Get premium membership and access questions with answers, video lessons as well as revision papers.

List six methods and tools that are useful in stemming computer fraud by employees.

      

List six methods and tools that are useful in stemming computer fraud by employees.

  

Answers


gregory
Computer fraud arises when a person gains access to or uses a computer program or data
or computer to deceive or defraud others.
Methods and tools that are useful in stemming computer fraud by employees:
1. Strict division of duties –Eases supervision/monitoring.
2. Strict control over input, processing, and programs.
3. Shielding Visual Display Units to prevent people with detection equipment that
isable to remotely view what is being displayed on the VDU.
4. Use of logon-Ids and passwords to prevent unauthorized access.
5.Logging computer access –Review of the security logs could identify patterns
ortrends that indicate computer fraud.
6.Biometric access security control.
7.Dial-back procedures.
8.Video cameras to enable detection of physical unauthorized access.
9. Security guards to prevent physical unauthorized access.
10. Alarm system to prevent physical unauthorized access, etc.
gregorymasila answered the question on February 7, 2018 at 20:07


Next: Distinguish between the following pairs of terms: (a) A closed system and an open system. (b) A deterministic and a random system. (c) An open-loop system and a...
Previous: Explain how theft of computer time by employees (unauthorized use of the firm‘s computer) can be minimized.

View More Computer Studies Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions