Question
Design a fraudulent scheme you could potentially commit. Provide detail on the following five areas: 1. The type of fraud you have designed. 2. Who
Design a fraudulent scheme you could potentially commit.
Provide detail on the following five areas:
1. The type of fraud you have designed.
2. Who the fraud will be committed against (i.e. business, individuals, etc.)
3. The intended goal of the fraud.
4. Who is committing the fraud (i.e. a hacker, a nation state, a criminal, a criminal enterprise, an insider, a rogue employee, etc.)
5. Where your fraud will be committed (i.e. location (domestic or foreign), the internet, in person, etc.)
Description of each applicable step you will need to take within the fraud kill chain to execute the fraud. Fraud kill chain steps usually include:
1. Reconnaissance
2. Targeting
3. Delivery or Installation or Social Engineering
4. Weaponization
5. Exploitation
6. Exfiltration
7. Command & Control
Answer the following questions
1. What are the current trends in the type of fraud you are committing?
2. What is the likelihood of success of the fraud?
3. How profitable do you think the fraud could be and why?
4. Where and what type of analytics could be used to detect the fraud you have designed?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started