Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 1 (30 MARKS) Not everyone agrees on what constitutes computer fraud and some people may commit computer fraud unwittingly and not be aware

image text in transcribed

QUESTION 1 (30 MARKS) Not everyone agrees on what constitutes computer fraud and some people may commit computer fraud unwittingly and not be aware of it. Many computer frauds go undetected. The belief that "it just can't happen to us." Most networks have a low level of security. Many Internet sites provide guidance on how to commit computer crimes. Law enforcement is unable to keep up with the number of computer frauds. Most frauds are not reported. The total dollar value of losses is difficult to calculate. Required: Explain the FOUR (4) cycles in system life cycle. ii. (8 marks) Identify and explain the THREE (3) types of layered approach to access control for active threat. (9 marks) iii. Differentiate between Phishing and Piggy Backing. (3 marks) iv. Briefly explain between active threat and passive threat. Give example. (4 marks) V. Explain the TWO (2) approaches to analyse the vulnerabilities and their limitation. (6 marks)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Entrepreneurship

Authors: Andrew Zacharakis, William D Bygrave

5th Edition

1119563097, 9781119563099

More Books

Students also viewed these Accounting questions

Question

What is the value provided by geospatial analytics?

Answered: 1 week ago