CONTENTS

List of figures and tables

Author

Acknowledgements

Abbreviations

Preface

1. INTRODUCTION

Background and context

What is cybercrime?

The impact of cybercrime

The cybercriminals

The legalities of cybercrime

Summary

References

2. IMPERSONATION CYBER FRAUDS

Anatomy of impersonation cyber fraud

Lessons from history

Social engineering

Impersonation cyber fraud attack methods

How are people impacted?

What the future holds

Defending against impersonation cyber fraud

Summary

References

3. ONLINE ADVANCE-FEE THREATS

Anatomy of advance-fee fraud

Lessons from history

Advance-fee attack methods

How are people impacted?

What the future holds

Defending against online advance-fee fraud

Summary

References

4. ONLINE INVESTMENT FRAUD

Anatomy of online investment fraud

Lessons from history

Online investment fraud attack methods

Online investment fraud playbook

How are people impacted?

What the future holds

Defending against online investment fraud

Summary

References

5. CYBER IDENTITY THEFT

Anatomy of identity theft

Lessons from history

Identity theft attack methods

How are people impacted?

What the future holds

Defending against cyber identity theft

Summary

References

6. CYBER EXTORTION

Anatomy of cyber extortion

Lessons from history

Cyber extortion attack methods

Ransomware as a service and DDoS as a service

How are people impacted?

What the future holds

Defending against cyber extortion

Summary

References

7. CYBER SEXTORTION

Anatomy of sextortion

Lessons from history

Sextortion attack methods

How are people impacted?

What the future holds

Defending against sextortion attacks

Summary

References

8. CONCLUSION

References

Further reading

Glossary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.19.17