The Locator -- [(title = "Catfish")]

315 records matched your query       


Record 4 | Previous Record | MARC Display | Next Record | Search Results
Author:
Barker, Jessica (Cyber security), author.
Title:
Hacked : the secrets behind cyber attacks / Jessica Barker.
Publisher:
Kogan Page Limited,
Copyright Date:
2024
Description:
xiv, 284 pages ; 20 cm
Subject:
Computer crimes.
Computer crimes--Prevention.
Cyberterrorism.
Computer security.
Notes:
Includes bibliographical references and index.
Contents:
Conclusion: staying safe from cyber attacks Phishing -- Email phishing -- Business email compromise -- Phishing phnone calls -- Caller ID spoofing -- Phishing messages -- QR code phishing -- Hybrid phishing -- Protect against phishing -- Notes -- Account compromise -- Passwords -- SMS 2FA -- Stronger 2FA -- 2FA fatigue -- Password managers -- Advice for securing your accounts -- Notes -- Vulnerabilities and exploits -- Zero-day vulnerabilities -- N-day vulnerabilities - A vacuum of patches -- The vulnerability ecosystem -- Vulnerabilities and different devices -- Managing vulnerabilities and mitigating exploits -- Romance fraud -- The psychological strategy of romance scammers -- When you are the catfish -- Social media and romance scams -- The psychology of romance fraud -- The impact of romance fraud on victims -- Sextortion: image-based sexual abuse -- Spotting romance fraud red flags and staying safe -- Notes -- Cyber fraud -- What makes a fraudster? -- The strategy and tactics of a fraud - Authorized fraud -- Unauthorized fraud -- How criminals cash out: money mules -- The impact of fraud -- Fighting fraud: how to stay safe -- Notes -- Identity fraud -- The impact of identity fraud on victims -- The scale of identity theft and identity fraud -- The tactics of identity fraudsters -- Identity fraud and cyber crime - Avoiding identity theft -- Notes -- Social; media scams -- Fake people -- Fake goods -- Fake influencer opportunities -- Fake jobs -- Fake news -- t Surging social media scams -- Stay social media savvy -- Notes -- Malicious insiders -- What motivates malicious insiders? -- Formula 1 spygate -- A wake-up call -- The impact of malicious insiders -- Malicious insiders and the human side of cyber security -- How businesses can protect against malicious insiders -- Notes -- Malware -- Worms -- Viruses -- The global reach of malware -- Trojans -- Ransomware -- Malware-as-a-service -- Spyware -- Protecting against malware -- Notes -- Randomware -- Cryptocurrency -- An evolving ransomware business model -- Big game hunting in randsomware -- Law enforcement whack-a-mole -- Borders in a borderless crime -- Insurance, brokers, and negotiators -- To pay or not pay, is that the question? -- Ransomware mitigations and managing an incident -- Notes -- Internet of Tings (IoT) -- Default passwords -- THe Mirai fallout -- Lessons from Mirai -- Mirai's legacy -- Security the Internet of Things -- Cyber security in an increasingly connected world -- Notes -- Cryptocurrency crime -- Pig-butchering scams -- Billions of cryptocurrecy -- Cyrptocurrency: untraceable money? -- Cryptocurrency investigations and the return on investtment -- Not all exchanges are equal -- Staying safe with cryptocurrency -- Notes -- Artificial intelligence -- The rise of the machines -- AI: a force multiplier of fear, uncertainty, and doubt -- Gabage in, garbage, out -- Large language models -- Deepfakes -- National and international implications of AI -- Organizational implications of AI -- Implications of AI for individuals -- Plausible deniability -- Staying cyber safe in an AI age -- Notes -- Conclusion: staying safe from cyber attacks
Summary:
When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats. Hacked offers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target. Featuring expert commentary from world-leading cybersecurity experts and ethical hackers, this book uncovers the fascinating stories of the most insidious and notorious cyber attacks, including how the Mirai malware almost took down the internet and how a supply chain attack infiltrated the US government and other global institutions. From social engineering and data theft to ransomware and Distributed Denial-of-Service (DDoS) attacks, there are numerous strategies that hackers use to target our finances and data. Uncover their secrets and learn how to safeguard your data with Hacked. -- amazon.com
ISBN:
1398613703
9781398613706
139861372X
9781398613720
OCLC:
(OCoLC)1371585054
Locations:
USUX851 -- Iowa State University - Parks Library (Ames)

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.