Description
This book has been divided into two parts. The learning outcomes from each are as follows:
PART -1
The reader will gain awareness of how fraudsters:
– acquire one-time passwords via social engineering to commit OTP- based crimes.
– exploit vulnerabilities to create false ATMs.
– take advantage of poor over-sight mechanisms to remain undetected.
– exploit air gaps to manipulate data in transit for fraud.
– mislink accounts in a cross-institutional content to syphon off funds.
– launder stolen proceeds.
– take advantage of default configurations to gain unauthorized network privileges and how to devise counter-measures to deter such frauds.
PART -2
The Reader will gain awareness of how:
– hackers break into android smartphones to steal OTP and other confidential information
– encrypted information to and from your smartphone or computer can be intercepted
– the computer can be hacked with or without social-engineering
– websites are scanned for vulnerabilities and exploited
– enemy computers are targeted in cyber wars
– Security Operations Centers function and tactical and policy measures to counter such threats.
Table of Contents
PART-l
1.
Introduction
2.
Hijacking
the One-Time Password
3.
Confusing
the Watchdog
4.
Mismatching
of Customer Accounts
5.
Closing
Air- Gaps
6. Two-Factor Authentication of Micro ATM Devices
7.
Enforcing
Accountability at choke-points
8.
Electronic Money
Laundering
9.
Hardening
Default Configurations
10.
Fraud
in the Call Centre
PART-lI
11.
Man
in the middle attacks on Banking Devices
12.
Attack
on Android Customer Phones
13.
Hacking
Windows 10 Personal Computers
14.
The
Anatomy of Cyber War
15.
Inside
a Security Operations Centre
16.
Towards
a National Cyber Security Policy
Appendix-1
Appendix-2
Author
Debtoru Chatterjee
Debtoru Chatterjee, a senior civil servant, has served 11 years in a central police organization, including as an Inspector General, besides a five-year stint as an army Colonel. An honors graduate from Presidency College Calcutta, he holds an M.Sc.(Distinction) in Cyber Forensics and Information Security from the University of Madras; an MBA (IT Systems) (Distinction) from ICFAI; and a Masters in Business Laws from National Law School, Bangalore. Besides being a keen student of Kali Linux and Python, he is the author of Presidential Discretion, a constitutional study.
Reviews
There are no reviews yet.