logo

Fraud Examination and Investigation Techniques

   

Added on  2023-06-04

4 Pages722 Words445 Views
Running Head:FRAUD EXAMINATION AND INVESTIGATION TECHNIGUES
1
Fraud Examination, Investigation techniques
Name
Institution
Professor
Course
Date

FRAUD EXAMINATION AND INVESTIGATION TECHNIGUES
2
Fraud Examination and Investigation techniques
Cybercrime issues are hard to be separated from the environment. The modern fraudsters
are protected by the anonymity victims’ embarrassment through the internet. Cyber security and
legislation related to the fraudster plays an important role in modern information technology
development and internet services. United Nations General assembly in 2010 came up with the
solution for the cybercrime and fraudster by introducing cybercrime legislation. Developing
computer cybercrime regulations acts is a fundamental step for all nations. Criminal acts cover
any act that falls within the cyber terrorism (Wells, 2018, p. 59). The cybercrime offenses fall
into three legal principles such as confidentiality, availability, and integrity (Sommer, 2014, p.8).
Most of the communications on the internet and through networks relies on the internet
provider address to reach the intended destination (Casey, 2011, p. 5). In order for the fraudster
examiners to undertake an investigation on the cybercrime that happened in an organization, the
officer should make use of the following laid down steps:
The use of illustration language should be enacted while enlisting legal process.
Make use of the e-mail address information.
The address information with regard to internet provider should be used.
The process of protecting the cybercrime operating systems, any internal computer
misfortunes is ignored. Intelligence services team protects computers against challenges such as
the viruses, spyware, worms and the programs which are not wanted in the computer system.
Investigation team makes sure that any individual who needs access beyond the normal role in an

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Protecting Small Business from Cybercrime
|6
|792
|358

Crypto-currencies and Cybercrime Abstract
|15
|3472
|25

Digital/Cybercrime Evolution, Detection, and Prevention
|9
|1830
|261

Digital Security Laws in Bangladesh - A Comprehensive Analysis
|15
|3352
|269

Introduction to Cyber Crime Week 5
|6
|843
|323

How to Combat Cases of Cybercrime in the Global Society
|13
|3624
|461