• DocumentCode
    3559797
  • Title

    Blending technology and the law for cyber security [Women to Watch]

  • Author

    Wax, Heather

  • Volume
    2
  • Issue
    2
  • fYear
    2008
  • Firstpage
    10
  • Lastpage
    11
  • Abstract
    One day last summer, Jody Westby, chief executive officer of Global Cyber Risk, a consulting company in Washington, D.C., that helps corporations and governments safeguard their online information and networks, received a call from a former government minister. The minister told her that he had given his name and password to what turned out to be an online fraud scheme, and now he was worried. Westby, who is a lawyer as well as a cyber security and privacy expert, wasn\´t terribly surprised. Many computer fraud schemes no longer look like what you may remember from the Nigerian letter scam--those fishy e-mails in which someone impersonating a foreign government official asks for help getting money to an overseas bank account. Today, says Westby, counterfeit Web sites and e-mail scams can "look good."
  • Keywords
    Computer crime; Computer networks; Computer security; Electron tubes; Engineering students; Military computing; National security; Terrorism; US Government; Watches;
  • fLanguage
    English
  • Journal_Title
    Women in Engineering Magazine, IEEE
  • Publisher
    ieee
  • ISSN
    1942-065X
  • Type

    jour

  • DOI
    10.1109/MWE.2008.930541
  • Filename
    4712549