Professional Issue In Computing

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

COMPUTER FRAUD AND TECHNICHS USED

PROFESSIONAL ISSUE IN COMPUTING

Introduction

Computer system have becomes a part of our everyday’s life, Organizations now make use of the new technology to some extent. Presently, computers are more effective, portable, cheaper and more user-friendly because of this reasons that it have become affordable to anybody. Although, they come in different sizes and also computer is more useful in our society today. Therefore, computer becomes more important in our society, our businesses, and our personal live.

Most businesses and government organisation big or small now depend on computer systems to boost their operations. There is a pressurized interest from concerned bodies about the attendant risk of "computer fraud". Moreover, computer has enable individual to rely on them progressively also the criminals. They explore computer to support their illegal activities, there has been problem emerging related with computer in particularly computer fraud. Computer User are tricked in many ways like hacking, program fraud, investment scheme, virus or worm attacks and people claiming to be real and professional on subject areas. Anyone can be a victim of computer fraud, because most of the individual computer is connected to the internet.

The level of computer fraud is increasing every day-to-day as internet users also increases among. However, most of the people are using computer for good intention, but there are some who are using computers to knock down some business firm, organizations and to hack people’s personal details. The 2011-2012 Computer Crime and Security Survey, conducted by the Computer Security Institute showed a terribly increase of business reporting difficulties with computer fraud, among underground research taken are:

Key Findings

Over 67percent of respondents report malware infection

Financial fraud incidents declining

Almost half of the respondents who reported a security incident reported a targeted attack

Limited reports of losses due to malicious insiders

COMPUTER FRAUD AND TECHNICHS USED

PROFESSIONAL ISSUE IN COMPUTING

Types of Technology Used

• Anti-Virus SW - 97

• Intrusion prevention systems – 50%

• Firewall – 95%

• Content monitoring –44%

• Anti-spyware SW – 85%

• Forensic tool – 43%

• VPN – 79%

• PKI – 35%

• Encryption – 66%

• Smart cards – 35%

• Web/URL filtering – 59%

• Biometrics – 20%

Evaluation Techniques

• None – 16%

• Internal audits – 61%

• External penetration – 34%

•Automated tools – 50%

• Internal penetration – 41%

• Forensic tool – 43%

• E-mail monitoring – 39%

•Internal audits – 61%

• Web monitoring – 47%

COMPUTER FRAUD AND TECHNICHS USED

PROFESSIONAL ISSUE IN COMPUTING

Background

Everywhere in the world today, all major sectors such as business companies, military operations and government entirely use computer and internet for their work process and information transmission. The information which is stored and transmitted through the internet is at risk to take over and manipulated from any unknown person. Some Organization has been affected in some way owing to computer fraud.

The British National Computer Centre reported more than 80 % of British organizations suffered security threat in last few years, most of the research conducted shows that computer fraud arise involves unauthorised access to the computer through the internet.

In this context i will discussion about the detailed term of:

* Computer Fraud

* Causes of computer fraud

* Type of computer fraud/attacks

* Basic ways to prevent computer fraud

* Examine the latest threats, including identity theft, spam, phishing, Pharming, and other online scams.

COMPUTER FRAUD AND TECHNICHS USED

PROFESSIONAL ISSUE IN COMPUTING

Definition of computer fraud

The explanation of what represents computer fraud becomes extremely difficult with the originality of individuals with the aim of deceiving, misrepresenting, causing damages, steal people information, or cause harm to other by breaking into people secret information through deceptive and illegal means. Most of the techniques used are much older than computers. Moreover a Fraud is aspects of corruption normally take place in an organizations arrangement where the governance structures are weak or become spoiled themselves.

What is Fraud

The organization of Certified Examiners of Fraud in United State of America defined fraud as the use of one’s occupation for personal enrichment through intentional exploitation or misapplication of the employing organizations. Computer fraud normally involves a computer and a network.

What is Computer Fraud

Computer fraud can therefore be defines as the unauthorised and international use or alteration of an entities data for malicious use.

WHY DO PEOPLE COMMIT FRAUD

Firstly, in the legal theory of criminology on Computer fraud in UK is particularly lay down by Computer Fraud and Act which was passed in 1984, basically states that, whoever intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information from any protected computer, if the conduct involved an interstate or foreign communication shall be discipline under the act.

C:\Users\ccuk\Desktop\tiny-handcuffs.jpg

Diagram 1.0

COMPUTER FRAUD AND TECHNICHS USED

PROFESSIONAL ISSUE IN COMPUTING

The reason to why people may commit a computer fraud was then grouped under what they called "Fraud Triangle" and these are :

Perceived Pressure

Rationalization

Opportunity

FRAUD TRIANGLE

C:\Users\ccuk\Desktop\the fraud triangle.jpg

Diagram 1.2

Although, there are many reason to why people commit fraud, but they have group them under the diagram shows above. So let’s further explain them.

Rationalization:

This allows the perpetrators to justify their illegal behaviour and the only way they can commit their fraud and maintain their self image as principled individual is to create rationalization, also when individual feel unsatisfied or discontented with his or her job.

