Cybercrime

Book description

With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.

Table of contents

  1. Front Cover
  2. Half-Title Page
  3. BCS, The Chartered Institute for It
  4. Title Page
  5. Copyright Page
  6. Contents
  7. List of figures and tables
  8. Author
  9. Acknowledgements
  10. Abbreviations
  11. Preface
  12. 1. Introduction
    1. Background and context
    2. What is cybercrime?
    3. The impact of cybercrime
    4. The cybercriminals
    5. The legalities of cybercrime
    6. Summary
    7. References
  13. 2. Impersonation Cyber Frauds
    1. Anatomy of impersonation cyber fraud
    2. Lessons from history
    3. Social engineering
    4. Impersonation cyber fraud attack methods
    5. How are people impacted?
    6. What the future holds
    7. Defending against impersonation cyber fraud
    8. Summary
    9. References
  14. 3. Online Advance-Fee Threats
    1. Anatomy of advance-fee fraud
    2. Lessons from history
    3. Advance-fee attack methods
    4. How are people impacted?
    5. What the future holds
    6. Defending against online advance-fee fraud
    7. Summary
    8. References
  15. 4. Online Investment Fraud
    1. Anatomy of online investment fraud
    2. Lessons from history
    3. Online investment fraud attack methods
    4. Online investment fraud playbook
    5. How are people impacted?
    6. What the future holds
    7. Defending against online investment fraud
    8. Summary
    9. References
  16. 5. Cyber Identity Theft
    1. Anatomy of identity theft
    2. Lessons from history
    3. Identity theft attack methods
    4. How are people impacted?
    5. What the future holds
    6. Defending against cyber identity theft
    7. Summary
    8. References
  17. 6. Cyber Extortion
    1. Anatomy of cyber extortion
    2. Lessons from history
    3. Cyber extortion attack methods
    4. Ransomware as a service and DDoS as a service
    5. How are people impacted?
    6. What the future holds
    7. Defending against cyber extortion
    8. Summary
    9. References
  18. 7. Cyber Sextortion
    1. Anatomy of sextortion
    2. Lessons from history
    3. Sextortion attack methods
    4. How are people impacted?
    5. What the future holds
    6. Defending against sextortion attacks
    7. Summary
    8. References
  19. 8. Conclusion
    1. References
  20. Further reading
  21. Glossary
  22. Index
  23. Back Cover

Product information

  • Title: Cybercrime
  • Author(s): Todd Wade
  • Release date: June 2022
  • Publisher(s): BCS, The Chartered Institute for IT
  • ISBN: 9781780175874