Cybercrime and digital forensics / Shane Taylor and Breeda Prichet
Material type: TextPublication details: United Kingdom Kruger Brentt Publishers 2023Description: 329 pISBN:- 9781787150690
- 363.2596 TAY-S
Item type | Current library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|---|
Books | BITS Pilani Hyderabad | 360 | General Stack (For lending) | 363.2596 TAY-S (Browse shelf(Opens below)) | GBP 119.95. | Available | 48076 |
Browsing BITS Pilani Hyderabad shelves, Shelving location: General Stack (For lending), Collection: 360 Close shelf browser (Hides shelf browser)
363.2596 DEJ Cyber forensics in India : | 363.2596 MAL-Y Cybersecurity and privacy in cyber-physical systems / | 363.2596 SCH-C Botnets : the killer web app | 363.2596 TAY-S Cybercrime and digital forensics / | 363.25963 DAV-D Lying for money : | 363.25968 BRI-M Computer forensics and cyber crime : | 363.25968 HOL-T Cybercrime and digital forensics : an introduction / |
Cybercrime is a dangerous attack a company or an individual may face. There are many cases where the cyber attack has brought massive loss to the company and individuals due to the date hack. We live in a technology driven era, and every piece of information is now fed on computers. Cybercrime involves an attack on computers and digital devices. These cyber attacks can prove hazardous not just for the organization, but also for the nation. To date, there are many digital attack cases in India and global, pushing for more security measures. These attacks are also affecting the economy of the country if not controlled in the initial stage. Cybercrime or attack is defined as the systematic criminal activity occurring digitally and done by attackers. There are many examples of cybercrime, including fraud, malware viruses, cyber stalking and others. Due to others, government agencies and companies are investing more in the maintenance and hiring of cybercrime experts. Earlier, cybercrime was committed only by individuals or by small groups. However, now a highly complex cyber criminals network on attacking the system for data collection.
There are no comments on this title.