Any fraud committed with the aid of, or directly involving a computer or network is considered computer fraud. It’s no wonder then that in today’s highly automated business environment, foiling computer-based fraud has become a top priority as skilled computer experts, international criminal organizations, and even seemingly honest employees steal identities, re-route data for personal gain, and alter data for fraudulent purposes…all with far reaching and costly consequences.
Why attend this course?
- Examine the key risks surrounding computer-based fraud
- Explore the “who, what, and how”
- Investigate specific IT controls that must be in place to reduce the risk of computer fraud, including logical access controls, reduced privileged access, application change management, network controls, encryption, and application system controls
- Benefit from real-life examples of controls’ effectiveness
- Review a range of fraud studies with control recommendations from sources including the Association of Certified Fraud Examiners