Discuss the various techniques of computer fraud and abuse.

A Management Information System ICT Revision Questions and Answers

Various techniques of computer fraud and abuse are:
Cracking: Unauthorized access to and use of computer systems with malicious intentions Data diddling: Changing of data before or after entering into others system
Data leakage: Unauthorized copying of the company data Eavesdropping: Listening to private voice or data communications
Email forgery: Sending email messages that look as if it is send by somebody else Email threats: Sending a threatening email
Hacking: Unauthorized access to and use others computers with or without malicious intention. Virus: Segment of self executable program that is attached with other programs and software so that it can run on other system and replicate it self for further spreading, etc.

Leave a Reply

Your email address will not be published. Required fields are marked *