Contents
Cybercrime, Cybercriminals, and Classifications of Cybercrimes • Cybercrime Fundamentals • Cybercrime Law • Iterative Approach Methodology for Cybercrimes
• The Psychology, Mindset, And Skills of Hackers and Cybercriminals
• Tools & Methods Used in Cybercrimes
• Personal Data Breach
• Phishing / Vishing / Smishing / Pharming
• Identity Theft
• Credit Card Fraud
• Cyber Extortion
• Identity Theft and Government Impersonation
• Malware Dissemination (Virus, Worm, Ransomware, Trojan, Backdoor, …)
• Large Scale Attack (Cyberterrosim, Hacktivism,…)
• Denial of Service (Dos or DDOS)
• Cybervandalism
• Software Piracy and Counterfeiting of Programs • Data Leak • Cybercrime Risk Management
• Authentication (Multifactor Authentication, SSO, OTP, ...)
• Confidentiality and Privacy (Encryption, Anonymization, ...)
• Data Integrity
• Non-Repudiation
• High Availability
• Traceability and History of Electronic Acts and Actors
• Cryptographic Solutions
• Role of PKI Systems and The Electronic Identification
• Digital Signature Mechanisms and Standards
• Cyber Terrorism and Cyber Warfare
• Cost of Cybercrimes • Cybercrime – Illustrations with Case Studies
• The Future of Cybercrimes
• Recommendation on The Protection of The Cybercrimes for Government, Businesses and Individuals.