Book description
Defend your business, protect your livelihood, safeguard your future.
Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits to create malware are now readily available to anyone wishing to defraud and do damage. For your business to survive and thrive, it is vital to stay informed about the threats and the risks, and arm yourself against them.
Know your enemy
An Introduction to Hacking Crimewareis a comprehensive guide to the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.
Fighting back
In this pocket guide, the author:
defines exactly what crimeware is – both intentional and unintentional – and gives specific, up-to-date examples to help you identify the risks and protect your business
explores the increasing use of COTS tools as hacking tools, exposing the enemy's tactics gives practical suggestions as to how you can fight back
provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business.
Table of contents
- Cover
- Title
- Copyright
- Preface
- About The Author
- Acknowledgements
- Contents
- Introduction
- Chapter 1: Background
- Chapter 2: Crimeware Products
- Chapter 3: Unintentional Crimeware
- Chapter 4: The Present and The Future
- Chapter 5: Fighting Back
- Conclusion
- Authoritative Sources Of Information
- Bibliography
- ITG Resources
Product information
- Title: An Introduction to Hacking and Crimeware
- Author(s):
- Release date: January 2012
- Publisher(s): IT Governance Publishing
- ISBN: 9781849283304
You might also like
book
Penetration Testing
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important …
book
Cybersecurity Law
A definitive guide to cybersecurity law Expanding on the author’s experience as a cybersecurity lawyer and …
book
End-to-End Network Security: Defense-in-Depth
End-to-End Network Security Defense-in-Depth Best practices for assessing and improving network defenses and responding to security …
book
Tribe of Hackers Red Team
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. …