Description
This book has been divided into two parts. The learning outcomes from each are as follows:
PART -1
The reader will gain awareness of how fraudsters:
– acquire one-time passwords via social engineering to commit OTP- based crimes.
– exploit vulnerabilities to create false ATMs.
– take advantage of poor over-sight mechanisms to remain undetected.
– exploit air gaps to manipulate data in transit for fraud.
– mislink accounts in a cross-institutional content to syphon off funds.
– launder stolen proceeds.
– take advantage of default configurations to gain unauthorized network privileges and how to devise counter-measures to deter such frauds.
PART -2
The Reader will gain awareness of how:
– hackers break into android smartphones to steal OTP and other confidential information
– encrypted information to and from your smartphone or computer can be intercepted
– the computer can be hacked with or without social-engineering
– websites are scanned for vulnerabilities and exploited
– enemy computers are targeted in cyber wars
– Security Operations Centers function and tactical and policy measures to counter such threats.
Table of Contents
PART-l
Chapter 1: Introduction.
Chapter 2: Hijacking the One-Time Password.
Chapter 3: Confusing the Watchdog.
Chapter 4: Mismatching of Customer Accounts.
Chapter 5: Closing Air- Gaps.
Chapter 6: Two-Factor Authentication of Micro ATM Devices.
Chapter 7: Enforcing Accountability at choke-points.
Chapter 8: Electronic Money Laundering.
Chapter 9: Hardening Default Configurations.
Chapter 10: Fraud in the Call Centre.
PART-lI
Chapter 11: Man in the middle attacks on Banking Devices.
Chapter 12: Attack on Android Customer Phones.
Chapter 13: Hacking Windows 10 Personal Computers.
Chapter 14: The Anatomy of Cyber War.
Chapter 15: Inside a Security Operations Centre.
Chapter 16: Towards a National Cyber Security Policy.
Appendix-1
Appendix-2
Author
Debtoru Chatterjee
Debtoru Chatterjee, a senior civil servant, has served 11 years in a central police organization, including as an Inspector General, besides a five-year stint as an army Colonel. An honors graduate from Presidency College Calcutta, he holds an M.Sc.(Distinction) in Cyber Forensics and Information Security from the University of Madras; an MBA (IT Systems) (Distinction) from ICFAI; and a Masters in Business Laws from National Law School, Bangalore. Besides being a keen student of Kali Linux and Python, he is the author of Presidential Discretion, a constitutional study.
Only logged in customers who have purchased this product may leave a review.
Reviews
There are no reviews yet.