Sailing safe in cyberspace protect your identity and data
Looking at safe computing, this text gives in-depth exposure to the various ways in which security of information on computers might be compromised, how cyber crime markets work and measures to ensure safety at individual and organizational levels.
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New Delhi
Sage Publications
2013.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Preface
- I: MOTIVATION AND TYPES OF CYBERCRIME
- Introduction
- Identifying Cybercrime Motives
- How Can You Be Affected by Cybercrime
- II: THREATS AND METHODS
- Spam Methods
- Malware Tools
- Phishing Ways
- Identity Theft Methods
- Denial-of-Service Attack
- Damage by Botnets
- Hacking and Structured Query Language Injection-- Social Engineering Techniques
- Newer Threats
- III: IMPACT, TRENDS AND ROLE OF GOVERNMENT IN COMBATING CYBERCRIME
- Impact of Cybercrime
- Trends in Cybercrime
- Role of Government and Regulatory Mechanisms
- IV: BEING SAFE, BEING CYBER SECURE
- Sailing Safe
- Suggestions for Building a Security Program and Concluding Remarks
- Bibliography.


