Answered step by step
Verified Expert Solution
Question
1 Approved Answer
QUESTION 1 (30 MARKS) Not everyone agrees on what constitutes computer fraud and some people may commit computer fraud unwittingly and not be aware
QUESTION 1 (30 MARKS) Not everyone agrees on what constitutes computer fraud and some people may commit computer fraud unwittingly and not be aware of it. Many computer frauds go undetected. The belief that "it just can't happen to us." Most networks have a low level of security. Many Internet sites provide guidance on how to commit computer crimes. Law enforcement is unable to keep up with the number of computer frauds. Most frauds are not reported. The total dollar value of losses is difficult to calculate. Required: Explain the FOUR (4) cycles in system life cycle. ii. (8 marks) Identify and explain the THREE (3) types of layered approach to access control for active threat. (9 marks) iii. Differentiate between Phishing and Piggy Backing. (3 marks) iv. Briefly explain between active threat and passive threat. Give example. (4 marks) V. Explain the TWO (2) approaches to analyse the vulnerabilities and their limitation. (6 marks)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started