Chapter 3. Cyber Stalking, Fraud, and Abuse
Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
Know the various types of Internet investment scams and auction frauds
Know specific steps to take to avoid fraud on the Internet
Have an understanding of what identity theft is and how it is done
Know specific steps that can be taken to avoid identity theft
Understand what cyber stalking is and be familiar with relevant laws
Know how to configure a web browser’s privacy settings
Know what laws apply to these computer crimes
Introduction
In every new frontier, a criminal element is bound to emerge. In times past, the high seas gave rise to pirates, and America’s Wild West produced gangs ...
Get Computer Security Fundamentals, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.