Even within the relatively narrow field of computerbased fraud detection,
significant differences in task performance and knowledge requirements exist. For
example, computer forensics requires knowledge of disk cloning, operating systems, file
and graphics formats, and scripting for automation. In contrast, data theft prevention and
investigation requires knowledge of databases, security, intrusion detection, hacking
principles, and encryption.