O'Reilly logo

Computer Security Fundamentals, Second Edition by William Easttom

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Cyber Stalking, Fraud, and Abuse

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

• Know the various types of Internet investment scams and auction frauds

• Know specific steps one can take to avoid fraud on the Internet

• Have an understanding of what identity theft is and how it is done

• Know specific steps that can be taken to avoid identity theft

• Understand what cyber stalking is, and be familiar with relevant laws

• Know how to configure a web browser’s privacy settings

• Know what laws apply to these computer crimes

Introduction

In every new frontier, a criminal element is bound to emerge. In times past, the high seas gave rise to pirates, and America’s wild ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required