Answer the following questions: Always references are checked.
1) Discuss how social engineering techniques contribute to computer abuse and misuse.
2) Discuss how social media contributes to computer abuse and computer crimes.
3) Describe and discuss at least two of the hacking techniques mentioned in the chapter that you or family/friends have experienced. How did you solve the hacking attack?
4) Find from a non-chapter source an example of the use of computer hacking being used for embezzlement. Cite your source(s). Discuss the situation you found.
5) Find an example on the Internet of a fraud case involving the use of a computer system and related to a commercial business. Describe it and discuss the specifics of the use of the computer technology in the fraud situation.
6) Locate and describe the professional credentials of individuals working within the broad field of fraud examinations and forensic accounting.
7) Describe and discuss the role that accountants perform in computer security.
Answer all the questions. No plagiarism. Using esay vocabulary is enough. Each question about 150 words.