ABSTRACT

This conclusion presents some closing thoughts discussed in the subsequent chapters of this book. The book provides a number of case studies in the context of security describing situations Computer users will very likely face as a user of technology. The objectives of modern-day malware are quite different from those of more dated malware. The task of malware is typically to observe information about the victim, to present the victim with malicious or deceiving ads, or to use the victim’s computer to attack other computers. Online shopping is a billion-dollar industry, and it should come as no surprise that cyber criminals have followed the money trail. The pervasiveness of social networking has grown to represent billions of users from multiple demographics and in all corners of the world. An important skill one can use to defeat social engineers is to recognize their attacks prior to falling victim to them.