Response to the following :
1. Describe fraud involving e-commerce
How do computer viruses, Trojan Horses, and phishing expeditions work? How can these e-commerce pitfalls hurt you? Be specific.
2. Describe components of internal control
List the components of internal control. Briefly describe each component.