By Topic

Blending technology and the law for cyber security [Women to Watch]

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)

One day last summer, Jody Westby, chief executive officer of Global Cyber Risk, a consulting company in Washington, D.C., that helps corporations and governments safeguard their online information and networks, received a call from a former government minister. The minister told her that he had given his name and password to what turned out to be an online fraud scheme, and now he was worried. Westby, who is a lawyer as well as a cyber security and privacy expert, wasn't terribly surprised. Many computer fraud schemes no longer look like what you may remember from the Nigerian letter scam--those fishy e-mails in which someone impersonating a foreign government official asks for help getting money to an overseas bank account. Today, says Westby, counterfeit Web sites and e-mail scams can "look good."

Published in:

IEEE Women in Engineering Magazine  (Volume:2 ,  Issue: 2 )