You are on page 1of 5

ADVANCED INFORMATION SYSTEM

AUDITING
Dimas riskti budi Setiawan
Ricky lie jaya
AUDITING E-COMMERCE
SYSTEMS
 E-Commerce Audit Approach
 Audit Tools and Techniques
 Auditing Security Control Structures
 Computer Assisted Audit Techniques
FOILING THE SYSTEMS
HACKER
 APA ITU HACKER
 MENGAPA KITA BISA TERKENA HACKER/KECURIAN DATA
 BAGAIMANA BENTUK BENTUK TINDAKAN PENCURIAN DATA
INVESTIGATING INFORMATION TECHNOLOGY FRAUD

 ■ Pre-incident preparation

 ■ Detection of incidents

 ■ Initial response

 ■ Response strategy formulation

 ■ Duplication (forensic backups)

 ■ Investigation

 ■ Security measure implementation

 ■ Network monitoring

 ■ Recovery

 ■ Reporting

 ■ Follow-up

You might also like