This website uses cookies to ensure you have the best experience. Learn more

Computer Fraud Essay

1037 words - 5 pages

How Computer Fraud and Abuse Evolved
Before 1984 there was little that could be done about computer fraud. In 1984 the Counterfeit Access Device and Computer Fraud and Abuse Act was the first legislation on computer fraud. The act made it a misdemeanor to illegally retrieve financial and credit information by computer. Also, the act made it illegal to cause harm to other computer systems. Around this time, what constitutes computer crime was still an ongoing discussion. As a Federal Act, only half of the states passed similar statues. (History of Computer Crime)
The Computer Fraud and Abuse Act can be violated in two ways, either by an outsider trespasses into a computer or by someone ...view middle of the document...

(History of Computer Crime)
The September 11 terrorist attack in 2001 led to the creation of the USA PATRIOT Act. Although it wasn't associated with computer fraud or abuse directly, the act allowed government agencies to intercept and stop terrorism by strengthening the capability to detect malicious computer activities. The Computer Security Institute discovered that security breaches had been reported in 90% of government agencies and in large cooperation’s in 2002. They also discovered that $455 million was loss due to the abuse of computers. (History of Computer Crime)
Prior to the USA PATRIOT Act, The Computer Fraud and Abuse Act contained no distinct definition for a loss. In the case United States v. Middleton, a case argued before the passing of the USA PATRIOT Act. In this case Middleton accessed his former employer’s computer system without authorization and as a result, the company was forced to pay to repair the system. This case defined the definition of a loss as “any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system or information to its condition prior to the offense, and any revenue lost, cost incurred, or other consequential damages incurred because of interruption of service.” (Virus: A Retrospective - Legal Implications)
In 2008, The Computer Fraud and Abuse Act were amended by the Identity Theft Enforcement and Restitution Act. The amendment made causing damage to ten or more computers into a felony. Also it done away with the need for a plaintiff loss to bee more than $5,000 but they still need to show they suffered from a loss or damage. (Computer Fraud and Abuse Act (CFAA))
Business implications
It’s important for all organizations to protect their information system from computer fraud. Organizations are starting to implement policies or action that will decrease the potential for fraud and any loss as a result. These policies or actions include, improving the detection of fraud, reduce the fraud loses, making it more difficult to commit fraud, and making it less likely...

Other Essays Like Computer Fraud

Heartbleed Bug Essay

601 words - 3 pages being used to commit fraud or file fraudulent tax returns. With the touch a button you can notice your local law enforcement department with a facial picture and a fingerprint. Program Red Flag will red flag the social security numbers of the decease linked to a database which will alert social security’s main office with the IP Address of the computer and internet service provider in which fraud was attempted. In closing we must familiarize

The Dangers of Internet Fraud Essay

798 words - 4 pages groups run illegal businesses, known as “rackets,” or when an organized crime uses legitimate organizations to embezzle funds. The federal government and some state governments have created laws designed to prosecute cybercriminals like David Camez. Laws concerning computer crimes have been enacted at the state and federal levels. Congress passed the Computer Fraud and Abuse Act (CFAA). As Internet technology advances, this law gets amended

Business Plan

1226 words - 5 pages will be records of all transactions that have taken place in the company for a certain period. Technology consists of CCTV cameras and even computers. For example, fraud in a company can be minimized by connecting the office computers so that if transactions are made through one computer, they reflect in the other computers. This can help reduce fraud because a person can be noted if he tries to commit fraud in the company because the records

Cyber Crime

1744 words - 7 pages reproduction of technology. The effect that cyber crime has on the economy and its victims is very drastic. In the 1990’s cyber crimes were estimated at 80 million dollars in damages caused by nationwide virus outbreaks. The most common committed types of cyber crime would be fraud, unauthorized computer access, cyber terrorism and copy right violations. Fraud has been titled “the broadest category of cyber crime”. According to the FBI’s Internet

Double-Dealing

1782 words - 8 pages , to charge crimes other than false certification. Fraud risk cannot be eliminated. It can be controlled. Technology, such as computer software, materially assist fraud investigators, but economic reality can be concealed through misleading contracts of economic rights and obligations. VII. Appendix x VIII. References The Anatomy of Corporate Fraud: A Comparative Analysis of High Profile American and European Corporate Scandals

