These are the sources and citations used to research IT-552-X4695 Human Factors in Security 22TW4 - 1-2 Assignment: FBI's Cyber's Most Wanted. This bibliography was generated on Cite This For Me on
In-text: (Business Email Compromise | Federal Bureau of Investigation, 2015)
Your Bibliography: Federal Bureau of Investigation. 2015. Business Email Compromise | Federal Bureau of Investigation. [online] Available at: <https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/business-email-compromise> [Accessed 27 March 2022].
In-text: (Meet an FBI Cybercriminal: Richard Uzuh | ImageQuest, 2022)
Your Bibliography: ImageQuest |. 2022. Meet an FBI Cybercriminal: Richard Uzuh | ImageQuest. [online] Available at: <https://www.imagequest.com/meet-an-fbi-cybercriminal-richard-uzuh/> [Accessed 27 March 2022].
In-text: (Limoke, 2017)
Your Bibliography: Limoke, O., 2017. Business Email Compromise (BEC) Vulnerability and Risks. [online] Medium. Available at: <https://medium.com/pawa-it/business-email-compromise-bec-vulnerability-and-risks-5d8313cc7d6> [Accessed 27 March 2022].
In-text: (Business Email Compromise (BEC), 2022)
Your Bibliography: Security Intelligence Blog. 2022. Business Email Compromise (BEC). [online] Available at: <https://www.trendmicro.com/vinfo/us/security/definition/business-email-compromise-(bec)> [Accessed 27 March 2022].
In-text: (Avaya Project Plan with ease - Wellington Paez, 2022)
Your Bibliography: Wellington Paez. 2022. Avaya Project Plan with ease - Wellington Paez. [online] Available at: <https://www.wellingtonpaez.com/avaya-project-plan-with-ease/> [Accessed 28 March 2022].
In-text: (BEC Attacks: What They Are and How to Protect Yourself, 2022)
Your Bibliography: WestStar Bank. 2022. BEC Attacks: What They Are and How to Protect Yourself. [online] Available at: <https://www.weststarbank.com/our-info/bec-attacks--what-they-are-and-how-to-protect-yourself> [Accessed 27 March 2022].
10,587 students joined last month!