This book has been Divided into two parts. The learning outcomes from each are as follows:
Part -1
• The reader will gain awareness of how fraudsters:
• acquire one- time passwords via social engineering to commit OTP- based crime
• exploit vulnerabilities to create false ATMs
• take advantage of poor over-sight mechanisms to remain undetected
• exploit air-gaps to manipulate data in transit for fraud
• mislink accounts in a cross-institutional content to syphon off funds
• launder stolen proceeds
• take advantage of default configurations to gain unauthorised network privileges and how to devise counter- measures to deter such frauds.
PART-2
• The Reader will gain awareness of how:
• hackers break in to android smartphones to steal OTP and other confidential information
• encrypted information to and from your smartphone or computer can be intercepted
• computer can be hacked with or without social-engineering
• websites are scanned for vulnerabilities and exploited
• enemy computers are targeted in cyber wars
• Security Operations Centers function and tactical and policy measures to counter such threats.
Read More
Specifications
Book Details
Imprint
Khanna Publishing House
Publication Year
2022
Book Type
Cyber Crime
Table of Contents
PART-l
1. Introduction
2. Hijacking the One Time Password
3. Confusing the Watchdog
4. Mismatching of Customer Accounts
5. Closing Air- Gaps
6. Two- Factor Authentication of Micro ATM Devices
7. Enforcing Accountability at choke-points
8. Electronic Money Laundering
9. Hardening Default Configurations
10. Fraud in the Call Centre
PART-ll
11. Man in the middle attacks on Banking Devices
12. Attack on Android Customer Phones
13. Hacking Windows 10 Personal Computers
14. The Anatomy of Cyber War
15. Inside a Security Operations Centre
16. Towards a National Cyber Security Policy
Appendix-1, Appendix-2
Contributors
Author Info
Debtoru Chatterjee: Debtoru Chatterjee, a Senior civil servant, has served 11 years in a central police organization, including as an Inspector general, besides a five-year stint as an army Colonel. An Honors graduate from Presidency College Calcutta, he holds an M.Sc. (Distinction) In Cyber Forensics and information Security from the University of Madras; an MBA (IT Systems) (Distinction) from ICFAI; and a Masters in Business Laws from National Law School, Bangalore, besides being a keen student of Kali Linux and Python, he is the author of Presidential Discretion, a constitutional study.