4 An Introduction to Cybercrime and Cybersecurity
The Whys and Whos of Cybersecurity
Riddhita Parikh
CONTENTS
- Introduction
- Literature Review
- The Origin
- Cyberspace and Netizen
- Cyberspace and the 21st Century
- Cybercrime
- Classification of Cybercrime
- Forgery and Counterfeiting
- Software Piracy and Crime Related to IPRs
- Cyber Terrorism
- Phishing
- Cyber Vandalism
- Computer Hacking
- Spamming
- Cross Site Scripting
- Online Auction Fraud
- Logic Bombs
- Internet Time Thefts
- Denial of Service Attack
- Salami Attack
- Data Diddling
- Email Spoofing
- Cyber Stalking
- Child Pornography
- Adult Pornography
- Harassment Through E-Mails
- Defamation
- Morphing
- Trolling
- Cybersecurity and ...
Get Cybersecurity for Decision Makers now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.