Information Technology Acts  Paper

673 words - 3 pages , pictorial, textual and numerical information by a microelectronics-based combination of telecommunications and computing”.  Includes various areas incluing, computer software and hardware, programming langueages and processes. After doing extensive research in a lot of the Technology Acts, the following acts are going to be discussed within this paper;  Computer Fraud and Abuse Act,   (CFAA) 1986    and Children’s Protection Act, 2000 (CIPA

Computer Science Info-Age And Ethics

1199 words - 5 pages Computer Science Info-Age and Ethics New times bring new crimes. It's a story as old as humanity and as new as the Internet. First come cars, and then car thieves. Telephones are followed by telephone fraud. Now we've got computers . . .. To make home, school, and office life easier, society relies on computers. As a result of this dependency, computer use grows everyday. Along with the growing use of computers

Forensic Accounting

4859 words - 20 pages forms of irregularities and fraud. Therefore, fraud requires more sophisticated approach from preventative to detection. One of the modern approaches that can be used from the prevention to detection is called forensic accounting. According to Hansen (2009), computer forensics is currently the investigators best tools in detecting and implementation of white-collar investigations. Degboro and Olofinsola (2007) described forensic accounting as the

Threats to Computer Security

1164 words - 5 pages cases, the errors create vulnerabilities. Errors can occur during all phases of the systems life cycle. 2. Fraud and Theft Computer systems can be exploited for both fraud and theft both by "automating" traditional methods of fraud and by using new methods. For example, individuals may use a computer to skim small amounts of money from a large number of financial accounts, assuming that small discrepancies may not be investigated. Financial

Impact of Information Technology on Banking Sector

576 words - 3 pages current IT computer systems in banks have to be re-developed to meet future requirements. The aim of this project is to evaluate how the banking industry has applied IT; the effects of IT on competition; current IT applications and systems problems; the security of IT systems; IT risk and IT fraud and the future application of IT in the banking industry. The focus of the report has mainly been in the UK and US. In the research, the banking

Dishing the Dirt on White Collar Crimes

2847 words - 12 pages Dishing the Dirt on White Collar Crimes A subject which is very interesting to me is white collar crimes. There are so many white collar crimes, and we will look at various cases such as larceny, forgery, computer fraud, credit card fraud, identity theft, embezzlement, welfare fraud, and extortion just name a few. Some of these crimes are very well known, while some are not though it still remains that the crime was committed. Some would

Related Papers

Accounting Information System Report

2045 words - 9 pages REPORT ON REDUCING COMPUTER FRAUD Name: ZHAOJUN HU Student NO: 20137098 Class: TACC403 Accounting information system Submission date: September 20, 2013 TABLE OF CONTENTS EXECUTIVE SUMMARY i INTRODUCTION 1 IS SOFTWARE LICENSING ANTISOCIAL?..................................................................2 COMPUTER SECURITY MEASURES 3 WOULD THE REMOVAL OF COMPUTER SECURITY MASURES REDUCE THE INCIDENCE OF

Information System About Accounting Essay

1127 words - 5 pages managerial-level employees to have access to advanced reporting and statistical analysis. The systems can be used to gather information, to develop various scenarios, and to choose an optimal answer among alternative scenarios. Information system about fraud There is one way to categorize computer fraud is to use the data processing model. Input fraud— The simplest and most common way to commit a fraud is to alter or falsify computer input. For

The Impact Of Fraud On The Nonprofit And Social Services Sector

4356 words - 18 pages as a Detective Sergeant, Darryl has been involved in the detection and prevention of fraud in a variety of situations and cases. Darryl’s reputation as one of the experts in this field is widely recognized. He has been involved in cases that include white collar crime investigation, money laundering, insurance fraud and computer forensic investigation. Since joining Sobel, Darryl has been involved in domestic and international engagements

Research Your Career Essay

626 words - 3 pages to prove or disprove infidelity. Example: At an insurance company, a new investigator will learn to recognize insurance fraud. At a firm that specializes in domestic cases, a new worker might observe a senior investigator performing surveillance. New investigators are put on cases and gain skills as they go. Education/Skills Requirements: For most computer forensics work, a bachelor’s degree is preferred. For computer forensics work, a