Upload
tnzgurl13
View
212
Download
0
Embed Size (px)
DESCRIPTION
Security notes
Citation preview
Info systems are becoming increasingly more complex and society is becoming increasingly more dependent on these systems.
Companies face four types of threats to their info systems1. Natural and political disasters2. Software errors and equipment malfunction 3. Unintentional acts (most common)4. Intentional acts
Who commits fraud and why White collar criminals Violent criminals Hackers and computer fraud perpetrators sometimes they just do it for fun, challenging the system to see if they can break into it
The Fraud Triangle there are three XX associated with fraud 1. Pressure2. Opportunity (commit the fraud eg stealing data when you the opportunity // conceal the fraud //converting the proceeds)3. Rationalization people who are trusted by the organization and think they are ethical eg oh I just borrowed the money from organization, everybody does it, I didnt take it for myself, Im just compensating myself for hard work
Types of Computer Instructions FraudData FraudInput Processor Output
Measures to decrease the potential for fraud and resulting losses1. Make fraud less likely to occur2. Increase the difficulty of committing fraud3. Develop a strong system of intern controlsEncrypt the dataMake sure different people have access to only the part of the system they need4. Improve detection methods (5. Reduce fraud loses (