0%

Book Description

At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.

Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.

  • Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizations
  • Find out about the legal basis of these attacks and threats — what is legal and what is not — and how to defend against any type of surveillance
  • Learn how to thwart monitoring and surveillance threats with practical tools and techniques
  • Real-world examples teach using key concepts from cases in the news around the world

Table of Contents

  1. Cover
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. About the Authors
  7. Acknowledgments
  8. Introduction
  9. Chapter 1: Digital Reconnaissance and Surveillance
    1. Abstract
    2. Digital reconnaissance and surveillance
    3. Threat of digital reconnaissance and surveillance
    4. Why spy?
    5. Who spies?
    6. Legal and ethical principles
    7. Summary
  10. Chapter 2: Information Gathering
    1. Abstract
    2. Information gathering
    3. Online reconnaissance
    4. Physical reconnaissance
    5. Summary
  11. Chapter 3: Social Engineering
    1. Abstract
    2. Social engineering
    3. Mitigation of social engineering
    4. Legal and ethical concerns
    5. Summary
  12. Chapter 4: Mobile Phone Tracking
    1. Abstract
    2. Phone tracking
    3. Malicious tracking
    4. Legal and ethical concerns
    5. Summary
  13. Chapter 5: Physical Device Tracking
    1. Abstract
    2. Physical tracking
    3. Legal and ethical concerns
    4. Summary
  14. Chapter 6: Web Camera and Video Tracking
    1. Abstract
    2. Camera tracking
    3. Legal and ethical concerns
    4. Summary
  15. Chapter 7: Data Capture and Exploitation
    1. Abstract
    2. Data threat
    3. Legal and ethical concerns
    4. Summary
  16. Chapter 8: Protection Methods
    1. Abstract
    2. Protect yourself!
    3. Summary
  17. Index
3.139.70.21