Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

17-2. COMPUTER FRAUD AND CONTROLS For many organizations, the security threat fr

ID: 3923321 • Letter: 1

Question

17-2. COMPUTER FRAUD AND CONTROLS

For many organizations, the security threat from external penetration is significant; however, many fraud threats are internal. These include (1) data input alteration, (2) program alteration, (3) file alteration, (4) data theft, and (5) sabotage.

Required

Explain how each of these five types of frauds is committed. Also, identify a method of protection against each without using the same protection method for more than one type of fraud. Use the following format.

Type of Fraud             Explanation                 Description of Protection Methods

a.

b.

c.

d.

e.

Explanation / Answer

Computer Fraud/ Security Threat:

• The illegal actions or crimes that are complete to abuse the computer to harm others is called as computer deception or fraud.

• Computer frauds are complete by manipulate the input, illegal use of system, plan change, File alteration, stealing data, disturbance.

• This is the illegal action for which sympathetic of computer skill is vital for its enactment, analysis, or test.

a variety of copies of master file should be maintain, arranged by the time of their update. Also the mode of the file should be distorted to Read simply

Type of Fraud Explanation Description of Protection Methods a.Input Manipulation This type of scam does not need any strong technological knowledge or knowing much concerning computer System. It can be done by just changing sure data or input from a record or piece. This can be avoided by proper certification and approval. There should be scheme defined rule to allow only certain genuine users to access and adapt the inputs c. File alteration This type of fraud occur due to the change of Data files or minutes

a variety of copies of master file should be maintain, arranged by the time of their update. Also the mode of the file should be distorted to Read simply

Data theft Data stealing can be done by stealing the data or transferring computer data files, information or proceedings. Make the internal data storage as well as network secure. Also make transmitted data reduced and secure by encoding techniques. e. Sabotage This happens by the damage of computer plans that is hardware or software. There should be a encouragement system for files in the classification so that if the System fail, then the data will not be vanished.
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at drjack9650@gmail.com
Chat Now And Get Quote