What people are saying - Write a review
We haven't found any reviews in the usual places.
Fraud in the IT Environment
Hacking and Other Threats
5 other sections not shown
amendments auditors authorised back-up British Telecom cash checking claim committed computer application computer centre Computer Crime computer department computer expert computer fraud Computer Networks computer operation computer programs computer security computer system computer terminal computer-based systems computer-related concealment courts criminal data preparation data processing staff definition of fraud defraud dial-back device dial-in dial-up dishonest documents duties employees ensure error EVIDENCE ACT 1938 files fraud and abuse fraud investigation fraudster fraudulent hacker hacking identify input Insured interview involved loss members of staff ment microcomputer NCC Publications Network User normally offence Ontario Provincial Police opportunity organisation output Packet SwitchStream perpetrator Policy polygraph pre-employment screening problem procedures prosecution records relevant responsible risk Schifreen security copies shredded standard user ids technique telephone numbers terminal theft threat tion trade union transaction type of fraud unauthorised Waste paper merchants YES/NO If Yes