15. Detection of Computer Frauds


1.   TYPES OF COMPUTER FRAUDS


2.   PRIMARY RISKS TO BUSINESS :-
2.1  Inside the organisation
2.2  Outside the organisation
2.2.1   Internet related
2.2.2   System related

3.   COMPUTER FRAUD IS A SERIOUS THREAT

4.   TECHNICAL TERMS OF COMPUTER FRAUD :-
4.1  Basic
4.2  Data related
4.3  E-Mail related
4.4  Internet related
4.5  Money related
4.6  Programming related
4.6.1   Virus vs. Worm  vs.
Trojan Horse
4.7  User related
4.8  Others


5.   CONTROL OVER COMPUTER FRAUDS :-
5.1  Preventing

5.2  Increasing difficulty of committing fraud :-
5.2.1   Control on
5.2.2   Protection of
5.2.3   Duties must be

5.3  Detection of fraud :-
5.3.1   Steps :-
A)   Preventive steps
B)   Detective steps
5.3.2   Method of detection

5.4  Reduce losses caused by fraud

5.5  Prosecution of fraudster

Comments

0 Responses to "15. Detection of Computer Frauds"

Post a Comment

Place your order..

Buy MICS Unleashed here..
ISBN: 978-81-7666-523-0

Subscribe...

Quick reference ...