E-Crime Investment Prevention and Management

  • CODE
  • COURSE NAME
  • DATE
  • VENUE

E-Crime Investment Prevention and Management

introduction

Electronic crime, also known as e-crime or cybercrime, refers to criminal activity that involves the Internet, a computer or other electronic devices. Some e-crime relates specifically to computers, such as distributing damaging electronic viruses or launching a denial-of-service attack which causes a computer system to deny service to any authorised user. Other examples include fraud, harassment, copyright breaches and making, possessing or distributing objectionable material.

There has been investments in new electronic systems to enable more efficient working across the criminal justice system by acting as a first step to a “unified virtual case management system” for all of the various government agencies involved in criminal justice.

It will focus on the determinants factor of preventing cybercrimes that are getting more prevalent in cyberspace against the backdrop of the legal landscape. This cyber-crime issue not also has become a viral in information system environment but knocks out as a general issue that could be harm national constitution. As national institution like Cyber Security use to help to face the challenges, but there is no agreed indicator to measures the success. According to Cyber Security, a very challenging part in cyber crime investigation is the gathering of evidence and most of the cyber crimes issues are financially motivated. The impact of the economic downturn and financial crisis could potentially lead to the increase in cyber crime cases globally. With regards to this challenge, this can be done to find a solution and model of prevention, if any, with some sort of recommendation to overcome such challenge.

Course Objectives

  • To create awareness on existing and emerging cyber security threats and attacks;
  • financial institutions have been charged to channel more resources into the training of staff to help reduce employee involvement in fraud cases in the banking sector.
  • To provide participants with practical methods on how to detect and counter phishing attacks, data leakage/compromise schemes, social engineering schemes, email attacks, among others
  • demonstrate how computer software may be used to organize, analyze, and present information
  •  identify various ways that an accounting system may be used to conceal the true nature of fraudulent transactions