Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.Two of the main threats are spoofing and phishing; they are relatively easy to perpetrate and many people are unaware of ... Spoofing is the forgery of an email header to get the recipient to open an email that appears to have originated from anbsp;...
|Title||:||Cyber Crime: Concepts, Methodologies, Tools and Applications|
|Author||:||Management Association, Information Resources|
|Publisher||:||IGI Global - 2011-11-30|