Fraud report

What constitutes fraud, how can the company detect and prevent fraud? How vulnerable is the company’s computer system to fraud? Compare and contrast computer attack and abuse tactics with examples.