首页 | 本学科首页   官方微博 | 高级检索  
     


Characteristics of Effective Security Governance 1
Authors:Julia H. Allen  Jody R. Westby
Affiliation:IIA Director of Research and EDP ,
Abstract:Abstract

This article outlines some thirty ways that fraudsters commonly commit identity theft and exploit stolen identities, with a little more information specifically on phishing using actual phishing e-mails to illustrate the techniques.
Keywords:collaboration  collaboration technology  information systems development  information technology  electronic collaboration  virtual teams
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号