These are the sources and citations used to research IT-552-X4695 Human Factors in Security 22TW4 - 1-2 Assignment: FBI's Cyber's Most Wanted. This bibliography was generated on Cite This For Me on

  • Website

    Business Email Compromise | Federal Bureau of Investigation

    2015 - Federal Bureau of Investigation

    In-text: (Business Email Compromise | Federal Bureau of Investigation, 2015)

    Your Bibliography: Federal Bureau of Investigation. 2015. Business Email Compromise | Federal Bureau of Investigation. [online] Available at: <https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/business-email-compromise> [Accessed 27 March 2022].

  • Website

    Meet an FBI Cybercriminal: Richard Uzuh | ImageQuest

    2022

    In-text: (Meet an FBI Cybercriminal: Richard Uzuh | ImageQuest, 2022)

    Your Bibliography: ImageQuest |. 2022. Meet an FBI Cybercriminal: Richard Uzuh | ImageQuest. [online] Available at: <https://www.imagequest.com/meet-an-fbi-cybercriminal-richard-uzuh/> [Accessed 27 March 2022].

  • Website

    Limoke, O.

    Business Email Compromise (BEC) Vulnerability and Risks

    2017 - Pawa IT Solutions

    In-text: (Limoke, 2017)

    Your Bibliography: Limoke, O., 2017. Business Email Compromise (BEC) Vulnerability and Risks. [online] Medium. Available at: <https://medium.com/pawa-it/business-email-compromise-bec-vulnerability-and-risks-5d8313cc7d6> [Accessed 27 March 2022].

  • Website

    Business Email Compromise (BEC)

    2022 - Trend Micro

    In-text: (Business Email Compromise (BEC), 2022)

    Your Bibliography: Security Intelligence Blog. 2022. Business Email Compromise (BEC). [online] Available at: <https://www.trendmicro.com/vinfo/us/security/definition/business-email-compromise-(bec)> [Accessed 27 March 2022].

  • Website

    Avaya Project Plan with ease - Wellington Paez

    2022

    In-text: (Avaya Project Plan with ease - Wellington Paez, 2022)

    Your Bibliography: Wellington Paez. 2022. Avaya Project Plan with ease - Wellington Paez. [online] Available at: <https://www.wellingtonpaez.com/avaya-project-plan-with-ease/> [Accessed 28 March 2022].

  • Website

    BEC Attacks: What They Are and How to Protect Yourself

    2022 - WestStar Bank

    In-text: (BEC Attacks: What They Are and How to Protect Yourself, 2022)

    Your Bibliography: WestStar Bank. 2022. BEC Attacks: What They Are and How to Protect Yourself. [online] Available at: <https://www.weststarbank.com/our-info/bec-attacks--what-they-are-and-how-to-protect-yourself> [Accessed 27 March 2022].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join