You are on page 1of 7

NAME: - NALE GANESH SHRIRANG

CLASS NO: - LL.M- I (BUSINESS LAW GROUP)

ROLL NO: -

PRN NO: - 2023000807

LAW DEPARTMENT SHIVAJI UNIVERSITY


KOLHAPUR

BOOK REVIEW

1) ABOUT BOOK:-

 Title Of Book:- A Pritcal Guide To Cyber Crimes And Frauds In India


 Author:- Mr. V.K Puri
 Published By:- For Puri Publications, Vardhaman Siddhant Shopping
Plaza ,Basement Floor,Polt No.8, Local Shopping Center, Savita
Nagar ,Delhi-110092 Ph- .011-43071055, 43071057,
Email: - Purivijaykumar49@gmail.com
 Printed By:- Visnu Book Binding House New Delhi
 Pages:- 264
 Price:- 490
 Edition:- 1st Edition ,2023
 Weight :- 0.3 Kg
 Edition :- 2023
 Language :- English
 Binding :- Hardbound

2) PRODUCT PHYSICAL DETAILS

 Book Format : Paperback/ Mix Colours


 Genre : Law
 ISBN : 9788193562796
 Language : English
 Pages : 201-300 Pages
 Item Weight : 300 g
 Dimensions : 24 x 18 x 1 cm

3) CONTANT IN BOOK: - Computer Frauds and Cyber Crimes are a classic example of
how digital technology can provide new dimensions to traditional crimes and make them more
sophisticated. With ever-increasing reliance on digital technology, the number of digital crimes
has been growing exponentially. Lack of public awareness of the potential misuse of digital
technology is further fuelling the growth of these crimes. There is very little reliable information
available to help people understand the dangers associated with digital technology. This book is
an attempt to fill this gap. Envisaged as a ready reckoner, it will help readers safeguard
themselves against computer frauds and cyber crimes. With relatable stories, revealing facts, and
incisive insights, Cyber Unsafe busts the myths surrounding digital technology and related
crimes.

CONTANT IN BOOK
 Cyber Crimes & Frauds : - An Overview
 Vishing/ Phishing Frauds
 Ransom Ware & Malware
 Net Banking/ ATM Frauds
 Online Transactions/ Banking Frauds
 Insurance Frauds
 Fake Call Frauds
 Fake Shopping
 Website Frauds
 Fake Govt. Website Frauds
 Cheating Scams
 Job Frauds Through Call Centers
 Face Book Fake Profile SOS Message Fraud
 Face Book Friendship, Custom Charges, Matrimonial Frauds
 Social Media Crimes
 Mobile App Related Crimes
 E-Mail Frauds
 Business E-Mail Compromise
 Data Theft
 OLX/QR Code Frauds
 Lottery Scam
 KBC Lottery Frauds
 Gift Card Frauds
 Pay Tm KYC Frauds
 Sex Extortion Frauds
 Bitcoin
 Herbal Oil Trading Frauds
 Identity Theft
 Psychological Tricks
 Social Media Frauds
 Mobile Application Frauds
 Virus Attack On Personal Computer
 Cyber Safety Tips
 Security Tips For Devices
 Cyber Crime Reporting
 Cyber Crime Volunteers
 Cyber Safety For Adolescents/ Students
 Few Illustrative Cyber Crime News
 RBI Guidelines
 Cyber Laws In India Along With Text Of Relevant Sections From Information
Technology Act, 2000 & Indian Penal Code, 1860 Country Of Origin : India

4) OVERVIEW: -
This book revolves around the concept of Cybercrime with special A
Puri Publication A Practical Guide to Cyber Crimes and Frauds in India Edition 2023 This book
is all about Cyber Crimes and Cyber Law with the Punishment and remedies as per Indian Law's.
This book can serve as a mass vehicle to spread awareness and regards to Cyber Law and Cyber
Crimes in the society. To understand cyber crime and it's legal implications along with penal
provisions Book is so well schemed it makes a lay man to understand what's is cyber crime and
what reliefs are available for victims Examples are so well chosen which talks about real life
incidents which are reported and some are under trials. The printing of book is satisfying and
also the way of explaining the topics is good. This book is to a layman what a cursive writing
book is to a kid learning to write for the first time. It explains the various aspects in a simple
manner with illustrations. But, the author needs to elaborate more on those.

