Cyber Security - Flier - SlideShare

SlideShare Explore Search You

Upload Login Signup


Submit Search

Home Explore Presentation Courses PowerPoint Courses by LinkedIn Learning Search Successfully reported this slideshow. We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

HEAD OFFICE: 4435-36/7, Ansari Road, Daryaganj, New Delhi-110002. Tel: 91-11-43630000 Fax: 91-11-23275895. Email: csupport... Upcoming SlideShare Loading in …5 × 1 of 2

Cyber Security - Flier 393 views Share Like Download ...

Sunit Belapure Follow Published on Nov 17, 2015

0 Comments 1 Like Statistics Notes

Full Name Comment goes here. 12 hours ago Delete Reply Block Are you sure you want to Yes No Your message goes here

Share your thoughts… Post Be the first to comment

Pavitra Muttagi , Software Engineer at Koncero Software at Koncero 7 months ago No Downloads Views Total views 393 On SlideShare 0 From Embeds 0 Number of Embeds 10 Actions Shares 0 Downloads 7 Comments 0 Likes 1 Embeds 0 No embeds No notes for slide

Cyber Security - Flier

1. 1. CompanionCDcontains: • 3Chapters † Chapter 10 – Cybercrime and Cyberterrorism: Social, Political, Ethical and Psychological Dimensions † Chapter 11 – Cybercrime: Illustrations, Exam- plesandMini-Cases † Chapter12–Careersin Cybersecurity • 23 appendices with guidelines, checklists and handyreferencetorelevantIndianActs. by Nina Godbole, Sunit Belapure ABOUT THE BOOK ABOUTTHEAUTHORS • This book, focusing on cyberthreats and cybersecurity, provides the much needed awareness in the times of growing cybercrime episodes. • Comprehensive treatment of important topic – cybersecurity to help readersunderstandtheimplicationsofcybercrime. • The book provides adequate orientation on laws in reference to cybercrime and cybersecurity taking into account the Indian as well asglobalscenario. • Awareness created through simple practical tips and tricks, educates readers to learn how to avoid becoming victims of cybercrime. • Written by InfoSec domain SME and co-authored by qualified ethical hackingprofessionalwhoisalsoasecuritycertifiedprofessional. • Well-presented case illustrations and examples from real life underlinethesignificanceoftopicsaddressedineachchapter. Nina Godbole is an author of the book Information Systems Security: Security Management, Metrics, Frameworks and Best Practices published by Wiley India in January 2009. She is also on the Editorial Board of IEEE Computer Society for their IT Professional bimonthly publications. She has published numerous articles on topics in leading IT magazines. She has a vast work experience in the IT industry in Software Quality Assurance, systems analysis and design, application support services as well as application audit and IS audit. Nina is a CIPP/IT - a privacy professional certified by the IAPP USA (International Association of Privacy Professional) as well as a CISA (Certified Information Systems Auditor) certified by ISACA USA (Information Systems Audit and Control Association). She has been working with a global IT organization for more than a decade and has been associated with business controls, regulatory compliance and Information Systems audit in delivery of projects. She holds a Masters Degree in Science from IIT Bombay and MS Engineering (Computer Science) degree from Newport University, USA. She is a key speaker at many conferences and visiting faculty to many institutes including those under Pune University. Nina is also an ITIL foundation certified professional, a PMP, CQA and CSTE from QAI, USA (Quality Assurance Institute). Sunit Belapure has more than 8 years experience in Information Security domain out of his total industry experience of more than 18 years. He works in the domain of ISRM (Information Security and Risk and Management) and Information System Audit. Sunit has respective international certifications to his credit – CISA (Certified Information Systems Auditor) from ISACA-USA, IRCA certified ISO 27001:2005 Lead Auditor, Certified Ethical Hacker (CEH v5.0) from EC-Council-USA and CISM (Certified Information Security Manager) from ISACA-USA. He is a member of ISACA, USA. He engages into Compliance and Assurance assignments (for ERP as well as for Non-ERP applications) underISsecurityand ITGovernancedomain.Sunit isanotedspeakeron InformationSecuritydomainatreputedinstitutesinandaroundPune. ISBN: 978-81-265-2179-1 Pages: 636 ` 449 2. 2. HEAD OFFICE: 4435-36/7, Ansari Road, Daryaganj, New Delhi-110002. Tel: 91-11-43630000 Fax: 91-11-23275895. Email: [email protected] BANGALORE: Tel: 08023132383. Telefax: 080-23124319. Email: [email protected] MUMBAI: Tel: 022-27889263, 27889272. Telefax: 022-27889263. Email: [email protected] Wiley India Pvt. Ltd. KEY FEATURES TABLE OF CONTENTS Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix K : L : M : N : O : P : Q : R : S : T : U : V : W : Virtual Crime Cybercrimes Worldwide – Trends and Patterns Data Privacy, Data Protection and Cybercrime Digital Rights Management The Indian Information Technology Act The Indian Penal Code The Indian Evidence Act The Indian Patents Act The Indian Trademarks Act The Indian Copyright Act DSCI Security Framework (DSF) from Data Security Council of India DSCI Privacy Framework (DPF) from Data Security Council of India Chapterwise List of All References B : C : E-Mail Security and Etiquettes and Policy Template for Computer and Network Usage D : Protection Checklist for Individuals and Organizations Template E : F : Guidelines for Computer Forensics Laboratory Set-up and Guidance on Forensic Readiness Activities in Organizations G : Preservation of Digital Crime Scene Related Photographs and Checklist for Processing Computer Forensic Data and Evidence H : I J : Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix Appendix List of useful Software Utilities and Websites List of Tools : Vulnerability Scanning and Penetration Testing Guidance on Structuring the Incidence Response Handling Team : List of Forensic Equipment and Forensic Software Tools Cybercafe Due Diligence Questionnaire • AuthorsareindustryprofessionalswithextensiveexperienceinthedomainofInformation Security andDataPrivacy. • The book is aimed at individuals, students (including those doing law courses), IT professionals and legal professionals forbuildingawarenessaboutcybercrimeandcybersecurity. • Useful for candidates aspiring to appear for international certification exams in the domain of Information Security/IT Securityandotherrelateddomains. • Detailed discussion about multiple dimensions of cybersecurity – presents current scenario on cybercrime, serves as referencebookwithrichdiscussiononallrelevantaspectsofthedomain,including cyberforensics. • ProvidesinanutshellIndianaswellasglobalperspectiveoncyberlaws. • Bringstoreadersusefulappendiceswithrichcontentsthatserveassupplementarymaterialtothe chapters. • Understandingofkeyconceptsfacilitatedthroughwellillustrateddiagrams,tablesandvignettes inside the chapters. • Real-lifecaseillustrationsandexamplesprovidedtohelpconsolidateunderstanding oftopicspresented in eachchapter. • Reviewquestionsandreferencematerialpointersaftereachchapter. Inside the Book Inside the CD Appendices 1 Introduction to Cybercrime 2 Cyberoffences: How Criminals Plan Them 3 Cybercrime: Mobile and Wireless Devices 4 Tools and Methods Used in Cybercrime 5 Phishing and Identity Theft 6 Cybercrime and Cybersecurity: The Legal Perspectives 7 Understanding Computer Forensics 8 Forensics of Hand-Held Devices 9 Cybersecurity: Organizational Implications 10 Cybercrime and Cyberterrorism: Social, Political, Ethical and Psychological Dimensions 11 Cybercrime: Illustrations, Examples and Mini-Cases 12 Careers in Cybersecurity A : Glossary of Cybersecurity Terms and Acronyms Appendix Recommended