Opportunity:

This is an opportunity that allows an individual to perpetrate fraud; the following are common opportunities that facilitate fraud:

Lack of internal control. Examples are inadequate supervision, independent checks on performance.

Failure to enforce control

Inattention to details and

Inadequate staff gives way for perpetrators.

COMPUTER FRAUD AND TECHNICHS USED

PROFESSIONAL ISSUE IN COMPUTING

COMMON TYPES OF COMPUTER FRAUD AND PREVENTIONS

TYPES OF FRAUD

Computer fraud is one of the growing crimes and it has become more advance every day. Moreover the methods by the hackers or perpetrators to commit the act changed regularly due to advance in technology and it can also be group depends upon the types of fraud committed, below are the major categories of fraud and most computer frauds happening now a day’s appears under these major types.

Identity theft.

Phishing.

Credit card fraud.

Information hacking.

Spam.

Malicious software.

Virus attack.

Internet fraud and many more.

Identity Theft

Identity theft is a growing threat across the globe that is form of computer fraud in which the criminal uses personal identifiable information such as name, address and social security number to assume your identity for making purchases and accessing bank information.

A victim of identity theft can also lead to fraud, which can have a direct impact on your personal finances and could also make it complicated for the victim to obtain loan or a mortgage until the matter is resolved.

J:\my download\2Q==.jpg

COMPUTER FRAUD AND TECHNICHS USED

PROFESSIONAL ISSUE IN COMPUTING

How to protect yourself against Identity Theft

Don’t throw out anything with your name, address or financial without shredding it first.

Phishing

It is pronounced "fishing", is the fraudulent methods used obtain proprietary information from people and sometimes from individual organizations. The so called perpetrators or phisher will send random emails purporting to be from legitimate company or bank, in attempt to trick customers into disclosing their personal account information such as username and password or PIN.

J:\download\image_display.jpeg

How do we protect ourselves against phishing?

Protecting yourself from phishing scam doesn’t provide proprietary information to any form generated form a link in an email. If such email is sent to your inbox claiming to be from your bank or other institute, first try to log in to your bank website so that you can determine if the requested information is genuine. Or by contacting your institution’s in writing by phone or email and ask if an email you received is genuine.

MALICIOUS SOFTWARE

Malicious software also know as malware is any software that gives partial to full control of your computer system to do whatever it is programme for. Malware can be virus or worm and it is not restricted to one operating system. Malware type can be categorized as follow: virus, worms and trojans they try to infect and broaden to embed themselves to watch what the user does and act upon that data.

COMPUTER FRAUD AND TECHNICHS USED

PROFESSIONAL ISSUE IN COMPUTING

J:\my download\Z.jpg

How do you protect yourself against malware

Following are the ways you can prevent yourself against malicious software.

Primarily, make sure you update the operation system and any program you have installed on your computer system.

Always be cautious of any strange e-mail sent to you.

Do not just click on anything when surfing the web, always watch what you click and installed.

Install licensed anti-virus software, always scam and update regularly because it remove and prevent viruses and some spyware.

CREDICT CARD FRAUD

Credit card fraud is another common type of fraud in the world today, it cost United Kingdom over £1 million a day. Fraudster operate in different way in stealing peoples credit card information, keeping your credit card save is very advisable for an individual also any card found by this fraudster can be clone known as "skimming" . They also operate in these following ways:

They steal information from credit card transaction over the internet, by telephone, mail or fax order.

They intercept card sent by the bank before they reach customers’ before getting to the destination addresses.

They also steal people identity by opening a new account in another person’s name without the awareness or consent of the owner using proof of ID they either find or steal.

Unknown to you, they may be watching you when imputing your PIN number at the ATM before stealing the card.

COMPUTER FRAUD AND TECHNICHS USED

PROFESSIONAL ISSUE IN COMPUTING

J:\download\article-0-07AF6DBF000005DC-123_306x443.jpg

They use a device fitted camera over the ATM slot to skim your details of card to simultaneously record you entering your PIN number.

HOW DO YOU PROTECT YOURSELF

Your credit card provider has a responsibility under the LENDING CODE, which set a standards for any financial institute to follow when they are dealing with their customers in the United Kingdom. It offers valuable protection for customers and explains how firm are expected to deal with them consistently. To refund victim of fraud when the cardholder wasn’t at fault.

The chart below shows the fraud in United Kingdom and credit card figures

J:\download\Summary figures(1).jpg

COMPUTER FRAUD AND TECHNICHS USED

PROFESSIONAL ISSUE IN COMPUTING

However, following the precautions listed below will helps you becoming a victim of fraud.

Hide your PIN code when transacting or withdrawing at the ATM.

J:\download\article-0-016E695200000578-386_634x412-1.jpg

Watch out for strange activity or people loitering at cash points.

You should cross cut when shredding document and unwanted credit card applications sent in the post before throwing them away.

Never respond to any e-mail requesting for your credit card details.

Check your bank statement at least three times a week and report anything suspicious the earlier the better.

Be careful when using online banking as well as applying for credit card online.make sure your wireless is secure and check the security certificate (padlock) of the bank’s website is valid.

How can we detect them?

Ha



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now