Computer-enabled fraud is the use of information technology (IT) to commit or conceal fraudulent activities, such as theft, manipulation, or unauthorized access of data, systems, or networks. Computer-enabled fraud can pose significant risks to an organization, such as financial loss, reputational damage, legal liability, or regulatory sanctions. Therefore, an organization should establish a comprehensive and effective framework to prevent, detect, and respond to computer-enabled fraud. The framework should involve three lines of defense, which are theroles and responsibilities of different functions within theorganization to manage and control risks. The first line of defense consists of the business owners, whose role is to identify, assess, and manage risks, including computer-enabled fraud risks. The primary responsibility of the first line of defense related to computer-enabled fraud is to implement processes to detect and deter fraud. This means designing and executing controls that can prevent or reduce the occurrence of computer-enabled fraud, such as authentication, authorization, encryption, logging, orsegregation of duties. This also means monitoring and reporting any suspicious or anomalous activities or transactions that may indicate computer-enabled fraud, such as unusual patterns, volumes, or frequencies of data or system access or usage. Implementing processes to detect and deter fraud can help the first line of defense to protect the organization’s assets, data, and reputation from computer-enabled fraud, and to comply with the organization’s policies and regulations. References = Three Lines of Defence, Roles of Three Lines of Defense for Information Security and Governance, THE THREE LINES OF DEFENSE IN EFFECTIVE RISK MANAGEMENT AND CONTROL, The Three Lines of Defense.