Description
This book has been divided into two parts. The learning outcomes from each are as follows:
PART -1
The reader will gain awareness of how fraudsters:
– acquire one-time passwords via social engineering to commit OTP- based crimes.– exploit vulnerabilities to create false ATMs.– take advantage of poor over-sight mechanisms to remain undetected.– exploit air gaps to manipulate data in transit for fraud.– mislink accounts in a cross-institutional content to syphon off funds.– launder stolen proceeds.– take advantage of default configurations to gain unauthorized network privileges and how to devise counter-measures to deter such frauds.
PART -2
The Reader will gain awareness of how:
– hackers break into android smartphones to steal OTP and other confidential information– encrypted information to and from your smartphone or computer can be intercepted– the computer can be hacked with or without social-engineering– websites are scanned for vulnerabilities and exploited– enemy computers are targeted in cyber wars– Security Operations Centers function and tactical and policy measures to counter such threats.
Table of Contents
PART-l
Chapter 1: Introduction.
Chapter 2: Hijacking the One-Time Password.
Chapter 3: Confusing the Watchdog.
Chapter 4: Mismatching of Customer Accounts.
Chapter 5: Closing Air- Gaps.
Chapter 6: Two-Factor Authentication of Micro ATM Devices.
Chapter 7: Enforcing Accountability at choke-points.
Chapter 8: Electronic Money Laundering.
Chapter 9: Hardening Default Configurations.
Chapter 10: Fraud in the Call Centre.
PART-lI
Chapter 11: Man in the middle attacks on Banking Devices.
Chapter 12: Attack on Android Customer Phones.
Chapter 13: Hacking Windows 10 Personal Computers.
Chapter 14: The Anatomy of Cyber War.
Chapter 15: Inside a Security Operations Centre.
Chapter 16: Towards a National Cyber Security Policy.
Appendix-1
Appendix-2
Author
Debtoru Chatterjee
Debtoru Chatterjee, a senior civil servant, has served 11 years in a central police organization, including as an Inspector General, besides a five-year stint as an army Colonel. An honors graduate from Presidency College Calcutta, he holds an M.Sc.(Distinction) in Cyber Forensics and Information Security from the University of Madras; an MBA (IT Systems) (Distinction) from ICFAI; and a Masters in Business Laws from National Law School, Bangalore. Besides being a keen student of Kali Linux and Python, he is the author of Presidential Discretion, a constitutional study.
Reviews
There are no reviews yet.