Computer Fraud Checklist

Fraud by computer manipulation

    Input manipulation
    Program or data manipulation
    Output manipulation

Common internal computer fraud schemes

Billing schemes
    Inventory fraud
    Payroll fraud
    Check tampering
    Register schemes

Fraud by damage to or modification of computer data or programs

    Economic advantage over a competitor
    Theft of data or programs
    Holding data for ransom

Common external computer fraud schemes

    Telecommunications fraud
    Internet fraud
    Software piracy



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s