Detailed Explanation:
Rationale for Correct Answer:Insider cyberfraud thrives in environments where monitoring is weak. If access logs are not reviewed, malicious activity can go undetected, enabling fraud.
Analysis of Incorrect Options:
B. Programs run during business day – Normal IT operations, not a fraud risk.
C. Restricted access – This is a preventive control, not a facilitator.
D. Separation of duties – Strong control, prevents insider fraud.
Key Concept: Conditions facilitating insider cyberfraud.
[Reference: ACFE Fraud Examiners Manual (2020), Computer and Internet Fraud: Insider Threats., , , , ]
Submit