Defend your business, protect your livelihood, safeguard your future.
Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits to create malware are now readily available to anyone wishing to defraud and do damage. For your business to survive and thrive, it is vital to stay informed about the threats and the risks, and arm yourself against them.
Know your enemy
An Introduction to Hacking Crimewareis a comprehensive guide to the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.
In this pocket guide, the author:
defines exactly what crimeware is – both intentional and unintentional – and gives specific, up-to-date examples to help you identify the risks and protect your business
explores the increasing use of COTS tools as hacking tools, exposing the enemy's tactics gives practical suggestions as to how you can fight back
provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business.
Table of contents
- About The Author
- Chapter 1: Background
- Chapter 2: Crimeware Products
- Chapter 3: Unintentional Crimeware
- Chapter 4: The Present and The Future
- Chapter 5: Fighting Back
- Authoritative Sources Of Information
- ITG Resources
- Title: An Introduction to Hacking and Crimeware
- Release date: January 2012
- Publisher(s): IT Governance Publishing
- ISBN: 9781849283304
You might also like
A practicing engineer's inclusive review of communication systems based on shared-bus and shared-memory switch/router architectures This …
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the …
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
The Startup Owner's Manual
More than 100,000 entrepreneurs rely on this book for detailed, step-by-step instructions on building successful, scalable, …