Computer Fraud Checklist

Fraud by computer manipulation

    Input manipulation
    Program or data manipulation
    Output manipulation

Common internal computer fraud schemes

Billing schemes
    Inventory fraud
    Payroll fraud
    Skimming
    Check tampering
    Register schemes

Fraud by damage to or modification of computer data or programs

    Economic advantage over a competitor
    Theft of data or programs
    Holding data for ransom
    Sabotage

Common external computer fraud schemes

    Telecommunications fraud
    Hacking
    Internet fraud
    Software piracy

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s