10 afleveringen

Cybercrime is a relatively new concern for all of us. As the number of computer owners connected to the internet increases, so too does the opportunity for cybercrime. To fully understand the development of cybercrime one must study the language and culture ofthe internet as well as the pathways that connect users from around the world. This book describes the types of crime generally committed via a computer and the internet. The author deems this knowledge essential to combat the recent surge in internet-related offences. This book begins with the history of cybercrime and relates these to how cybercrime threatens the security of internet users. The stated objective of this book is to give readers a basic understanding of this issue. Though it is full of technical information, its writing style is clear and concise and will not confuse readers with long and unnecessary passages or terminology. Cyberish is made up of various chapters that outline the types and frequencies of various computer crimes currently being committed and the impact that these crimes will likely have in the future. Chapter titles include Cyber-pornography, Identity Theft, Hacking, and Criminal Justice and Cyberspace. Each chapter begins with an explanation of its title and how it applies to the book's overall objective. The author suggests that future efforts should be undertaken to safeguard the information that is frequently stored on electronic media. Overall, this book is designed for every individual who is looking for a quick introduction to the topic of computer crime. It takes basic subtopics of cybercrime and explains them in non-technical, layman's terms. It is small and easily understandable, so its readers will be able to use and reference it whenever needed.

Cyberish Rakhi Wadhwani

    • Technologie

Cybercrime is a relatively new concern for all of us. As the number of computer owners connected to the internet increases, so too does the opportunity for cybercrime. To fully understand the development of cybercrime one must study the language and culture ofthe internet as well as the pathways that connect users from around the world. This book describes the types of crime generally committed via a computer and the internet. The author deems this knowledge essential to combat the recent surge in internet-related offences. This book begins with the history of cybercrime and relates these to how cybercrime threatens the security of internet users. The stated objective of this book is to give readers a basic understanding of this issue. Though it is full of technical information, its writing style is clear and concise and will not confuse readers with long and unnecessary passages or terminology. Cyberish is made up of various chapters that outline the types and frequencies of various computer crimes currently being committed and the impact that these crimes will likely have in the future. Chapter titles include Cyber-pornography, Identity Theft, Hacking, and Criminal Justice and Cyberspace. Each chapter begins with an explanation of its title and how it applies to the book's overall objective. The author suggests that future efforts should be undertaken to safeguard the information that is frequently stored on electronic media. Overall, this book is designed for every individual who is looking for a quick introduction to the topic of computer crime. It takes basic subtopics of cybercrime and explains them in non-technical, layman's terms. It is small and easily understandable, so its readers will be able to use and reference it whenever needed.

    Applicable Laws for Deepfakes

    Applicable Laws for Deepfakes

    Applicable Laws for Deepfakes

    • 50 sec.
    Cyber Security: Game Threats

    Cyber Security: Game Threats

    Online gaming is reaching a new zenith. Did you know: The online gaming industry of India will add approximately 190 million gamers by the year 2021.
    Voice over by Jyoti Nene

    • 8 min.
    Cyber Security: DoS and DDoS

    Cyber Security: DoS and DDoS

    Denial of Services (DoS): An attack to make a system or network resource unavailable to its intended users
    Distributed Denial-of-Service (DDoS): An attack to make a system or network resource unavailable to its intended users by using another computer

    • 5 min.
    Cyber Security: Wi-fi Hacks

    Cyber Security: Wi-fi Hacks

    Yes, a Wi-Fi router can be hacked and you may not even be aware of the same. 
    Highlights:
    Routers with weak encryption such as WEP Security can be hacked easilyUsing Default Wi-Fi Password is the weakest link and the common mistake that most of us do

    • 6 min.
    Cyber Security: Man-In-The-Middle Attack

    Cyber Security: Man-In-The-Middle Attack

    MITM – Eavesdropping or Interception of the communication between two targets for malicious reasons. This type of attack allows the attacker to listen to a conversation that should not be heard.
    Voice over by Jyoti Nene

    • 5 min.
    Cyber Security: Password Theft

    Cyber Security: Password Theft

    Password theft is a common threat in digital age and is the main vector for serious crimes like identity theft and fraud. Passwords are the protection against fraud and lots of confidential and sensitive information however few personnel choose passwords that are really secure and complicated.
    Voice over by Jyoti Nene

    • 4 min.

Top-podcasts in Technologie

Acquired
Ben Gilbert and David Rosenthal
✨Poki - Podcast over Kunstmatige Intelligentie AI
Alexander Klöpping & Wietse Hage
Lex Fridman Podcast
Lex Fridman
De Technoloog | BNR
BNR Nieuwsradio
Bright Podcast
Bright B.V.
Tweakers Podcast
Tweakers