Question: Question 5 (11 marks) Computer crimes/ cybercrime exist in many shapes and sizes such as identity theft, online scams or credit application fraud. Resulting from

 Question 5 (11 marks) Computer crimes/ cybercrime exist in many shapes

Question 5 (11 marks) Computer crimes/ cybercrime exist in many shapes and sizes such as identity theft, online scams or credit application fraud. Resulting from many cases reported in news papers, people tend to think that these fraudulent acts are mainly caused by those who are not working in impacted firms (i.e. external people). In fact, internal stakeholders also create serious computer frauds. Therefore, at the management level, you will need to take these issues into consideration and consequently incorporate into relevant fraud management policies. Required: (a) Explain how each of the following five types of fraud is committed: (1) Input manipulation, (2) Program alteration, (3) File alteration, (4) Data theft and (5) Sabotage. (5.5 marks) (b) Identify a different method of protection for each and describe how it works. (5.5 marks)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!