n this activity, your instructor will assign you to a group with four or five of your peers. Each group member will select a different computer fraud…

n this activity, your instructor will assign you to a group with four or five of your peers. Each group member will select a different computer fraud event from the following list. Research the topic and discuss how the fraud occurred. Assess the effectiveness of the company’s internal controls and recommend accounting information system (AIS) controls that will mitigate the risk of future attacks. Ensure your recommendation is in compliance with industry standards.

A 17-year-old hacker broke into the Bell Laboratories network, destroyed files, copied 52 proprietary software programs, and published confidential information on underground bulletin boards. Many hackers are young, some as young as 12.