Question
Computer crimes/ cybercrime exist in many shapes and sizes such as identity theft, online scams or credit application fraud. Resulting from many cases reported in
Computer crimes/ cybercrime exist in many shapes and sizes such as identity theft, online scams or credit application fraud. Resulting from many cases reported in news papers, people tend to think that these fraudulent acts are mainly caused by those who are not working in impacted firms (i.e. external people). In fact, internal stakeholders also create serious computer frauds. Therefore, at the management level, you will need to take these issues into consideration and consequently incorporate into relevant fraud management policies.
Required: (a) Explain how each of the following five types of fraud is committed: (1) Input manipulation, (2) Program alteration, (3) File alteration, (4) Data theft and (5) Sabotage. (5.5 marks)
(b) Identify a different method of protection for each and describe how it works. (5.5 marks)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started