172 COMPUTER FRAUD AND CONTROLS For many organizations the s
17-2. COMPUTER FRAUD AND CONTROLS
For many organizations, the security threat from external penetration is significant; however, many fraud threats are internal. These include (1) data input alteration, (2) program alteration, (3) file alteration, (4) data theft, and (5) sabotage.
Required
Explain how each of these five types of frauds is committed. Also, identify a method of protection against each without using the same protection method for more than one type of fraud. Use the following format.
Type of Fraud Explanation Description of Protection Methods
a.
b.
c.
d.
e.
Solution
Computer Fraud/ Security Threat:
• The illegal actions or crimes that are complete to abuse the computer to harm others is called as computer deception or fraud.
• Computer frauds are complete by manipulate the input, illegal use of system, plan change, File alteration, stealing data, disturbance.
• This is the illegal action for which sympathetic of computer skill is vital for its enactment, analysis, or test.
a variety of copies of master file should be maintain, arranged by the time of their update. Also the mode of the file should be distorted to Read simply
| Type of Fraud | Explanation | Description of Protection Methods |
| a.Input Manipulation | This type of scam does not need any strong technological knowledge or knowing much concerning computer System. It can be done by just changing sure data or input from a record or piece. | This can be avoided by proper certification and approval. There should be scheme defined rule to allow only certain genuine users to access and adapt the inputs |
| c. File alteration | This type of fraud occur due to the change of Data files or minutes | a variety of copies of master file should be maintain, arranged by the time of their update. Also the mode of the file should be distorted to Read simply |
| Data theft | Data stealing can be done by stealing the data or transferring computer data files, information or proceedings. | Make the internal data storage as well as network secure. Also make transmitted data reduced and secure by encoding techniques. |
| e. Sabotage | This happens by the damage of computer plans that is hardware or software. | There should be a encouragement system for files in the classification so that if the System fail, then the data will not be vanished. |
