r novices to launch devastating cyber-assaults. A hacker must also find an vulnerability human or technical that he then exploits to circumvent security measures. “Social Engineering”, tricking staff into providing information that can help establish access, often entails posing as a member of the computer or MIS department to obtain passwords from unsuspecting employees. As previously stated, hackers also employ “sniffers” and other software prog5rams to gain access to victim systems. Nobody can predict which companies will be attacked and businesses want to know, how serious is the threat? In truth, know one knows. A system isn’t immune to attack just because the information inside has little value. And, any attack brings obvious costs: lost computer time, employee hours spent on investigation or repairs, lost revenues for e-commerce firms. One key point in fighting computer crime is to design an effective compliance program. An effective compliance program addresses both human and technical vulnerabilities, and protects against both outside and inside attacks. Background and security checks should be performed on key computer network personnel, including outside contractors who build or service the network. All personnel, from the CEO to the stock clerk must understand the risks of social engineering and learn what to do in the event of attack—whom to notify, and how to preserve evidence that may prove useful to company counsel or law enforcement. There are six strategies to follow in deterring computer crime:a.making the crime less likely to occur;b.increasing the difficulty of successfully committing the fraud;c.improve detection methods;d.prosecuting and incarcerating perpetrators;e.using forensics accountants; andf.reducing the losses. (Allen 1977)When all else fails…..call in the law. Hackers, or those committing crimes via the computer can be charged with fraud, invasion of...