Under current law works are covered whether or not a

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: her or not the work is registered. Nevertheless, the client still should register its creative works as a way to put the public on notice that it considers its works to be protected as intellectual property. Cybercrime Examples & Related Issues Examples Fraud and Related Activity in Connection Fraud with Access Devices with The IT auditor should ensure that the client’s system of internal The controls prevents or detects unauthorized persons or entities access to sensitive information belonging to another party. Examples of such information would be digital signatures, access cards, passwords, social security numbers, bank account numbers, credit card numbers and IP addresses. In this regard, the IT auditor should ensure that the company’s access devices (e.g., access cards, digital signatures and passwords) are properly secured from misuse by internal or external parties. Also, the IT auditor should check to see that access information belonging to trading partners (such as social security numbers, bank account numbers, credit card numbers and IP addresses) are not misused by internal or external parties. Cybercrime Examples & Related Issues Examples Fraud and Related Activity in Connection Fraud with Computers with This broad area of cybercrime is quite expansive and includes such acts as This hacking into computer systems, producing and distributing viruses, stealing employer information, damaging corporate databases, attacking Web sites to deny service and so on. The key issue for IT auditors is that if they run across situations where computers have been accessed without proper authorization or where authorized users have exceeded their bounds and thereby engage in fraudulent or malicious behaviors, a ‘red flag’ should go up signaling the possibility that cybercrimes may have been committed. As just mentioned, denial of service attacks might also fall under this As umbrella, particularly if the denial does not affect public use of the Internet. However, if the denial of service attack is so pervasive that it degrades consid...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online