

    ASP.Net 3.5 Projects (w/CD)

    1 2 3 4 5 (0)

    2016 Views
    385.00
    Read more
  • 25% Block Chain & Crypto Currencies

    Block Chain & Crypto Currencies

    1 2 3 4 5 (0)

    897 Views
    111.75
    Buy now
  • Out of stock 25% Architecture and Buildings

    Architecture and Buildings

    1 2 3 4 5 (0)

    1735 Views
    371.25
    Read more
  • 25% Process Heat Transfer and Chemical Equipment Design

    Process Heat Transfer and Chemical Equipment Design

    (1)
    511 Views
    262.50
    Buy now
  • 25% Applied Mathematics–III

    Applied Mathematics–III

    1 2 3 4 5 (0)

    37109 Views
    157.50
    Buy now
  • 30% Application Programming in C

    Application Programming in C

    1 2 3 4 5 (0)

    1722 Views
    269.50
    Buy now
  • 25% A Complete Reference to C++ Language

    A Complete Reference to C++ Language

    (1)
    2211 Views
    288.75
    Buy now
X