Creative Insights: Renaldo Lawrence on Elearning Online Course - LinkedIn Learning

College Prep: Writing a Strong Essay Online Course - LinkedIn Learning

How to Use LinkedIn Learning Online Course - LinkedIn Learning

Advanced Database Lecture Notes Jasour Obeidat

Cyber security presentation Bijay Bhandari

Cyber crime and security ppt Lipsita Behera

AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017 Carol Smith

The AI Rush Jean-Baptiste Dumont

10 facts about jobs in the future Pew Research Center's Internet & American Life Project

2017 holiday survey: An annual analysis of the peak shopping season Deloitte United States English Español Português Français Deutsch About Dev & API Blog Terms Privacy Copyright Support

LinkedIn Corporation © 2018 × Share Clipboard × Email

Enter email addresses Add a message From

Send Email sent successfully.. Facebook Twitter LinkedIn Link Public clipboards featuring this slide


No public clipboards found for this slide Select another clipboard ×

Looks like you’ve clipped this slide to already. Search for a clipboard Create a clipboard

You just clipped your first slide! Clipping is a handy way to collect important slides you want to go back to later. Now customize the name of a clipboard to store your clips. Name* Best of Slides

Description Add a brief description so others know what your Clipboard is about. Visibility Others can see my Clipboard Cancel Save Save this documentTap To Close


Cyber Security - Flier - SlideShare

SlideShare Explore Search You Upload Login Signup Search Submit Search Home Explore Presentation Courses PowerPoint Courses by LinkedIn Learning ...

622KB Sizes 4 Downloads 15 Views

Recommend Documents

No documents