Cyberish show


Summary: Cybercrime is a relatively new concern for all of us. As the number of computer owners connected to the internet increases, so too does the opportunity for cybercrime. To fully understand the development of cybercrime one must study the language and culture ofthe internet as well as the pathways that connect users from around the world. This book describes the types of crime generally committed via a computer and the internet. The author deems this knowledge essential to combat the recent surge in internet-related offences. This book begins with the history of cybercrime and relates these to how cybercrime threatens the security of internet users. The stated objective of this book is to give readers a basic understanding of this issue. Though it is full of technical information, its writing style is clear and concise and will not confuse readers with long and unnecessary passages or terminology. Cyberish is made up of various chapters that outline the types and frequencies of various computer crimes currently being committed and the impact that these crimes will likely have in the future. Chapter titles include Cyber-pornography, Identity Theft, Hacking, and Criminal Justice and Cyberspace. Each chapter begins with an explanation of its title and how it applies to the book's overall objective. The author suggests that future efforts should be undertaken to safeguard the information that is frequently stored on electronic media. Overall, this book is designed for every individual who is looking for a quick introduction to the topic of computer crime. It takes basic subtopics of cybercrime and explains them in non-technical, layman's terms. It is small and easily understandable, so its readers will be able to use and reference it whenever needed.

Join Now to Subscribe to this Podcast
  • RSS
  • Artist: Rakhi Wadhwani
  • Copyright: Copyright 2021 Rakhi Wadhwani


 Cyber Security: Game Threats | File Type: audio/mpeg | Duration: 529

Online gaming is reaching a new zenith. Did you know: The online gaming industry of India will add approximately 190 million gamers by the year 2021.Voice over by Jyoti Nene

 Cyber Security: DoS and DDoS | File Type: audio/mpeg | Duration: 311

Denial of Services (DoS): An attack to make a system or network resource unavailable to its intended usersDistributed Denial-of-Service (DDoS): An attack to make a system or network resource unavailable to its intended users by using another computer

 Cyber Security: Wi-fi Hacks | File Type: audio/mpeg | Duration: 387

Yes, a Wi-Fi router can be hacked and you may not even be aware of the same. Highlights: Routers with weak encryption such as WEP Security can be hacked easily Using Default Wi-Fi Password is the weakest link and the common mistake that most of us do

 Cyber Security: Man-In-The-Middle Attack | File Type: audio/mpeg | Duration: 327

MITM – Eavesdropping or Interception of the communication between two targets for malicious reasons. This type of attack allows the attacker to listen to a conversation that should not be heard.Voice over by Jyoti Nene

 Cyber Security: Password Theft | File Type: audio/mpeg | Duration: 288

Password theft is a common threat in digital age and is the main vector for serious crimes like identity theft and fraud. Passwords are the protection against fraud and lots of confidential and sensitive information however few personnel choose passwords that are really secure and complicated.Voice over by Jyoti Nene

 Cyber Security: Phishing a variant of Social Engineering | File Type: audio/mpeg | Duration: 356

Do you know Phishing is a variant of social engineering – thus, evading controls via trust. Phishing attacks and crime have grown in large numbers in the recent years because of the simplicity in launching the attack and the amount of information the cybercriminals get successfully.Voice Over by Jyoti Nene

 Cyber Security: Preventing Email Spoofing | File Type: audio/mpeg | Duration: 249

E-Mail Spoofing one of the most common and top vector used by cybercriminals for unethical activities and one of the preferred types of email attacks are Business Email Compromise (BEC). In this type of attack, most of the email users receive an email that has been spoofed.Voice Over by Jyoti Nene

 Cyber Security: Malware | File Type: audio/mpeg | Duration: 284

Do you rouse and rummage around for your mobile phone? In the earlier days, technology was restricted to academics and business then and had little impact on individual however in this Digital Age, communication with each other regardless of time and distance has made life easy for all of us. Although advancement in technology has helped individuals in reaching out to each other; it has it owns drawbacks and negative impact as well – Emerging Cyber ThreatsVoice Over by Jyoti Nene

 About Rakhi R Wadhwani | File Type: audio/mpeg | Duration: 70

Rakhi R Wadhwani is a published author, auditor and trainer in cyber security having over 20 years+ experience working as a Technology Professional, holding multiple certifications in Digital Forensics, Ethical Hacking, and Information Security.Voice Over by Jyoti Nene


Login or signup comment.