Chapter 23

Applying Technology to Fraud Prevention

In This Chapter

arrow Understanding information security and risks

arrow Establishing solid controls

arrow Recognizing social engineering schemes

arrow Learning about specific Internet and e-mail scams

arrow Helping companies recognize and avoid scams

According to the Internet Software Consortium, as of July 2010, the Internet connected an estimated 769 million computers in more than 250 countries on every continent, even Antarctica. The Internet is a collection of loosely connected networks that are accessible to anyone with a computer and a network connection. Individuals and organizations anywhere in the world can reach any point on the Internet at any time of day.

Along with the convenience and easy access to information come risks. Among them are the risks that valuable information will be lost, stolen, changed, or misused. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information ...

Get Forensic Accounting For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.