Cybercrime: How to Avoid Becoming a VictimUniversal-Publishers, 2007 - 324 psl. "Cybercrime: How to Avoid Becoming a Victim" is a nuts and bolts, how-to guide for the typical home-computer user. It addresses the various crimes being committed via the Internet and gives instructions on how to avoid becoming a victim of each. The chapters dealing with individual cybercrimes are laid out in a format consisting of a discussion of the basics of the crime, followed by real-life examples of the particular crime, and then things computer users can do to avoid becoming a victim of the crime. Also included in the book is a chapter on the role of organized crime in Internet fraud and another chapter on Internet hoaxes. In addition, an appendix gives information on where to report various cybercrimes and another appendix gives definitions of cybercrime terms. To illustrate specific crimes, over 200 actual case reports are used. |
Turinys
1 | |
13 | |
20 | |
Tips to Protect Yourself | 27 |
Business Opportunity and Job Scams | 32 |
Tips to Protect Yourself | 41 |
Tips to Protect Yourself | 49 |
Tips to Protect Yourself | 55 |
Vishing | 166 |
Examples of Immigration Fraud | 172 |
Tips to Protect Yourself | 178 |
Tips to Protect Yourself | 184 |
Loan and Grant Scams | 190 |
Tactics | 203 |
Overpayment Scam | 216 |
Email Chain Letters | 230 |
Tips to Protect Yourself | 61 |
Slamming | 68 |
Credit Card Fraud | 72 |
Cyberbullying | 86 |
Cyberstalking | 99 |
Cyber Snake Oil | 115 |
Cyberterrorism | 127 |
Dating Marriage and Divorce Scams | 133 |
Education Scams | 141 |
Gambling Fraud | 149 |
Online Sports Betting | 152 |
Tips to Protect Yourself | 160 |
Prostitution | 233 |
Tips to Protect Yourself | 243 |
How They Get Your Email Address | 250 |
Travel Scams | 256 |
Viruses Worms Trojans and Spyware | 263 |
Spyware | 267 |
Hoaxes | 276 |
How to Recognize Hoaxes | 285 |
Appendix B Cybercrime Glossary | 291 |
304 | |
Pagrindiniai terminai ir frazės
account number advance fee advertised anti-spyware antivirus arrested attack bank account billing bogus browser hijackers charges chat rooms child pornography claims Computer Viruses consumers credit card number credit repair Crime crimeware criminal cyberbullying Cybercrime cyberstalking delete downloaded eBay email address employment scams fake Federal Trade Commission files fraudulent hackers hacking hoaxes identity theft illegal instant messaging Internet Fraud Internet Fraud Watch Internet service provider investment keystroke logger laptop legitimate loan lottery scam malicious Milhorn million offer online auction password payment personal information phishing phone number police popup purchase pyramid scheme receive scammer scholarship sell seller sent sexual Social Security number someone spam spyware stolen Symantec target TIPS TO PROTECT Trojan unsolicited emails upfront users virus Viruses to Twin webpage wireless worm