Discuss the various techniques of computer fraud and abuse.

A Management Information System ICT Revision Questions and Answers

Various techniques of computer fraud and abuse are:
Cracking: Unauthorized access to and use of computer systems with malicious intentions Data diddling: Changing of data before or after entering into others system
Data leakage: Unauthorized copying of the company data Eavesdropping: Listening to private voice or data communications
Email forgery: Sending email messages that look as if it is send somebody else Email threats: Sending a threatening email
Hacking: Unauthorized access to and use others computers with or without malicious intention. Virus: Segment of self executable program that is attached with other programs and software so that it can run on other system and replicate it self for further spreading, etc.

(Visited 48 times, 1 visits today)
Share this on:

Leave a Reply

Your email address will not be published.