Cybercrime and Preventive Measures: A Quick Guide to Get Yourself Secured and Protected from Digital Threats, Social Media Risks, and Cyber Criminals (English Edition)
()
About this ebook
This book exposes you to a variety of financial frauds committed by cyber criminals and the modus of operandi they adopt while committing cyber crimes along with numerous case studies. The book keeps you informed about what preventive and safety measures can be exercised so that you can protect yourself, your family, and even your workplace.
This book also assists young teenagers and school students about the methods adopted by hackers and how to remain safe while using social media applications and Internet shopping sites. This book talks about the risks involved and preventive measures that need to be taken while using mobile apps.
Related to Cybercrime and Preventive Measures
Related ebooks
Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition) Rating: 0 out of 5 stars0 ratingsDigital Cop: A Digital Cop's Guide to Cyber Security Rating: 0 out of 5 stars0 ratingsMy Data My Privacy My Choice: A Step-by-step Guide to Secure your Personal Data and Reclaim your Online Privacy! Rating: 0 out of 5 stars0 ratingsSecurity Operations in Practice Rating: 0 out of 5 stars0 ratingsCybersecurity in Our Digital Lives Rating: 5 out of 5 stars5/5Risk and Cybersecurity Third Edition Rating: 0 out of 5 stars0 ratingsNational Cyber Security Division Second Edition Rating: 0 out of 5 stars0 ratingsPrivacy A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCyber Security Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThe Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 0 out of 5 stars0 ratingsThe Effects of Cybercrime in the U.S. and Abroad Rating: 0 out of 5 stars0 ratingsIT Governance Critical Issues Series: Cyber Security Rating: 0 out of 5 stars0 ratingsIT Regulatory Compliance in the UK Rating: 0 out of 5 stars0 ratingsCyber Security Audit A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsPrivacy And Cybersecurity A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsCybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard Rating: 0 out of 5 stars0 ratingsHack Attacks Testing: How to Conduct Your Own Security Audit Rating: 0 out of 5 stars0 ratingsIT risk Second Edition Rating: 0 out of 5 stars0 ratingsPersonal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsArtificial Intelligence Ethics and International Law: A TechnoSocial Vision of Artificial Intelligence in the International Life Rating: 0 out of 5 stars0 ratingsPrivacy Impact A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThe Insider Threat: Combatting the Enemy Within Rating: 0 out of 5 stars0 ratingsA concise introduction to the NIS Directive: A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratingsIntrusion Detection Systems A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsAPIs A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsBig Data Privacy Second Edition Rating: 0 out of 5 stars0 ratingsPrivileged Access Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratings
Computers For You
Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5The Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsDeep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Mindhacker: 60 Tips, Tricks, and Games to Take Your Mind to the Next Level Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Artificial Intelligence: The Complete Beginner’s Guide to the Future of A.I. Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsElon Musk Rating: 4 out of 5 stars4/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5
Reviews for Cybercrime and Preventive Measures
0 ratings0 reviews
Book preview
Cybercrime and Preventive Measures - Priyanka Tomar
Cybercrime and
Preventive
Measures
A Quick Guide to Get Yourself Secured and
Protected from Digital Threats, Social
Media Risks, and Cyber Criminals
Priyanka Tomar
Sanjay Gautam
www.bpbonline.com
FIRST EDITION 2021
Copyright © BPB Publications, India
ISBN: 978-93-90684-526
All Rights Reserved. No part of this publication may be reproduced, distributed or transmitted in any form or by any means or stored in a database or retrieval system, without the prior written permission of the publisher with the exception to the program listings which may be entered, stored and executed in a computer system, but they can not be reproduced by the means of publication, photocopy, recording, or by any electronic and mechanical means.
LIMITS OF LIABILITY AND DISCLAIMER OF WARRANTY
The information contained in this book is true to correct and the best of author’s and publisher’s knowledge. The author has made every effort to ensure the accuracy of these publications, but publisher cannot be held responsible for any loss or damage arising from any information in this book.
All trademarks referred to in the book are acknowledged as properties of their respective owners but BPB Publications cannot guarantee the accuracy of this information.
Distributors:
BPB PUBLICATIONS
20, Ansari Road, Darya Ganj
New Delhi-110002
Ph: 23254990/23254991
MICRO MEDIA
Shop No. 5, Mahendra Chambers,
150 DN Rd. Next to Capital Cinema,
V.T. (C.S.T.) Station, MUMBAI-400 001
Ph: 22078296/22078297
DECCAN AGENCIES
4-3-329, Bank Street,
Hyderabad-500195
Ph: 24756967/24756400
BPB BOOK CENTRE
376 Old Lajpat Rai Market,
Delhi-110006
Ph: 23861747
Published by Manish Jain for BPB Publications, 20 Ansari Road, Darya Ganj, New Delhi-110002 and Printed by him at Repro India Ltd, Mumbai
www.bpbonline.com
Dedicated to
Priyanka Tomar's Parents,
Mrs. Abha Tomar and Late Dr. S.S.Tomar
About the Authors
Priyanka Tomar is the Director of New Era System Pvt Ltd and has 18 years of experience in the various IT fields, including Cyber Security & Cyber Forensics. She is a guest faculty at the CBI Academy, Ghaziabad since 2014 and is also an advisor to the Government and private organisations on cybersecurity-related issues, R&D Projects etc.
She is a regular speaker and a discussion panellist at cybersecurity events. Tomar imparts customized Cyber Security Training on cyber security and cyber forensics, such as darknet forensics, cryptocurrency forensics, Cyber Intelligence & Osint, Network Forensics, Protecting Critical Infrastructure, Website Security, Blockchain-based solutions, IoT & Smart Cities Solutions etc.
Cyber Security & Forensics Blogger – www.cyberpathshalaindia.com (A cyber awareness initiative)
www.cybersecurityaudits.blogspot.in
Sanjay Gautam joined the CBI in 2002 and has an experience in the Investigation of the Anti-corruption cases and the Cyber Crime Cases, including the crime against Women and Children. Also, he has provided technical assistance in various hi-profile cases. He has also attended a number of INTERPOL's Train-the-Trainer workshops in India, Cyprus, and South Korea, and was ranked 1st among the various INTERPOL countries. He is a regular Guest Faculty for various Central Training Institutes; was also invited by UNDP & INTERPOL to deliver a lecture in Kuala Lumpur, Malaysia, and he also attended the INTERPOL’s Digital Forensics Experts Meeting in South Korea. He has been imparting training to a large number of Police officers from the CBI, State Police, Judiciary, Security Agencies, CPOs etc. from India, SAARC, ASEAN,