Be ready to find a few typos and missing capitalizations. The half of the book is
the Act itself. It’s handy to have IPC sections info as they are mentioned as well. A good book
for complete beginners, law students may find the content a bit elementary. The language is
simple, and the book is surprisingly pictorial (which is absolutely rare to find among law books).
The author has done a great job in categorizing the crimes under each separate head, and
mentioning the relevant sections within. I was looking forward to a more of case laws and legal
principles involved. But, like I have mentioned- the target audience is probably a layman and not
a student of law. It is a useful book, very concise but covers most of the current terms of cyber
laws and cyber crimes. It provides useful information about Indian Cyber Laws and Crimes,
what are the crimes and offences covered under cyber crimes under Indian perspectives. I am
happy to purchase this book its helps me in my profession to deal cyber cases. Simplifying the
highly technical subject of cyber security and making it understandable for all. The book covers
all aspects of cyber crime and its prevention. As majority of mobile phone users in India use
Android based Smartphone’s, the detailed descriptions of possible sources of attack and breach
of privacy of such phones, with live screenshots, are very helpful for students as well as general
users. The book is a must read for all those who are interested in the subject of cyber security. It
defines the hacking procedures step by step and making everything easy to understand and helps
in knowing the prevention as well. It can serve as a reference manual for those working in the
Cyber Security domain. The book takes a dip in Cyber Crimes and Cyber Law, and at the same
time, discusses in detail about the latest cyber threats. There are around book covering all the
Cyber Security technologies Cyber Crimes and Law used across the globe. The book throws
light on the Cyber Security landscape and the methods used by cybercriminals. Starting with the
history of the Internet, the book takes the reader through an interesting account of the Internet in
India, the birth of computer viruses, and how the Internet evolved over time. The book also
provides an insight into the various techniques used by Cyber Security professionals to defend
against the common cyber attacks launched by cybercriminals. The readers will also get to know
about the latest technologies that can be used by individuals to safeguard themselves from any
cyber attacks, such as phishing scams, social engineering, online frauds, etc. The book will be
helpful for those planning to make a career in the Cyber Security domain. It can serve as a guide
to prepare for the interviews, exams and campus work.

5) THIS BOOK:-
Topics Covered Include:

1. An in-depth breakdown of the most common types of cyber fraud and scams.
2. The victim selection techniques and perpetration strategies of fraudsters.
3. An exploration of the impact of fraud upon victims and best practice examples of support
systems for victims.
4. Current approaches for policing, punishing and preventing cyber frauds and scams.
5. To illuminate the types, impact and criminal methodologies of online fraud, and to
discuss what has been done and could be done to help victims of fraud and to reduce
those harms.

6) CONCLUSIVE REMARKS ABOUT THE BOOK:-

This book is to a layman what a cursive writing book is to


a Cyber Crimes and Cyber Law learning to write for the first time. It explains the various aspects
in a simple manner with illustrations. But, the author needs to elaborate more on those. Be ready
to find a few types and missing capitalizations. The half of the book is the Act itself. Its handy to
have IPC sections info as they are mentioned as well. Real cyber security and Cyber Law means
that your Security Operations team is consistently pen testing your network with the same stealth
and sophistication The online technological revolution has created new opportunities for a wide
variety of crimes which can be perpetrated on an industrial scale, and crimes traditionally
committed in an offline environment are increasingly being transitioned to an online
environment. This book has been The learning outcomes from each are as follows: The reader
will gain awareness of how fraudsters: acquire one- time passwords via Social Engineering to
commit OTP- based crime exploit vulnerabilities to create false ATMS take advantage of poor
over-sight mechanisms to remain undetected exploit air-gaps to manipulate data in transit for
fraud miss link accounts in a cross-institutional content to syphon off funds launder stolen
proceeds take advantage of default configurations to gain unauthorized network privileges and
how to devise counter- measures to deter such frauds. The Reader will gain awareness of how:
hackers break in to android Smartphone’s to steal OTP and other confidential information
encrypted information to and from your Smartphone or computer can be intercepted computer
can be hacked with or without social-engineering websites are scanned for vulnerabilities and
exploited enemy computers are targeted in cyber wars Security Operations Centers function and
tactical and policy measures to counter such threats. This book takes a case study-based
approach to exploring the types, perpetrators and victims of cyber frauds.

This book argues for a greater need to understand and respond to cyber
fraud and scams in a more effective and victim-centered manner. It explores the victim blaming
discourse, before moving on to examine the structures of support in place to assist victims,
noting some of the interesting initiatives from around the world and the emerging strategies to
counter this problem. This book is essential reading for students and researchers engaged in
cyber crime, Victim logy and international fraud. This kind of books are very rare and honestly a
game changer for everyone, who is looking to safeguard themselves in this rapidly growing
digital world.

You might also like