session_start();
$title="Slide 16";
require("../../../php/require/config.php");
require("$reqpath/login/config.php");
require("$reqpath/common.php");
require("$reqpath/login/membership.php");
include("$incpath/header.php");
$showlogin="yes";
include("$incpath/menu.php");
if (!loggedin()){
echo "
";
$bartitle="Unverified user: Please login to view Presentations ";
printneedtologinmsg($bartitle);
}
else
{
?>
|
First page Back Continue Last page Overview Graphics
FSTC Phases
Financial Services Technology Consortium
Counter-Phishing Initiative
Phishing Phases:
- Planning
- Setup
- Attack
- Collection
- Fraud
- Post-Attack
| } include("$incpath/footer.php"); ?>