Chapter 3. Cyber Stalking, Fraud, and Abuse

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

  • Know the various types of Internet investment scams and auction frauds

  • Know specific steps to take to avoid fraud on the Internet

  • Have an understanding of what identity theft is and how it is done

  • Know specific steps that can be taken to avoid identity theft

  • Understand what cyber stalking is and be familiar with relevant laws

  • Know how to configure a web browser’s privacy settings

  • Know what laws apply to these computer crimes

Introduction

In every new frontier, a criminal element is bound to emerge. In times past, the high seas gave rise to pirates, and America’s Wild West produced gangs ...

Get Computer Security Fundamentals, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.