Computer Crime
Add / delete / modify inputs
Modify / develop programs that commit a crime
Alter / modify data files
Operate IT in a way to commit a crime
Divert / misuse valid output
Role of auditor
Previous slide
Next slide
Back to first slide
View graphic version