DocumentCode
3559797
Title
Blending technology and the law for cyber security [Women to Watch]
Author
Wax, Heather
Volume
2
Issue
2
fYear
2008
Firstpage
10
Lastpage
11
Abstract
One day last summer, Jody Westby, chief executive officer of Global Cyber Risk, a consulting company in Washington, D.C., that helps corporations and governments safeguard their online information and networks, received a call from a former government minister. The minister told her that he had given his name and password to what turned out to be an online fraud scheme, and now he was worried. Westby, who is a lawyer as well as a cyber security and privacy expert, wasn\´t terribly surprised. Many computer fraud schemes no longer look like what you may remember from the Nigerian letter scam--those fishy e-mails in which someone impersonating a foreign government official asks for help getting money to an overseas bank account. Today, says Westby, counterfeit Web sites and e-mail scams can "look good."
Keywords
Computer crime; Computer networks; Computer security; Electron tubes; Engineering students; Military computing; National security; Terrorism; US Government; Watches;
fLanguage
English
Journal_Title
Women in Engineering Magazine, IEEE
Publisher
ieee
ISSN
1942-065X
Type
jour
DOI
10.1109/MWE.2008.930541
Filename
4712549
Link To Document