Text
Cyber reconnaissance, surveillance, and defense
Table of Contents
Dedication
About the Authors
Acknowledgments
Introduction
Chapter 1: Digital Reconnaissance and Surveillance
Abstract
Digital reconnaissance and surveillance
Threat of digital reconnaissance and surveillance
Why spy?
Who spies?
Legal and ethical principles
Summary
Chapter 2: Information Gathering
Abstract
Information gathering
Online reconnaissance
Physical reconnaissance
Summary
Chapter 3: Social Engineering
Abstract
Social engineering
Mitigation of social engineering
Legal and ethical concerns
Summary
Chapter 4: Mobile Phone Tracking
Abstract
Phone tracking
Malicious tracking
Legal and ethical concerns
Summary
Chapter 5: Physical Device Tracking
Abstract
Physical tracking
Legal and ethical concerns
Summary
Chapter 6: Web Camera and Video Tracking
Abstract
Camera tracking
Legal and ethical concerns
Summary
Chapter 7: Data Capture and Exploitation
Abstract
Data threat
Legal and ethical concerns
Summary
Chapter 8: Protection Methods
Abstract
Protect yourself!
Summary
Index
No other version available