Book description
Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. This volume explores the state of threats present in the cyber fraud underground. It discusses phishing/pharming, trojans/toolkits, direct threats, and pump-and-dump scams. By examining the operations of the cyber criminal, the book provides perspective into the general incentives, risks, and behavioral patterns of the fraudsters. Armed with this information, organizations and individuals are better able to develop countermeasures and crafting tactics to disrupt the fraud underground and secure their systems.
Table of contents
- Front cover
- Contents (1/3)
- Contents (2/3)
- Contents (3/3)
- Introduction
- PART I: UNDERGROUND CULTURE
- Chapter 1. Emerging Economic Models for Software Vulnerability Research (1/4)
- Chapter 1. Emerging Economic Models for Software Vulnerability Research (2/4)
- Chapter 1. Emerging Economic Models for Software Vulnerability Research (3/4)
- Chapter 1. Emerging Economic Models for Software Vulnerability Research (4/4)
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques (1/10)
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques (2/10)
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques (3/10)
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques (4/10)
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques (5/10)
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques (6/10)
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques (7/10)
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques (8/10)
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques (9/10)
- Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques (10/10)
- Chapter 3. The Cyber Threat Landscape in Russia (1/14)
- Chapter 3. The Cyber Threat Landscape in Russia (2/14)
- Chapter 3. The Cyber Threat Landscape in Russia (3/14)
- Chapter 3. The Cyber Threat Landscape in Russia (4/14)
- Chapter 3. The Cyber Threat Landscape in Russia (5/14)
- Chapter 3. The Cyber Threat Landscape in Russia (6/14)
- Chapter 3. The Cyber Threat Landscape in Russia (7/14)
- Chapter 3. The Cyber Threat Landscape in Russia (8/14)
- Chapter 3. The Cyber Threat Landscape in Russia (9/14)
- Chapter 3. The Cyber Threat Landscape in Russia (10/14)
- Chapter 3. The Cyber Threat Landscape in Russia (11/14)
- Chapter 3. The Cyber Threat Landscape in Russia (12/14)
- Chapter 3. The Cyber Threat Landscape in Russia (13/14)
- Chapter 3. The Cyber Threat Landscape in Russia (14/14)
- Chapter 4. The Cyber Threat Landscape in Brazil (1/8)
- Chapter 4. The Cyber Threat Landscape in Brazil (2/8)
- Chapter 4. The Cyber Threat Landscape in Brazil (3/8)
- Chapter 4. The Cyber Threat Landscape in Brazil (4/8)
- Chapter 4. The Cyber Threat Landscape in Brazil (5/8)
- Chapter 4. The Cyber Threat Landscape in Brazil (6/8)
- Chapter 4. The Cyber Threat Landscape in Brazil (7/8)
- Chapter 4. The Cyber Threat Landscape in Brazil (8/8)
- Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP (1/8)
- Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP (2/8)
- Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP (3/8)
- Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP (4/8)
- Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP (5/8)
- Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP (6/8)
- Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP (7/8)
- Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP (8/8)
- Chapter 6. Banking Trojans: An Overview (1/10)
- Chapter 6. Banking Trojans: An Overview (2/10)
- Chapter 6. Banking Trojans: An Overview (3/10)
- Chapter 6. Banking Trojans: An Overview (4/10)
- Chapter 6. Banking Trojans: An Overview (5/10)
- Chapter 6. Banking Trojans: An Overview (6/10)
- Chapter 6. Banking Trojans: An Overview (7/10)
- Chapter 6. Banking Trojans: An Overview (8/10)
- Chapter 6. Banking Trojans: An Overview (9/10)
- Chapter 6. Banking Trojans: An Overview (10/10)
- Chapter 7. Inside the World of Money Mules (1/4)
- Chapter 7. Inside the World of Money Mules (2/4)
- Chapter 7. Inside the World of Money Mules (3/4)
- Chapter 7. Inside the World of Money Mules (4/4)
- PART II: UNDERGROUND INNOVATION
- Chapter 8. IFrame Attacks - An Examination of the Business of IFrame Exploitation (1/5)
- Chapter 8. IFrame Attacks - An Examination of the Business of IFrame Exploitation (2/5)
- Chapter 8. IFrame Attacks - An Examination of the Business of IFrame Exploitation (3/5)
- Chapter 8. IFrame Attacks - An Examination of the Business of IFrame Exploitation (4/5)
- Chapter 8. IFrame Attacks - An Examination of the Business of IFrame Exploitation (5/5)
- Chapter 9. Distributed Denial of Service (DDoS) Attacks: Motivations and Methods (1/6)
- Chapter 9. Distributed Denial of Service (DDoS) Attacks: Motivations and Methods (2/6)
- Chapter 9. Distributed Denial of Service (DDoS) Attacks: Motivations and Methods (3/6)
- Chapter 9. Distributed Denial of Service (DDoS) Attacks: Motivations and Methods (4/6)
- Chapter 9. Distributed Denial of Service (DDoS) Attacks: Motivations and Methods (5/6)
- Chapter 9. Distributed Denial of Service (DDoS) Attacks: Motivations and Methods (6/6)
- Chapter 10. The Torpig Trojan Exposed (1/4)
- Chapter 10. The Torpig Trojan Exposed (2/4)
- Chapter 10. The Torpig Trojan Exposed (3/4)
- Chapter 10. The Torpig Trojan Exposed (4/4)
- Chapter 11. The Lagma Trojan* (1/4)
- Chapter 11. The Lagma Trojan* (2/4)
- Chapter 11. The Lagma Trojan* (3/4)
- Chapter 11. The Lagma Trojan* (4/4)
- Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks (1/8)
- Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks (2/8)
- Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks (3/8)
- Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks (4/8)
- Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks (5/8)
- Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks (6/8)
- Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks (7/8)
- Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks (8/8)
- Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse (1/8)
- Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse (2/8)
- Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse (3/8)
- Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse (4/8)
- Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse (5/8)
- Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse (6/8)
- Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse (7/8)
- Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse (8/8)
- Chapter 14. Preventing Malicious Code from "Phoning Home" (1/2)
- Chapter 14. Preventing Malicious Code from "Phoning Home" (2/2)
- Chapter 15. Mobile Malicious Code Trends (1/2)
- Chapter 15. Mobile Malicious Code Trends (2/2)
- Epilogue
- Index (1/7)
- Index (2/7)
- Index (3/7)
- Index (4/7)
- Index (5/7)
- Index (6/7)
- Index (7/7)
- Back cover
Product information
- Title: Cyber Fraud
- Author(s):
- Release date: April 2009
- Publisher(s): Auerbach Publications
- ISBN: 9781420091281
You might also like
book
Cyber Minds
Cyber Minds brings together an unrivalled panel of international experts who offer their insights into current …
book
The Fraud Audit: Responding to the Risk of Fraud in Core Business Systems
Essential guidance for creation of an effective fraud audit program in core business systems The Association …
book
A Comprehensive Look at Fraud Identification and Prevention
Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the …
book
Cybercrime Investigation Case Studies
Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing …