Cyber Fraud: Tactics, Techniques and Procedures, 1st Edition (Paperback) book cover

Cyber Fraud

Tactics, Techniques and Procedures, 1st Edition

By Rick Howard

Auerbach Publications

520 pages

Purchasing Options:$ = USD
Paperback: 9780367385743
pub: 2019-08-30
SAVE ~$14.99
Available for pre-order
$74.95
$59.96
x
Hardback: 9781420091274
pub: 2009-04-23
SAVE ~$19.19
$95.95
$76.76
x
eBook (VitalSource) : 9780429186004
pub: 2009-04-23
from $47.98


FREE Standard Shipping!

Description

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy.





Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas.





This eye-opening work includes a variety of case studies ― including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network’s (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.

Table of Contents

Cyber Fraud: Principles, Trends, and Mitigation Techniques. The Cyber Threat Landscape in Russia. Banking Trojans: An Overview. The Russian Business Network: Rise and Fall of a Criminal ISP. IFrame Attacks - An Examination of the Business of IFrame Exploitation. Inside the World of Money Mules. Preventing Malicious Code from "Phoning Home". Distributed Denial of Service (DDoS) Attacks: Motivations and Methods. Mobile Malicious Code Trends. The Torpig Trojan Exposed. The Laqma Trojan298. BBB: A Threat Analysis of Targeted Spear – Phishing Attacks. Silentbanker Unmuted: An In-Depth Examination of the Silentbaker Trojan Horse. Emerging Economic Models for Software Vulnerability Research.

About the Author

Verisign iDefense Security Intelligence Service, Dulles, Virginia, USA

Subject Categories

BISAC Subject Codes/Headings:
BUS073000
BUSINESS & ECONOMICS / Commerce
BUS083000
BUSINESS & ECONOMICS / Information Management
COM032000
COMPUTERS / Information Technology
COM053000
COMPUTERS / Security / General