جزییات کتاب
Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes. Key Features● Real-case studies and true events on cyber crime incidents.● Learn how to protect yourself from cyber threats and assist police for crime investigation.● Coverage on financial frauds, social media crimes, mobile payment frauds, and a lot more.DescriptionThe book ‘Cybercrime and Preventive Measures' provides a strong and precise introduction to the world of cybercrime and the need of cyber awareness for everyone. It begins with email-related popular cyber crimes such as phishing, spamming, spoofing, email bombing, etc. It talks about the methodologies adopted by cyber criminals to trap people along with some real-case studies (names of victims changed) and preventive measures to be taken to safeguard against email-related cyber crime.This book exposes you to a variety of financial frauds committed by cyber criminals and the modus of operandi they adopt while committing cyber crimes along with numerous case studies. The book keeps you informed about what preventive and safety measures can be exercised so that you can protect yourself, your family, and even your workplace.This book also assists young teenagers and school students about the methods adopted by hackers and how to remain safe while using social media applications and Internet shopping sites. This book talks about the risks involved and preventive measures that need to be taken while using mobile apps.What you will learn● Get familiar with the top rated cyber crime incidents in India.● Understand the different types of cyber crimes and the modus of operandi adopted by the cyber criminals.● Learn to identify and manage cybersecurity threats and protect yourself from cyber vulnerabilities. Who this book is forThis book is for everyone, students, or professionals, who are frequently using smartphones, computers, laptops, and smart devices over the Internet. This book guides you to protect yourself from cyber threats while browsing the internet, watching videos over the Internet, using emails, and using social media apps such as WhatsApp, Facebook, Twitter, LinkedIn, or playing online games.Table of Contents1. Email-related Cybercrimes2. Financial Frauds and Cybercrime3. Cybercrime in Social Media4. Mobile Application-related Frauds5. To Do List for Working Professionals and Small Businesses6. Complaint Registration Procedure7. References About the Author Priyanka Tomar is the Director of New Era System Pvt Ltd and has 18 years of experience in various IT fields, including Cyber Security and Cyber Forensics. She has been a guest faculty at CBI Academy, Ghaziabad since 2014 and is also an advisor to government and private organisations on cybersecurity-related issues, R&D projects, etc.She is a regular speaker and discussion panelist at cybersecurity events. She imparts customized Cyber Security Training on cyber security and cyber forensics such as darknet forensics, cryptocurrency forensics, cyber Intelligence & OSINT, Network Forensics, Protecting Critical Infrastructure, Website Security, Blockchain-based solutions, IoT & Smart Cities Solutions, etc.Blog link: www.cybersecurityaudits.blogspot.inSanjay Gautam joined CBI in 2002 and has experience in the investigation of anti-corruption cases and cyber crime cases, including crimes against women and children. He has provided technical assistance in various hi-profile cases. He has attended a number of INTERPOL's Train-the-Trainer workshops in India, Cyprus, and South Korea and was ranked 1st among various INTERPOL countries. He is a regular guest faculty for various Central Training Institutes. He was also invited by UNDP and INTERPOL to deliver a lecture at Kuala Lumpur, Malaysia. LinkedIn Bio: https://www.linkedin.com/in/cybersecuritydelhi/