Explain the threats faced by modern information systems.

1. Explain the threats faced by modern information systems.
2. Define fraud and describe both the different types of fraud and the process
one follows to perpetuate a fraud.
3. Discuss who perpetrates fraud and why it occurs, including the pressures,
opportunities, and rationalizations that are present in most frauds.
4. Define computer fraud and discuss the different computer fraud
classifications.
5. explain how to prevent and detect computer fraud and abuse