Cyber Fraud: Tactics, Techniques and Procedures
Editat de James Grahamen Limba Engleză Hardback – apr 2009
Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas.
This eye-opening work includes a variety of case studies ― including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network’s (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.
Preț: 736.66 lei
Preț vechi: 920.83 lei
-20%
Puncte Express: 1105
Preț estimativ în valută:
141.13€ • 152.88$ • 121.03£
141.13€ • 152.88$ • 121.03£
Carte tipărită la comandă
Livrare economică 09-23 mai
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781420091274
ISBN-10: 1420091271
Pagini: 500
Ilustrații: 315 b/w images and 36 In-Text Boxes
Dimensiuni: 178 x 257 x 30 mm
Greutate: 1.07 kg
Ediția:1
Editura: CRC Press
ISBN-10: 1420091271
Pagini: 500
Ilustrații: 315 b/w images and 36 In-Text Boxes
Dimensiuni: 178 x 257 x 30 mm
Greutate: 1.07 kg
Ediția:1
Editura: CRC Press
Public țintă
CSOs, CISOs, CTOs, Chief Risk Officers, Chief Privacy Officers, Chief Compliance Officers, Security Operations personnel, IT, security consultantsCuprins
Cyber Fraud: Principles, Trends, and Mitigation Techniques
The Cyber Threat Landscape in Russia
Banking Trojans: An Overview
The Russian Business Network: Rise and Fall of a Criminal ISP
IFrame Attacks - An Examination of the Business of IFrame Exploitation
Inside the World of Money Mules
Preventing Malicious Code from "Phoning Home"
Distributed Denial of Service (DDoS) Attacks: Motivations and Methods
Mobile Malicious Code Trends
The Torpig Trojan Exposed
The Laqma Trojan298
BBB: A Threat Analysis of Targeted Spear ߝ Phishing Attacks
Silentbanker Unmuted: An In-Depth Examination of the Silentbaker Trojan Horse
Emerging Economic Models for Software Vulnerability Research
The Cyber Threat Landscape in Russia
Banking Trojans: An Overview
The Russian Business Network: Rise and Fall of a Criminal ISP
IFrame Attacks - An Examination of the Business of IFrame Exploitation
Inside the World of Money Mules
Preventing Malicious Code from "Phoning Home"
Distributed Denial of Service (DDoS) Attacks: Motivations and Methods
Mobile Malicious Code Trends
The Torpig Trojan Exposed
The Laqma Trojan298
BBB: A Threat Analysis of Targeted Spear ߝ Phishing Attacks
Silentbanker Unmuted: An In-Depth Examination of the Silentbaker Trojan Horse
Emerging Economic Models for Software Vulnerability Research
Recenzii
Written and edited by known experts in the field, the content is indeed of high quality and very informative. The logical structure and writing style are excellent, which is a challenging task when there are so many contributors. The book is a must-read for several reader categories. I strongly recommend some of the technical chapters to advanced undergraduate and graduate computer science students. Law students can use the book to grasp the necessary technical background material for investigating cyber fraud. Finally, it is also for readers who wish to learn about the current state of Internet fraud. For all of these readers, this book is a welcome and rewarding addition to the bookshelf.
—Radu State, in Computing Reviews, April 2012
—Radu State, in Computing Reviews, April 2012
Notă biografică
Verisign iDefense Security Intelligence Service, Dulles, Virginia, USA
Descriere
Combining the best of investigative journalism and technical analysis, this title documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes.