SlideShare une entreprise Scribd logo
1  sur  169
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 1 of 175
C HAPTER 5
Computer Fraud and Abuse
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 2 of 175
INTRODUCTION
• Questions to be addressed in this chapter:
– What is fraud, and how are frauds
perpetrated?
– Who perpetrates fraud and why?
– What is computer fraud, and what forms does
it take?
– What approaches and techniques are used to
commit computer fraud?
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 3 of 175
INTRODUCTION
• Information systems are becoming
increasingly more complex and society is
becoming increasingly more dependent on
these systems.
– Companies also face a growing risk of these
systems being compromised.
– Recent surveys indicate 67% of companies
suffered a security breach in the last year with
almost 60% reporting financial losses.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 4 of 175
INTRODUCTION
• Companies face four types of threats to
their information systems:
– Natural and political disasters
• Include:
– Fire or excessive heat
– Floods
– Earthquakes
– High winds
– War and terrorist attack
• When a natural or political disaster
strikes, many companies can be
affected at the same time.
– Example: Bombing of the
World Trade Center in NY.
• The Defense Science Board has
predicted that attacks on
information systems by foreign
countries, espionage agents, and
terrorists will soon be widespread.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 5 of 175
INTRODUCTION
• Companies face four types of threats to
their information systems:
– Natural and political disasters
– Software errors and equipment
malfunction
• Include:
– Hardware or software
failures
– Software errors or bugs
– Operating system
crashes
– Power outages and
fluctuations
– Undetected data
transmission errors
• Estimated annual economic
losses due to software
bugs = $60 billion.
• 60% of companies studied
had significant software
errors in previous year.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 6 of 175
INTRODUCTION
• Companies face four types of threats to
their information systems:
– Natural and political disasters
– Software errors and equipment malfunction
– Unintentional acts
• Include
– Accidents caused by:
• Human carelessness
• Failure to follow established
procedures
• Poorly trained or supervised
personnel
– Innocent errors or omissions
– Lost, destroyed, or misplaced data
– Logic errors
– Systems that do not meet needs or
are incapable of performing intended
tasks
• Information Systems Security Assn.
estimates 65% of security problems are
caused by human error.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 7 of 175
INTRODUCTION
• Companies face four types of threats to
their information systems:
– Natural and political disasters
– Software errors and equipment malfunction
– Unintentional acts
– Intentional acts (computer crime)
• Include:
– Sabotage
– Computer fraud
– Misrepresentation, false use, or
unauthorized disclosure of data
– Misappropriation of assets
– Financial statement fraud
• Information systems are increasingly
vulnerable to these malicious attacks.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 8 of 175
INTRODUCTION
• In this chapter we’ll discuss:
– The fraud process
– Why fraud occurs
– Approaches to computer fraud
– Specific techniques used to commit computer
fraud
– Ways companies can deter and detect
computer fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 9 of 175
INTRODUCTION
• In this chapter we’ll discuss:
– The fraud process
– Why fraud occurs
– Approaches to computer fraud
– Specific techniques used to commit computer
fraud
– Ways companies can deter and detect
computer fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 10 of 175
THE FRAUD PROCESS
• Fraud is any and all means a person uses to
gain an unfair advantage over another person.
• In most cases, to be considered fraudulent, an
act must involve:
– A false statement (oral or in writing)
– About a material fact
– Knowledge that the statement was false when it was
uttered (which implies an intent to deceive)
– A victim relies on the statement
– And suffers injury or loss as a result
• The definition is the same whether it is a
criminal or civil fraud case.
– The only difference is the burden of
proof required.
• Criminal case: beyond a
reasonable doubt.
• Civil case: preponderance of the
evidence OR clear and convincing
evidence.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 11 of 175
THE FRAUD PROCESS
• Because fraudsters don’t make journal entries to
record their frauds, we can only estimate the
amount of losses caused by fraudulent acts:
– The Association of Certified Fraud Examiners (ACFE)
estimates that total fraud losses in the United States
run around 6% of annual revenues or approximately
$660 billion in 2004.
• More than we spend on education and roads in a year.
• Six times what we pay for the criminal justice system.
– Income tax fraud (the difference between what
taxpayers owe and what they pay to the government)
is estimated to be over $200 billion per year.
– Fraud in the healthcare industry is estimated to
exceed $100 billion a year.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 12 of 175
THE FRAUD PROCESS
• Fraud against companies may be committed by
an employee or an external party.
– Former and current employees (called
knowledgeable insiders) are much more likely than
non-employees to perpetrate frauds (and big ones)
against companies.
• Largely owing to their understanding of the company’s
systems and its weaknesses, which enables them to commit
the fraud and cover their tracks.
– Organizations must utilize controls to make it difficult
for both insiders and outsiders to steal from the
company.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 13 of 175
THE FRAUD PROCESS
• Fraud perpetrators are often referred to as
white-collar criminals.
– Distinguishes them from violent criminals,
although some white-collar crime can
ultimately have violent outcomes, such as:
• Perpetrators or their victims committing suicide.
• Healthcare patients killed because of alteration of
information, etc., that can result in their deaths.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 15 of 175
THE FRAUD PROCESS
• Three types of occupational fraud:
– Misappropriation of assets
• Involves theft, embezzlement, or misuse of
company assets for personal gain.
• Examples include billing schemes, check
tampering, skimming, and theft of inventory.
• In the 2004 Report to the Nation on Occupational
Fraud and Abuse, 92.7% of occupational frauds
involved asset misappropriation at a median cost
of $93,000.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 16 of 175
THE FRAUD PROCESS
• Three types of occupational fraud:
– Misappropriation of assets
– Corruption
• Corruption involves the wrongful use of a
position, contrary to the responsibilities of
that position, to procure a benefit.
• Examples include kickback schemes and
conflict of interest schemes.
• About 30.1% of occupational frauds include
corruption schemes at a median cost of
$250,000.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 17 of 175
THE FRAUD PROCESS
• Three types of occupational fraud:
– Misappropriation of assets
– Corruption
– Fraudulent statements
• Financial statement fraud involves misstating the financial condition of
an entity by intentionally misstating amounts or disclosures in order to
deceive users.
• Financial statements can be misstated as a result of intentional efforts
to deceive or as a result of undetected asset misappropriations that
are so large that they cause misstatement.
• About 7.9% of occupational frauds involve fraudulent statements at a
median cost of $1 million. (The median pales in comparison to the
maximum cost.)
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 18 of 175
THE FRAUD PROCESS
• A typical employee fraud has a number of important elements or
characteristics:
– The fraud perpetrator must gain the trust or confidence of the
person or company being defrauded in order to commit and
conceal the fraud.
– Instead of using a gun, knife, or physical force, fraudsters use
weapons of deceit and misinformation.
– Frauds tend to start as the result of a perceived need on the part
of the employee and then escalate from need to greed. Most
fraudsters can’t stop once they get started, and their frauds grow
in size.
– The fraudsters often grow careless or overconfident over time.
– Fraudsters tend to spend what they steal. Very few save it.
– In time, the sheer magnitude of the frauds may lead to detection.
– The most significant contributing factor in most employee frauds
is the absence of internal controls and/or the failure to enforce
existing controls.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 19 of 175
THE FRAUD PROCESS
• The National Commission on Fraudulent
Financial Reporting (aka, the Treadway
Commission) defined fraudulent financial
reporting as intentional or reckless conduct,
whether by act or omission, that results in
materially misleading financial statements.
• Financial statements can be falsified to:
– Deceive investors and creditors
– Cause a company’s stock price to rise
– Meet cash flow needs
– Hide company losses and problems
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 20 of 175
THE FRAUD PROCESS
• Fraudulent financial reporting is of great
concern to independent auditors, because
undetected frauds lead to half of the
lawsuits against auditors.
• In the case of Enron, a financial statement
fraud led to the total elimination of Arthur
Andersen, a premiere international public
accounting firm.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 21 of 175
THE FRAUD PROCESS
• Common approaches to “cooking the
books” include:
– Recording fictitious revenues
– Recording revenues prematurely
– Recording expenses in later periods
– Overstating inventories or fixed assets
(WorldCom)
– Concealing losses and liabilities
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 22 of 175
THE FRAUD PROCESS
• The Treadway Commission recommended four
actions to reduce the possibility of fraudulent
financial reporting:
– Establish an organizational environment that
contributes to the integrity of the financial reporting
process.
– Identify and understand the factors that lead to
fraudulent financial reporting.
– Assess the risk of fraudulent financial reporting within
the company.
– Design and implement internal controls to provide
reasonable assurance that fraudulent financial
reporting is prevented.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 23 of 175
THE FRAUD PROCESS
• SAS 99: The Auditor’s Responsibility to
Detect Fraud
– In 1997, SAS-82, Consideration of Fraud in a
Financial Statement Audit, was issued to
clarify the auditor’s responsibility to detect
fraud.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 24 of 175
THE FRAUD PROCESS
• A revision to SAS-82, SAS-99, was issued in
December 2002. SAS-99 requires auditors to:
– Understand fraud
• Auditors can’t effectively audit something they don’t
understand.
• SAS-99 also indicated that auditors are not lawyers and “do not
make legal determinations of whether fraud has occurred.”
• The external auditor’s interest specifically relates to acts that
result in a material misstatement of the financial statements.
• Note that SAS-99 relates to external auditors. Internal auditors
will have a more extensive interest in fraud than just those that
impact financial statements.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 25 of 175
THE FRAUD PROCESS
• A revision to SAS-82, SAS-99, was issued in
December 2002. SAS-99 requires auditors to:
– Understand fraud
– Discuss the risks of material fraudulent
misstatements
• While planning the audit, members of the audit team
should discuss how and where the company’s financial
statements might be susceptible to fraud.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 26 of 175
THE FRAUD PROCESS
• A revision to SAS-82, SAS-99, was issued in
December 2002. SAS-99 requires auditors to:
– Understand fraud
– Discuss the risks of material fraudulent misstatements
– Obtain information
• The audit team must gather evidence about the existence of fraud
by:
– Looking for fraud risk factors
– Testing company records
– Asking management, the audit committee, and others if they
know of any past or current fraud or of fraud risks the
organization faces.
• Special care needs to be exercised in examining revenue
accounts, since they are particularly popular fraud targets.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 27 of 175
THE FRAUD PROCESS
• A revision to SAS-82, SAS-99, was issued in
December 2002. SAS-99 requires auditors to:
– Understand fraud
– Discuss the risks of material fraudulent misstatements
– Obtain information
– Identify, assess, and respond to risks
• Use the gathered information to identify, assess, and respond to
risks.
• Auditors can respond by varying the nature, timing, and extent
of auditing procedures they perform.
• They should also carefully evaluate risks related to management
override of controls.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 28 of 175
THE FRAUD PROCESS
• A revision to SAS-82, SAS-99, was issued in
December 2002. SAS-99 requires auditors to:
– Understand fraud
– Discuss the risks of material fraudulent misstatements
– Obtain information
– Identify, assess, and respond to risks
– Evaluate the results of their audit tests
• Auditors must assess the risk of fraud throughout the
audit.
• When the audit is complete, they must evaluate whether
any identified misstatements indicate the presence of
fraud.
• If so, they should determine the impact on the financial
statements and the audit.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 29 of 175
THE FRAUD PROCESS
• A revision to SAS-82, SAS-99, was issued in
December 2002. SAS-99 requires auditors to:
– Understand fraud
– Discuss the risks of material fraudulent misstatements
– Obtain information
– Identify, assess, and respond to risks
– Evaluate the results of their audit tests
– Communicate findings
• Auditors communicate their fraud
findings to management, the audit
committee, and others.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 30 of 175
THE FRAUD PROCESS
• A revision to SAS-82, SAS-99, was issued in
December 2002. SAS-99 requires auditors to:
– Understand fraud
– Discuss the risks of material fraudulent misstatements
– Obtain information
– Identify, assess, and respond to risks
– Evaluate the results of their audit tests
– Communicate findings
– Document their audit work
• Auditors must document their
compliance with SAS-99 requirements.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 31 of 175
THE FRAUD PROCESS
• A revision to SAS-82, SAS-99, was issued in
December 2002. SAS-99 requires auditors to:
– Understand fraud
– Discuss the risks of material fraudulent misstatements
– Obtain information
– Identify, assess, and respond to risks
– Evaluate the results of their audit tests
– Communicate findings
– Document their audit work
– Incorporate a technology focus
• SAS-99 recognizes that technology impacts fraud
risks and notes opportunities that auditors have
to use technology-oriented tools and techniques
to design fraud auditing procedures.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 32 of 175
INTRODUCTION
• In this chapter we’ll discuss:
– The fraud process
– Why fraud occurs
– Approaches to computer fraud
– Specific techniques used to commit computer
fraud
– Ways companies can deter and detect
computer fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 33 of 175
WHO COMMITS FRAUD AND WHY
• Researchers have compared the psychological and
demographic characteristics of three groups of people:
– White-collar criminals
– Violent criminals
– The general public
• They found:
– Significant differences between violent and white-collar
criminals.
– Few differences between white-collar criminals and the general
public.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 34 of 175
WHO COMMITS FRAUD AND WHY
• White-collar criminals tend to mirror the general
public in:
– Education
– Age
– Religion
– Marriage
– Length of employment
– Psychological makeup
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 35 of 175
WHO COMMITS FRAUD AND WHY
• Perpetrators of computer fraud tend to be
younger and possess more computer
knowledge, experience, and skills.
• Hackers and computer fraud perps tend to be
more motivated by:
– Curiosity
– A quest for knowledge
– The desire to learn how things work
– The challenge of beating the system
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 36 of 175
WHO COMMITS FRAUD AND WHY
• They may view their actions as a game rather than
dishonest behavior.
• Another motivation may be to gain stature in the hacking
community.
• Some see themselves as revolutionaries spreading a
message of anarchy and freedom.
• But a growing number want to profit financially. To do so,
they may sell data to:
– Spammers
– Organized crime
– Other hackers
– The intelligence community
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 37 of 175
WHO COMMITS FRAUD AND WHY
• Some fraud perpetrators are disgruntled and
unhappy with their jobs and are seeking revenge
against their employers.
• Others are regarded as ideal, hard-working
employees in positions of trust.
• Most have no prior criminal record.
• So why are they willing to risk everything?
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 38 of 175
WHO COMMITS FRAUD AND WHY
• Criminologist Donald Cressey, interviewed 200+
convicted white-collar criminals in an attempt to
determine the common threads in their crimes.
As a result of his research, he determined that
three factors were present in the commission of
each crime. These three factors have come to
be known as the fraud triangle.
– Pressure
– Opportunity
– Rationalization
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 39 of 175
The “Fraud Triangle”
Donald Cressey
Pressure
Opportunity
Rationalization
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 40 of 175
The “Fraud Triangle”
Donald Cressey
Pressure
Pressure
Opportunity
Rationalization
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 41 of 175
WHO COMMITS FRAUD AND WHY
• Pressure
–Cressey referred to this pressure as a
“perceived non-shareable need.”
–The pressure could be related to
finances, emotions, lifestyle, or some
combination.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 42 of 175
WHO COMMITS FRAUD AND WHY
• The most common pressures were:
- Not being able to pay one’s debts, nor admit it to
one’s employer, family, or friends (which makes it
non-shareable).
• May be associated with vices, such
as drugs, gambling, mistresses, etc.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 43 of 175
WHO COMMITS FRAUD AND WHY
• The most common pressures were:
- Not being able to pay one’s debts, nor admit it to
one’s employer, family, or friends (which makes in
non-shareable).
- Fear of loss of status because of a personal
failure • Example would be mismanagement of
a personal investment or retirement
fund.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 44 of 175
WHO COMMITS FRAUD AND WHY
• The most common pressures were:
- Not being able to pay one’s debts, nor admit it to
one’s employer, family, or friends (which makes in
non-shareable).
- Fear of loss of status because of a personal failure
- Business reversals
• Not many people can walk away from
a failing business.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 45 of 175
WHO COMMITS FRAUD AND WHY
• The most common pressures were:
- Not being able to pay one’s debts, nor admit it to
one’s employer, family, or friends (which makes in
non-shareable).
- Fear of loss of status because of a personal failure
- Business reversals
- Physical isolation
• When an individual is isolated,
physically or psychologically, almost
any pressure becomes non-
shareable.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 46 of 175
WHO COMMITS FRAUD AND WHY
• The most common pressures were:
- Not being able to pay one’s debts, nor admit it to
one’s employer, family, or friends (which makes in
non-shareable).
- Fear of loss of status because of a personal failure
- Business reversals
- Physical isolation
- Status gaining
• Many frauds are motivated by nothing
more than a perceived need to keep
up with the Joneses.
• The problem is that there is always a
richer “Jones” down the street and
the pressure continues to mount, as
do the resulting thefts.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 47 of 175
WHO COMMITS FRAUD AND WHY
• The most common pressures were:
- Not being able to pay one’s debts, nor admit it to
one’s employer, family, or friends (which makes in
non-shareable).
- Fear of loss of status because of a personal failure
- Business reversals
- Physical isolation
- Status gaining
- Difficulties in employer-employee relations
• May create pressure to get revenge,
take the money you feel is rightfully
owed to you, etc.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 48 of 175
WHO COMMITS FRAUD AND WHY
• What’s important here is the perception of the
pressure.
– There might be a number of people who could and would
help a tentative fraudster out of his financial woes.
– But as long as he perceives that he cannot share his
burden, the pressure is present.
– Research has also found that an individual’s propensity to
commit fraud is more related to how much he worries
about his financial position than his actual position.
– The millionaire who frets a lot about his financial condition
is more likely to commit fraud than the guy who doesn’t
have two dimes to rub together but isn’t worried about it.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 49 of 175
WHO COMMITS FRAUD AND WHY
• Financial statement fraud is distinct from other
types of fraud in that the individuals who commit
the fraud are not the direct beneficiaries.
– The company is the direct beneficiary.
– The perpetrators are typically indirect beneficiaries.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 50 of 175
WHO COMMITS FRAUD AND WHY
• In the case of financial statement frauds, common
pressures include:
– To prop up earnings or stock price so that management can:
• Receive performance-related compensation.
• Preserve or improve personal wealth held in company stock
or stock options.
• Keep their jobs.
– To cover the inability to generate cash flow.
– To obtain financing.
– To appear to comply with bond covenants or other agreements.
– May be opposite of propping up earnings in cases involving
income-tax motivations, government contracts, or regulation.
• Click here for a comprehensive list of pressures.
PressuresPressures
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 52 of 175
The “Fraud Triangle”
Donald Cressey
Pressure
Opportunity
Opportunity
Rationalization
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 53 of 175
WHO COMMITS FRAUD AND WHY
• Opportunity is the opening or gateway that
allows an individual to:
– Commit the fraud
– Conceal the fraud
– Convert the proceeds
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 54 of 175
WHO COMMITS FRAUD AND WHY
• Opportunity is the opening or gateway that
allows an individual to:
– Commit the fraud
– Conceal the fraud
– Convert the proceeds
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 55 of 175
WHO COMMITS FRAUD AND WHY
• Committing the fraud might involve acts
such as:
– Misappropriating assets.
– Issuing deceptive financial statements.
– Accepting a bribe in order to make an
arrangement that is not in the company’s best
interest.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 56 of 175
WHO COMMITS FRAUD AND WHY
• Opportunity is the opening or gateway that
allows an individual to:
– Commit the fraud
– Conceal the fraud
– Convert the proceeds
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 57 of 175
WHO COMMITS FRAUD AND WHY
• Concealing the fraud often takes more time and
effort and leaves more evidence than the actual
theft or misrepresentation.
• Examples of concealment efforts:
– Charge a stolen asset to an expense account or to
an account receivable that is about to be written
off.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 58 of 175
WHO COMMITS FRAUD AND WHY
• Concealing the fraud often takes more time and
effort and leaves more evidence than the actual
theft or misrepresentation.
• Examples of concealment efforts:
– Charge a stolen asset to an expense account or to an
account receivable that is about to be written off.
– Create a ghost employee who receives an extra
paycheck.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 59 of 175
WHO COMMITS FRAUD AND WHY
• Concealing the fraud often takes more time and
effort and leaves more evidence than the actual
theft or misrepresentation.
• Examples of concealment efforts:
– Charge a stolen asset to an expense account or to an
account receivable that is about to be written off.
– Create a ghost employee who receives an extra
paycheck.
– Lapping.
• Steal a payment from Customer A.
• Apply Customer B’s payment to Customer A’s account so
Customer A won’t get a late notice.
• Apply Customer C’s payment to Customer B’s account,
so Customer B won’t get a late notice, etc.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 60 of 175
WHO COMMITS FRAUD AND WHY
• Concealing the fraud often takes more time and
effort and leaves more evidence than the actual
theft or misrepresentation.
• Examples of concealment efforts:
– Charge a stolen asset to an expense account or to an
account receivable that is about to be written off.
– Create a ghost employee who receives an extra
paycheck.
– Lapping.
– Kiting.
• Creates “cash” by transferring money between banks.
• Requires multiple bank accounts.
• Basic scheme:
– Write a check on the account of Bank A.
– Bank A doesn’t have sufficient funds to cover the
check, so write a check from an account in Bank B to
be deposited in Bank A.
– Bank B doesn’t have sufficient funds to cover the
check, so write a check from an account in Bank C to
be deposited in Bank B, etc.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 61 of 175
WHO COMMITS FRAUD AND WHY
• Opportunity is the opening or gateway that
allows an individual to:
– Commit the fraud
– Conceal the fraud
– Convert the proceeds
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 62 of 175
WHO COMMITS FRAUD AND WHY
• Unless the target of the theft is cash, then
the stolen goods must be converted to
cash or some form that is beneficial to the
perpetrator.
– Checks can be converted through alterations,
forged endorsements, check washing, etc.
– Non-cash assets can be sold (online auctions
are a favorite forum) or returned to the
company for cash.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 63 of 175
WHO COMMITS FRAUD AND WHY
• If the fraud is a financial statement fraud,
then the gains received may include:
– I have to keep my job.
– The value of my stock or stock options rose.
– I received a raise, promotion, or bonus.
– I have power.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 64 of 175
• There are many opportunities that enable fraud.
Some of the most common are:
– Lack of internal controls
– Failure to enforce controls (the most prevalent
reason)
– Excessive trust in key employees
– Incompetent supervisory personnel
– Inattention to details
– Inadequate staff
• Click here for a comprehensive list of
opportunities.
WHO COMMITS FRAUD AND WHY
OpportunitiesOpportunities
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 69 of 175
WHO COMMITS FRAUD AND WHY
• Internal controls that may be lacking or un-
enforced include:
– Authorization procedures
– Clear lines of authority
– Adequate supervision
– Adequate documents and records
– A system to safeguard assets
– Independent checks on performance
– Separation of duties
• One control feature that many companies lack is
a background check on all potential employees.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 70 of 175
WHO COMMITS FRAUD AND WHY
• Management may allow fraud by:
– Not getting involved in the design or
enforcement of internal controls;
– Inattention or carelessness;
– Overriding controls; and/or
– Using their power to compel subordinates to
carry out the fraud.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 71 of 175
The “Fraud Triangle”
Donald Cressey
Pressure
Opportunity
RationalizationRationalization
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 72 of 175
WHO COMMITS FRAUD AND WHY
• How many people do you know who regard
themselves as being unprincipled or sleazy?
• It is important to understand that fraudsters do
not regard themselves as unprincipled.
– In general, they regard themselves as highly
principled individuals.
– That view of themselves is important to them.
– The only way they can commit their frauds and
maintain their self image as principled individuals is to
create rationalizations that recast their actions as
“morally acceptable” behaviors.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 73 of 175
WHO COMMITS FRAUD AND WHY
• These rationalizations take many forms,
including:
– I was just borrowing the money.
– It wasn’t really hurting anyone. (Corporations are
often seen as non-persons, therefore crimes against
them are not hurting “anyone.”)
– Everybody does it.
– I’ve worked for them for 35 years and been underpaid
all that time. I wasn’t stealing; I was only taking what
was owed to me.
– I didn’t take it for myself. I needed it to pay my child’s
medical bills.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 74 of 175
WHO COMMITS FRAUD AND WHY
• Creators of worms and viruses often use
rationalizations like:
– The malicious code helped expose security flaws, so I
did a good service.
– It was an accident.
– It was not my fault—just an experiment that went bad.
– It was the user’s fault because they didn’t keep their
security up to date.
– If the code didn’t alter or delete any of their files, then
what’s the problem?
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 75 of 175
WHO COMMITS FRAUD AND WHY
• Fraud occurs when:
– People have perceived, non-shareable pressures;
– The opportunity gateway is left open; and
– They can rationalize their actions to reduce the moral impact in
their minds (i.e., they have low integrity).
• Fraud is much less likely to occur when:
– There is low pressure, low opportunity, and high integrity.
• Unfortunately, there is usually a mixture of these forces
in play, and it can be very difficult to determine the
pressures that may apply to an individual and the
rationalizations he/she may be able to produce.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 76 of 175
INTRODUCTION
• In this chapter we’ll discuss:
– The fraud process
– Why fraud occurs
– Approaches to computer fraud
– Specific techniques used to commit computer
fraud
– Ways companies can deter and detect
computer fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 77 of 175
APPROACHES TO COMPUTER FRAUD
• The U.S. Department of Justice defines
computer fraud as any illegal act for
which knowledge of computer technology
is essential for its:
– Perpetration;
– Investigation; or
– Prosecution.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 78 of 175
APPROACHES TO COMPUTER FRAUD
• Computer fraud includes the following:
– Unauthorized theft, use, access, modification,
copying, and destruction of software or data.
– Theft of money by altering computer records.
– Theft of computer time.
– Theft or destruction of computer hardware.
– Use or the conspiracy to use computer
resources to commit a felony.
– Intent to illegally obtain information or tangible
property through the use of computers.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 79 of 175
APPROACHES TO COMPUTER FRAUD
• In using a computer, fraud perpetrators
can steal:
– More of something
– In less time
– With less effort
• They may also leave very little evidence,
which can make these crimes more
difficult to detect.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 80 of 175
APPROACHES TO COMPUTER FRAUD
• Computer systems are particularly vulnerable to
computer crimes for several reasons:
– Company databases can be huge and access
privileges can be difficult to create and enforce.
Consequently, individuals can steal, destroy, or alter
massive amounts of data in very little time.
– Organizations often want employees, customers,
suppliers, and others to have access to their system
from inside the organization and without. This access
also creates vulnerability.
– Computer programs only need to be altered once,
and they will operate that way until:
• The system is no longer in use; or
• Someone notices.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 81 of 175
APPROACHES TO COMPUTER FRAUD
– Modern systems are accessed by PCs, which
are inherently more vulnerable to security
risks and difficult to control.
• It is hard to control physical access to each PC.
• PCs are portable, and if they are stolen, the data
and access capabilities go with them.
• PCs tend to be located in user departments, where
one person may perform multiple functions that
should be segregated.
• PC users tend to be more oblivious to security
concerns.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 82 of 175
APPROACHES TO COMPUTER FRAUD
– Computer systems face a number of unique
challenges:
• Reliability (accuracy and completeness)
• Equipment failure
• Environmental dependency (power, water damage,
fire)
• Vulnerability to electromagnetic interference and
interruption
• Eavesdropping
• Misrouting
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 83 of 175
APPROACHES TO COMPUTER FRAUD
• Organizations that track computer fraud
estimate that most U.S. businesses have
been victimized by at least one incident of
computer fraud.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 84 of 175
APPROACHES TO COMPUTER FRAUD
• These frauds cost billions of dollars each
year, and their frequency is increasing
because:
– Not everyone agrees on what constitutes
computer fraud.
• Many don’t believe that taking an unlicensed copy
of software is computer fraud. (It is and can result
in prosecution.)
• Some don’t think it’s a crime to browse through
someone else’s computer if their intentions aren’t
malicious.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 85 of 175
APPROACHES TO COMPUTER FRAUD
– Many computer frauds go undetected.
– An estimated 80–90% of frauds that are
uncovered are not reported because of fear
of:
• Adverse publicity
• Copycats
• Loss of customer confidence
– There are a growing number of competent
computer users, and they are aided by easier
access to remote computers through the
Internet and other data networks.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 86 of 175
APPROACHES TO COMPUTER FRAUD
– Some folks believe “it can’t happen to us.”
– Many networks have a low level of security.
– Instructions on how to perpetrate computer
crimes and abuses are readily available on
the Internet.
– Law enforcement is unable to keep up with
the growing number of frauds.
– The total dollar value of losses is difficult to
calculate.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 87 of 175
APPROACHES TO COMPUTER FRAUD
• Economic espionage, the theft of
information and intellectual property, is
growing especially fast.
• This growth has led to the need for
investigative specialists or cybersleuths.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 88 of 175
APPROACHES TO COMPUTER FRAUD
• Computer fraud classification
– Frauds can be categorized according to the
data processing model:
• Input
• Processor
• Computer instructions
• Stored data
• Output
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 89 of 175
COMPUTER FRAUD CLASSIFICATIONS
Processor
Fraud
Input
Fraud
Output
Fraud
Data
Fraud
Computer
Instructions
Fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 90 of 175
COMPUTER FRAUD CLASSIFICATIONS
Processor
Fraud
Input
Fraud
Output
Fraud
Data
Fraud
Computer
Instructions
Fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 91 of 175
APPROACHES TO COMPUTER FRAUD
• Input Fraud
– The simplest and most common way to commit a fraud is to alter
computer input.
• Requires little computer skills
• Perpetrator only needs to understand how the system
operates
– Can take a number of forms, including:
• Disbursement frauds
• The perpetrator causes a company to:
– Pay too much for ordered goods; or
– Pay for goods never ordered.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 92 of 175
APPROACHES TO COMPUTER FRAUD
• Input Fraud
– The simplest and most common way to commit a fraud is to alter
computer input.
• Requires little computer skills.
• Perpetrator only needs to understand how the system
operates.
– Can take a number of forms, including:
• Disbursement frauds
• Inventory frauds
• The perpetrator enters data into the system to
show that stolen inventory has been scrapped.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 93 of 175
APPROACHES TO COMPUTER FRAUD
• Input Fraud
– The simplest and most common way to commit a fraud is to alter
computer input.
• Requires little computer skills.
• Perpetrator only need to understand how the system
operates
– Can take a number of forms, including:
• Disbursement frauds
• Inventory frauds
• Payroll frauds
• Perpetrators may enter data to:
– Increase their salaries.
– Create a fictitious employee.
– Retain a terminated employee on the records.
• In the latter two instances, the perpetrator
intercepts and cashes the resulting paychecks.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 94 of 175
APPROACHES TO COMPUTER FRAUD
• Input Fraud
– The simplest and most common way to commit a fraud is to alter
computer input.
• Requires little computer skills.
• Perpetrator only needs to understand how the system
operates
– Can take a number of forms, including:
• Disbursement frauds
• Inventory frauds
• Payroll frauds
• Cash receipt frauds
• The perpetrator hides the theft by falsifying
system input.
• EXAMPLE: Cash of $200 is received. The
perpetrator records a cash receipt of $150 and
pockets the $50 difference.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 95 of 175
APPROACHES TO COMPUTER FRAUD
• Input Fraud
– The simplest and most common way to commit a fraud is to alter
computer input.
• Requires little computer skills.
• Perpetrator only needs to understand how the system
operates
– Can take a number of forms, including:
• Disbursement frauds
• Inventory frauds
• Payroll frauds
• Cash receipt frauds
• Fictitious refund fraud
• The perpetrator files for an undeserved refund,
such as a tax refund.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 96 of 175
COMPUTER FRAUD CLASSIFICATIONS
Processor
Fraud
Input
Fraud
Output
Fraud
Data
Fraud
Computer
Instructions
Fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 97 of 175
APPROACHES TO COMPUTER FRAUD
• Processor fraud
– Involves computer fraud committed through
unauthorized system use.
– Includes theft of computer time and services.
– Incidents could involve employees:
• Surfing the Internet;
• Using the company computer to conduct personal business;
or
• Using the company computer to conduct a competing
business.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 98 of 175
APPROACHES TO COMPUTER FRAUD
• In one example, an agriculture college at a major state
university was experiencing very sluggish performance from
its server.
• Upon investigating, IT personnel discovered that an individual
outside the United States had effectively hijacked the
college’s server to both store some of his/her research data
and process it.
• The college eliminated the individual’s data and blocked
future access to the system.
• The individual subsequently contacted college personnel to
protest the destruction of the data.
• Demonstrates both:
– How a processor fraud can be committed.
– How oblivious users can sometimes be to the unethical or illegal
nature of their activities.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 99 of 175
COMPUTER FRAUD CLASSIFICATIONS
Processor
Fraud
Input
Fraud
Output
Fraud
Data
Fraud
Computer
Instructions
Fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 100 of 175
APPROACHES TO COMPUTER FRAUD
• Computer instructions fraud
– Involves tampering with the software that
processes company data.
– May include:
• Modifying the software
• Making illegal copies
• Using it in an unauthorized manner
– Also might include developing a software
program or module to carry out an
unauthorized activity.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 101 of 175
APPROACHES TO COMPUTER FRAUD
• Computer instruction fraud used to be one of the
least common types of frauds because it
required specialized knowledge about computer
programming beyond the scope of most users.
• Today these frauds are more frequent—courtesy
of Web pages that instruct users on how to
create viruses and other schemes.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 102 of 175
COMPUTER FRAUD CLASSIFICATIONS
Processor
Fraud
Input
Fraud
Output
Fraud
Data
Fraud
Computer
Instructions
Fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 103 of 175
APPROACHES TO COMPUTER FRAUD
• Data fraud
– Involves:
• Altering or damaging a company’s data files; or
• Copying, using, or searching the data files without
authorization.
– In many cases, disgruntled employees have
scrambled, altered, or destroyed data files.
– Theft of data often occurs so that perpetrators can
sell the data.
• Most identity thefts occur when insiders in financial
institutions, credit agencies, etc., steal and sell financial
information about individuals from their employer’s database.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 104 of 175
COMPUTER FRAUD CLASSIFICATIONS
Processor
Fraud
Input
Fraud
Output
Fraud
Data
Fraud
Computer
Instructions
Fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 105 of 175
APPROACHES TO COMPUTER FRAUD
• Output fraud
– Involves stealing or misusing system output.
– Output is usually displayed on a screen or printed on
paper.
– Unless properly safeguarded, screen output can
easily be read from a remote location using
inexpensive electronic gear.
– This output is also subject to prying eyes and
unauthorized copying.
– Fraud perpetrators can use computers and peripheral
devices to create counterfeit outputs, such as checks.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 106 of 175
INTRODUCTION
• In this chapter we’ll discuss:
– The fraud process
– Why fraud occurs
– Approaches to computer fraud
– Specific techniques used to commit
computer fraud
– Ways companies can deter and detect
computer fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 107 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Changing data before, during, or after it
is entered into the system.
• Can involve adding, deleting, or altering
key system data.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 108 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Unauthorized copying of company data.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 109 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• An attacker overloads and shuts down an Internet service
provider’s email system by sending email bombs at a rate
of thousands per second—often from randomly generated
email addresses.
• May also involve shutting down a Web server by sending a
load of requests for the Web pages.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 110 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Carried out as follows:
– The attacker infects dozens of
computers that have broadband
Internet access with denial-of-service
programs. These infected computers
are the zombies.
– The attacker then activates the
denial-of-service programs, and the
zombies send pings (emails or
requests for data) to the target server.
The victim responds to each, not
realizing they have fictitious return
addresses, and waits for responses
that don’t come.
– While the victim waits, system
performance degrades until the
system freezes up or crashes.
– The attacker terminates the program
after an hour or two to limit the
victim’s ability to trace the source.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 111 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Experts estimate there as many as 5,000
denial-of-service attacks weekly in the
United States.
• A denial-of-service can cause severe
economic damage to its victim or even
drive them out of business.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 112 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Eavesdropping
• Perpetrators surreptitiously observe
private communications or transmission
of data.
• Equipment to commit these “electronic
wiretaps” is readily available at
electronics stores.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 113 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Eavesdropping
• Email threats
• A threatening message is sent to a victim to induce the victim to
do something that would make it possible to be defrauded.
• Several banks in the Midwest were contacted by an overseas
perpetrator who indicated that:
– He had broken into their computer system and obtained
personal and banking information about all of the bank’s
customers.
– He would notify the bank’s customers of this breach if he
was not paid a specified sum of money.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 114 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Eavesdropping
• Email threats
• Email forgery (aka, spoofing)
• Involves sending an email message that
appears to have come from someone
other than the actual sender.
• Email spoofers may:
– Claim to be system administrators
and ask users to change their
passwords to specific values.
– Pretend to be management and
request a copy of some sensitive
information.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 115 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Eavesdropping
• Email threats
• Email forgery (aka, spoofing)
• Hacking
• Unauthorized access to and use of computer systems—usually by
means of a personal computer and a telecommunications
network.
• Most hackers break into systems using known flaws in operating
systems, applications programs, or access controls.
• Some are not very malevolent and mainly motivated by curiosity
and a desire to overcome a challenge.
• Others have malicious intent and can do significant damage.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 116 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Eavesdropping
• Email threats
• Email forgery (aka, spoofing)
• Hacking
• Phreaking
• Hacking that attacks phone systems and
uses phone lines to transmit viruses
and to access, steal, and destroy data.
• They also steal telephone services and
may break into voice mail systems.
• Some hackers gain access to systems
through dial-up modem lines.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 117 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Eavesdropping
• Email threats
• Email forgery (aka, spoofing)
• Hacking
• Phreaking
• Hijacking
• Involves gaining control of someone
else’s computer to carry out illicit
activities without the user’s knowledge.
• The illicit activity is often the
perpetuation of spam emails.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 118 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Eavesdropping
• Email threats
• Email forgery (aka, spoofing)
• Hacking
• Phreaking
• Hijacking
• Identity theft
• Assuming someone’s identity, typically for economic gain, by
illegally obtaining and using confidential information such as
the person’s social security number, bank account number,
or credit card number.
• Identity thieves benefit financially by:
– Taking funds out of the victim’s bank account.
– Taking out mortgages or other loans under the victim’s
identity.
– Taking out credit cards and running up large balances.
• If the thief is careful and ensures that bills and notices are
sent to an address he controls, the scheme may be
prolonged until such time as the victim attempts to buy a
home or car and finds out that his credit is destroyed.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 119 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Eavesdropping
• Email threats
• Email forgery (aka, spoofing)
• Hacking
• Phreaking
• Hijacking
• Identity theft
• Victims can usually clear their credit, but the effort requires a
significant amount of time and expense.
• Identity theft was made a federal offense in 1998, but it is a
growing crime industry.
• One U.S. postal inspector, whose job duties involved
investigation of identity thefts, was himself a victim. The thief
ran up $80,000 in debt under the postal inspector’s identity
before the inspector discovered the problem.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 120 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Eavesdropping
• Email threats
• Email forgery (aka, spoofing)
• Hacking
• Phreaking
• Hijacking
• Identity theft
• Identity thieves can steal corporate or individual identities by:
– Shoulder surfing
• Watching people enter telephone calling card numbers or credit card
numbers or listening to communications as they provide this
information to sales clerks or others.
– Scavenging or dumpster diving
• Searching corporate or personal records by rifling garbage cans,
communal trash bins, and city dumps for documents with confidential
company information.
• May also look for personal information such as checks, credit card
statements, bank statements, tax returns, discarded applications for
pre-approved credit cards, or other records that contain social security
numbers, names, addresses, phone numbers, and other data that allow
them to assume an identity.
– Redirecting mail
• Intercepting mail and having it delivered to a location where others can
access it.
– Using Internet, email, and other technology in spoofing, phishing,
eavesdropping, impersonating, social engineering, and data
leakage schemes.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 121 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Data diddling
• Data leakage
• Denial of service attacks
• Eavesdropping
• Email threats
• Email forgery (aka, spoofing)
• Hacking
• Phreaking
• Hijacking
• Identity theft
• The U.S. Department of Justice suggests the following
four ways to minimize the chances of being victimized by
identity theft:
– Do not give out corporate or personal information
unless there is a good reason to trust the person to
whom it is given.
– Check financial information regularly for what should
be there, as well as for what should not be there.
– Periodically review your credit report.
– Maintain careful records of banking and financial
accounts.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 122 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Using the Internet to spread false or misleading information about
people or companies.
• May involve:
– Planting inflammatory messages in online chat rooms.
– Websites with misinformation.
– Pretending to be someone else online and making inflammatory
comments that will be attributed to that person.
– A “pump-and-dump” occurs when an individual spreads
misinformation, often through Internet chat rooms, to cause a run-
up in the value a stock and then sells off his shares of the stock. A
number of pump-and-dump cases have been prosecuted by the
SEC.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 123 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Another common form of Internet misinformation is the spreading of
“urban legends”—often by innocently forwarding emails.
– Urban legends may often include damaging implications about
company products, such as a recent email suggesting that certain
lipsticks contain lead or that using plastic cookware in the
microwave can cause cancer.
– Before forwarding any emails with negative information about
individuals, companies, or their products, it’s a good idea to check
the veracity of the information first.
– Emails with urban legends often attribute their “facts” to credible
sources, such as the federal government, Stanford University
researchers, the FBI, etc.
– There are several Websites that attempt to verify the truth of emails
that are circulated. One such Website is www.snopes.com. You
can easily locate the email you received on these Websites, by
searching under a key term in the email, such as “lipstick.”
– You are likely to find that most emails you were getting ready to
forward are either false or only partially true.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 124 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Hackers use the Internet to disrupt electronic commerce and
destroy company and individual communications.
• Viruses and worms are two main forms of Internet terrorism.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 125 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• A program that lies idle until triggered by some circumstance or a
particular time.
• Once triggered, it sabotages the system, destroying programs,
data, or both.
• Usually written by disgruntled programmers.
• EXAMPLE: A programmer places a logic bomb in a payroll
application that will destroy all the payroll records if the
programmer is terminated.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 126 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• The perpetrator gains access to the system by pretending to be
an authorized user.
• The perpetrator must know the legitimate user’s ID and password.
• Once in the system, he enjoys the same privileges as the legitimate
user.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 127 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• Packet sniffers
• Programs that capture data from information packets as they travel
over the Internet or company networks.
• Confidential information and access information can be gleaned
from the captured data—some of which is later sold.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 128 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• Packet sniffers
• Password cracking
• An intruder penetrates a system’s defenses, steals the file of valid
passwords, decrypts them, and then uses them to gain access to
almost any system resources.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 129 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• Packet sniffers
• Password cracking
• Phishing
• Sending out a spoofed email that appears to come from a
legitimate company, such as a financial institution. eBay, PayPal,
and banks are commonly spoofed.
• The recipient is advised that information or a security check is
needed on his account, and advised to click on a link to the
company’s website to provide the information.
• The link connects the individual to a Website that is an imitation of
the spoofed company’s actual Website. These counterfeit Websites
appear very authentic, as do the emails.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 130 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• Packet sniffers
• Password cracking
• Phishing
• One newly graduated college student recently took a job in
California and deposited his first paycheck of approximately $5,000
in the bank.
• That same night, he received an email from the bank, inviting him
to click on the link in the email to set up online banking for his new
bank account.
• He followed directions and provided the requested information to
set up online banking.
• Two hours later, he was nervous and called the bank—only to find
out that his bank account had been cleaned out and closed.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 131 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• Packet sniffers
• Password cracking
• Phishing
• As a rule of thumb, it is a good idea not to click on any link
provided in an email and to go directly to the Website instead.
• PayPal, whose email address is commonly spoofed for phishing
scams, offers the following advice:
– If PayPal ever sends you an email, they will include your first
and last name in the salutation of the email.
– If you need to enter PayPal’s Website, type “https:” in the URL
instead of “http:” in order to enter on the company’s secured
server.
– If you receive a suspicious email, get out of your browser and
go back in before proceeding directly to a company Website.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 132 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• Packet sniffers
• Password cracking
• Phishing
 In 2004, a phishing-related scam took place in South America with
respect to three large South American banks. Once an individual
opened the related email, a script was downloaded on their
computer. The script would alter the individual’s Web browser so
that if the user entered the URL of one of these three banks, the
browser would redirect them to a counterfeit Website for that bank.
The oblivious user would provide ID and password information,
and was instantly set up for a high-tech robbery of his bank
account.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 133 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• Packet sniffers
• Password cracking
• Phishing
• Consumer Reports suggests that if you have any questions about
the legitimacy of a Website, you should try entering the wrong
password. A phishing Website will typically accept an incorrect
password—which cues you that it is a phishing scam.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 134 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Example of a Website produced for a phishing scam.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 135 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• Packet sniffers
• Password cracking
• Phishing
• Piggybacking
• Tapping into a telecommunications line and
latching onto a legitimate user before that
user logs into a system.
• The legitimate user unknowingly carries the
perpetrator into the system.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 136 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• Packet sniffers
• Password cracking
• Phishing
• Piggybacking
• Round-down technique
• Made famous in the movie,
Office Space.
• The programmer instructs the
computer to round interest
calculations down to two
decimal places and deposits
the remaining fraction into the
account of a programmer or an
accomplice.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 137 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Internet misinformation
• Internet terrorism
• Logic time bombs
• Masquerading or impersonation
• Packet sniffers
• Password cracking
• Phishing
• Piggybacking
• Round-down technique
• Salami technique
• Involves the theft of tiny
slices of money over a
period of time.
• The round-down is just a
special form of a salami
technique.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 138 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Perpetrators trick employees into giving them information
they need to get into the system.
• A perpetrator might call an employee and indicate he is
the systems administrator and needs to get the
employee’s password.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 139 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Copying software without the publisher’s permission.
• In the United States, it’s estimated that 26% of software in use is
pirated.
• Fines for individuals and corporations are stiff, and individuals
convicted of software piracy can serve jail terms of up to 5 years.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 140 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Emailing an unsolicited message to multitudes of
people, often in an attempt to sell a product.
• Many times the product offers are fraudulent.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 141 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Spammers use creative means to find valid email addresses:
– Scanning the Internet for addresses posted online.
– Hacking into company databases and stealing mailing lists.
– Staging dictionary (aka direct harvesting) attacks.
• These attacks use special software to guess addresses at a
particular company and send blank emails.
• Messages not returned are usually valid.
• These attacks are very burdensome to corporate email
systems.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 142 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Companies may use filtering software to
detect dictionary attacks, search mail for
competitive leaks, and block inappropriate
attachments, such as pornography and
illegal MP3 files.
• Filtering is not always viable. The director
of internal audit at a major healthcare
company changes email addresses
frequently because of the volume of spam
email in his inbox. When asked why his
company did not filter the spam, he
replied, “Because we’re a healthcare
company, we cannot filter out any
references to body parts or prescription
medications.”
• There is increasing public clamor for laws
to clamp down on spamming. In
December 2004, a federal judge awarded
over $1 billion to a small Midwestern
Internet service provider in an action
against three spammers.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 143 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Spyware
• Software that monitors computing habits, such
as Web-surfing habits, and sends the data it
gathers to someone else, typically without the
user’s permission.
– One type, called adware (for advertising-
supported software) does two things:
• Causes banner ads to pop up on your
monitor as you surf the net.
• Collects information about your Web-
surfing and spending habits and forward
it to a company gathering the data—often
an advertising or large media organization.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 144 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Spyware
• Usually comes bundled with
freeware and shareware
downloaded from the Internet.
• May be disclosed in the
licensing agreement, but users
are unlikely to read it.
• Reputable adware companies
claim they don’t collect
sensitive or identifying data.
– But there is no way for users to
control or limit the activity.
– It is not illegal, but many find it
objectionable.
• Software has been developed
to detect and eliminate
spyware, but it may also impair
the downloaded software.
– Some is intentionally difficult to
uninstall.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 145 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Spyware
• Keystroke loggers
• A keystroke logger records a user’s
keystrokes and emails them to or
saves them for the party that planted
the logger. These are sometimes used
by:
– Parents to monitor their children’s
computer usage.
– Businesses to monitor employee
activity.
– Fraudsters to capture passwords,
credit card numbers, etc.
– A keystroke logger can be a
hardware device attached to a
computer or can be downloaded
on an individual’s computer in the
same way that any Trojan horse
might be downloaded.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 146 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Spyware
• Keystroke loggers
• Spyware and keystroke loggers are
very problematic for companies with
employees who telecommute or
contact the company’s computer from
remote locations.
• Spyware on those computers makes
the company’s systems vulnerable.
• Individuals are also exposed when
they use wireless networks, such as
those that may be available in coffee
shops.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 147 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Spyware
• Keystroke loggers
• Superzapping
• Unauthorized use of special system
programs to bypass regular system
controls and perform illegal acts.
• The name is derived from an IBM
software utility called Superzap that
was used to restored crashed
systems.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 148 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Spyware
• Keystroke loggers
• Superzapping
• Trap doors
• Also called back doors.
• Programmers create trap doors to
modify programs.
• The trap door is a way into the system
that bypasses normal controls.
• The trap door should be removed
before the program is implemented.
• If it is not, the programmer or others
may later gain unauthorized access to
the system.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 149 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Spyware
• Keystroke loggers
• Superzapping
• Trap doors
• Trojan horse
• A set of unauthorized computer
instructions planted in an authorized
and otherwise properly functioning
program.
• Allows the creator to control the
victim’s computer remotely.
• The code does not try to replicate
itself but performs an illegal act at
some specific time or when some
condition arises.
• Programs that launch denial of
service attacks are often Trojan
horses.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 150 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Spyware
• Keystroke loggers
• Superzapping
• Trap doors
• Trojan horse
• War dialing
• Hackers search for an idle modem by
programming their computers to dial
thousands of phone lines.
• Hackers enter through the idle
modem and gain access to the
connected network.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 151 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Social engineering
• Software piracy
• Spamming
• Spyware
• Keystroke loggers
• Superzapping
• Trap doors
• Trojan horse
• War dialing
• War driving
• Driving around in cars looking for
unprotected home or corporate
wireless networks.
• If the hackers mark the sidewalk of
the susceptible wireless network, the
practice is referred to as warchalking.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 152 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Virus
• Many viruses have two phases:
– First, when some predefined event occurs, the
virus replicates itself and spreads to other
systems or files.
– Another event triggers the attack phase in which
the virus carries out its mission.
– A virus may lay dormant or propagate itself
without causing damage for an extended period.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 153 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Virus
• Damage may take many forms:
– Send email with the victim’s name as the alleged
source.
– Destroy or alter data or programs.
– Take control of the computer.
– Destroy or alter file allocation tables.
– Delete or rename files or directories.
– Reformat the hard drive.
– Change file content.
– Prevent users from booting.
– Intercept and change transmissions.
– Print disruptive images or messages on the
screen.
– Change screen appearance.
• As viruses spread, they take up much space, clog
communications, and hinder system performance.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 154 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Virus
• Virus symptoms:
– Computer will not start or
execute
– Performs unexpected read or
write operations
– Unable to save files
– Long time to load programs
– Abnormally large file sizes
– Slow systems operation
– Unusual screen activity
– Error messages
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 155 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Virus
• Viruses are contagious and easily spread from
one system to another.
• They are usually spread by:
– Opening an infected email attachment or file
(most common); or
– Running an infected program.
• Some viruses can mutate, which makes them
more difficult to detect and destroy.
• The emails often appear to come from sources
like Microsoft and seem very convincing.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 156 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Virus
• Virus protections include:
– Install reliable virus software that scans for,
identifies, and destroys viruses.
– Keep the antivirus program up to date.
– Scan incoming email at the server level,
rather than when it hits the desktops.
– Certify all software as virus-free before
loading it.
• Software from unknown sources may be
virus bait, especially if it seems too good
to be true.
– Deal with trusted software retailers.
– Use electronic techniques to make tampering
evident.
– Check new software on an isolated machine.
– Have two backups of all files.
– Do not put diskettes or CDs in strange
machines, or let others put unscanned disks
in your machine.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 157 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Virus
• Viruses attack computers, but any device that is
part of the communications network is
vulnerable, including:
– Cell phones
– Smart phones
– PDAs
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 158 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Virus
• Worms
• A worm is similar to a virus except that:
– A worm is a stand-alone program, while a virus is only a
segment of code hidden in a host program or executable file.
– A worm will replicate itself automatically, while a virus
requires a human to do something like open a file.
• Worms often reproduce by mailing themselves to the recipient’s
mailing list.
• They are not confined to PCs and have infected cell phones in
Japan.
• A worm typically has a short but very destructive life.
• It takes little technical knowledge to create worms or viruses;
several Websites provide instructions.
• Most exploit known software vulnerabilities that can be corrected
with a software patch, making it important to install all patches as
soon as they are available.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 159 of 175
COMPUTER FRAUD AND ABUSE
TECHNIQUES
• Perpetrators have devised many methods to commit
computer fraud and abuse. These include:
• Virus
• Worms
• The low-tech, do-it-yourself attack
• You receive an email from a friend, apologizing profusely that
he/she has previously sent you an email that was infected with a
virus.
• The friend’s email gives you instructions to look for and remove
the offending virus.
• You delete the file from your hard drive. The only problem is that
the file you just deleted was part of your operating system.
• Your friend was well-intended and has done the same thing to
his/her computer.
• REMEDY: Before even considering following instructions of this
sort, check the list of hoaxes that are available on any virus
protection Website, such as:
– www.norton.com
– www.mcafee.com
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 160 of 175
INTRODUCTION
• In this chapter we’ll discuss:
– The fraud process
– Why fraud occurs
– Approaches to computer fraud
– Specific techniques used to commit computer
fraud
– Ways companies can deter and detect
computer fraud
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 161 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
• Organizations must take every precaution to
protect their information systems.
• Certain measures can significantly decrease the
potential for fraud and any resulting losses.
• These measures include:
– Make fraud less likely to occur
– Increase the difficulty of committing fraud
– Improve detection methods
– Reduce fraud losses
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 162 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
• Organizations must take every precaution to
protect their information systems.
• Certain measures can significantly decrease the
potential for fraud and any resulting losses.
• These measures include:
– Make fraud less likely to occur
– Increase the difficulty of committing fraud
– Improve detection methods
– Reduce fraud losses
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 163 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
• Make fraud less likely to occur
– Create a culture that stresses integrity and
commitment to ethical values and competence.
– Adopt an organizational structure, management
philosophy, operating style, and appetite for risk that
minimizes the likelihood of fraud.
– Require oversight from an active, involved, and
independent audit committee.
– Assign authority and responsibility for business
objectives to specific departments and individuals,
encourage initiative in solving problems, and hold
them accountable for achieving those objectives.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 164 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
– Identify the events that lead to increased fraud risk,
and take steps to prevent, avoid, share, or accept that
risk.
– Develop a comprehensive set of security policies to
guide the design and implementation of specific
control procedures, and communicate them
effectively to company employees.
– Implement human resource policies for hiring,
compensating, evaluating, counseling, promoting, and
discharging employees that send messages about the
required level of ethical behavior and integrity.
– Effectively supervise employees, including monitoring
their performance and correcting their errors.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 165 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
– Train employees in integrity and ethical
considerations, as well as security and fraud
prevention measures.
– Require annual employee vacations, periodically
rotate duties of key employees, and require signed
confidentiality agreements.
– Implement formal and rigorous project development
and acquisition controls, as well as change
management controls.
– Increase the penalty for committing fraud by
prosecuting fraud perpetrators more vigorously.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 166 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
• Organizations must take every precaution to
protect their information systems.
• Certain measures can significantly decrease the
potential for fraud and any resulting losses.
• These measures include:
– Make fraud less likely to occur
– Increase the difficulty of committing fraud
– Improve detection methods
– Reduce fraud losses
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 167 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
• Increase the difficulty of committing
fraud
– Develop a strong system of internal controls
– Segregate the accounting functions of:
• Authorization
• Recording
• Custody
– Implement a program segregation of duties
between systems functions
– Restrict physical and remote access to
system resources to authorized personnel
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 168 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
– Require transactions and activities to be authorized
by appropriate supervisory personnel. Have the
system authenticate the person and their right to
perform the transaction before allowing the
transaction to take place.
– Use properly designed documents and records to
capture and process transactions.
– Safeguard all assets, records, and data.
– Require independent checks on performance, such as
reconciliation of two independent sets of records,
where possible and appropriate.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 169 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
– Implement computer-based controls over data input,
computer processing, data storage, data
transmission, and information output.
– Encrypt stored and transmitted data and programs to
protect them from unauthorized access and use.
– Fix known software vulnerabilities by installing the
latest updates to operating systems, security, and
applications programs.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 170 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
• Organizations must take every precaution to
protect their information systems.
• Certain measures can significantly decrease the
potential for fraud and any resulting losses.
• These measures include:
– Make fraud less likely to occur
– Increase the difficulty of committing fraud
– Improve detection methods
– Reduce fraud losses
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 171 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
• Improve detection methods
– Create an audit trail so individual transactions
can be traced through the system to the
financial statements and vice versa.
– Conduct periodic external and internal audits,
as well as special network security audits.
– Install fraud detection software.
– Implement a fraud hotline.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 172 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
– Employ a computer security officer, as well as
computer consultants and forensic specialists
as needed.
– Monitor system activities, including computer
and network security efforts, usage and error
logs, and all malicious actions.
– Use intrusion detection systems to help
automate the monitoring process.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 173 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
• Organizations must take every precaution to
protect their information systems.
• Certain measures can significantly decrease the
potential for fraud and any resulting losses.
• These measures include:
– Make fraud less likely to occur
– Increase the difficulty of committing fraud
– Improve detection methods
– Reduce fraud losses
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 174 of 175
PREVENTING AND DETECTING
COMPUTER FRAUD
• Reduce fraud losses
– Maintain adequate insurance.
– Develop comprehensive fraud contingency,
disaster recovery, and business continuity
plans.
– Store backup copies of program and data files
in a secure, off-site location.
– Use software to monitor system activity and
recover from fraud.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 175 of 175
SUMMARY
• In this chapter, you’ve learned what fraud
is, who commits fraud, and how it’s
perpetrated.
• You’ve learned about the many variations
of computer fraud, and you’ve learned
about techniques to reduce an
organization’s vulnerability to these types
of fraud.

Contenu connexe

Tendances

Variable sampling untuk pengujian substantif stain salatiga
Variable sampling untuk pengujian substantif stain salatigaVariable sampling untuk pengujian substantif stain salatiga
Variable sampling untuk pengujian substantif stain salatigaahmadpermadi
 
Tanggung jawab auditor
Tanggung jawab auditorTanggung jawab auditor
Tanggung jawab auditorresa_putra
 
Pengauditan siklus pengeluaran
Pengauditan siklus pengeluaranPengauditan siklus pengeluaran
Pengauditan siklus pengeluaranDina Nurmariyani
 
Pengujian atas pengendalian internal (Test of Controls) - Belanja Subsidi
Pengujian atas pengendalian internal (Test of Controls) - Belanja SubsidiPengujian atas pengendalian internal (Test of Controls) - Belanja Subsidi
Pengujian atas pengendalian internal (Test of Controls) - Belanja SubsidiMuhammad Rafi Kambara
 
Accounting information systems 13th ed .
Accounting information systems  13th ed .Accounting information systems  13th ed .
Accounting information systems 13th ed .phayes833
 
Akuntansi internasional ppt
Akuntansi internasional pptAkuntansi internasional ppt
Akuntansi internasional pptAmrul Rizal
 
AKL 1 (perbedaan agen dan cabang)
AKL 1 (perbedaan agen dan cabang)AKL 1 (perbedaan agen dan cabang)
AKL 1 (perbedaan agen dan cabang)fitria mellysusanti
 
Dasar Akuntansi & Kerangka Konseptual
Dasar Akuntansi & Kerangka KonseptualDasar Akuntansi & Kerangka Konseptual
Dasar Akuntansi & Kerangka KonseptualFair Nurfachrizi
 
Penyelesaian audit
Penyelesaian auditPenyelesaian audit
Penyelesaian auditagunghery19
 
Chapter 2 .auditing it governance controls
Chapter 2 .auditing it governance controlsChapter 2 .auditing it governance controls
Chapter 2 .auditing it governance controlsrefidelia19
 

Tendances (20)

Akuntansi internasional
Akuntansi internasionalAkuntansi internasional
Akuntansi internasional
 
Kewajiban Hukum Auditor
Kewajiban Hukum AuditorKewajiban Hukum Auditor
Kewajiban Hukum Auditor
 
Variable sampling untuk pengujian substantif stain salatiga
Variable sampling untuk pengujian substantif stain salatigaVariable sampling untuk pengujian substantif stain salatiga
Variable sampling untuk pengujian substantif stain salatiga
 
Tanggung jawab auditor
Tanggung jawab auditorTanggung jawab auditor
Tanggung jawab auditor
 
Strategi audit
Strategi auditStrategi audit
Strategi audit
 
Ch 02. Obtaining an Engagement
Ch 02. Obtaining an Engagement Ch 02. Obtaining an Engagement
Ch 02. Obtaining an Engagement
 
Pengauditan siklus pengeluaran
Pengauditan siklus pengeluaranPengauditan siklus pengeluaran
Pengauditan siklus pengeluaran
 
Pengujian atas pengendalian internal (Test of Controls) - Belanja Subsidi
Pengujian atas pengendalian internal (Test of Controls) - Belanja SubsidiPengujian atas pengendalian internal (Test of Controls) - Belanja Subsidi
Pengujian atas pengendalian internal (Test of Controls) - Belanja Subsidi
 
Siklus pengeluaran bagian 2
Siklus pengeluaran bagian  2Siklus pengeluaran bagian  2
Siklus pengeluaran bagian 2
 
Accounting information systems 13th ed .
Accounting information systems  13th ed .Accounting information systems  13th ed .
Accounting information systems 13th ed .
 
Akuntansi internasional ppt
Akuntansi internasional pptAkuntansi internasional ppt
Akuntansi internasional ppt
 
Bab 8 materialitas dan risiko audit
Bab 8 materialitas dan risiko auditBab 8 materialitas dan risiko audit
Bab 8 materialitas dan risiko audit
 
Accounting theory
Accounting theoryAccounting theory
Accounting theory
 
AKL 1 (perbedaan agen dan cabang)
AKL 1 (perbedaan agen dan cabang)AKL 1 (perbedaan agen dan cabang)
AKL 1 (perbedaan agen dan cabang)
 
AUDIT EVIDENCE
AUDIT EVIDENCE AUDIT EVIDENCE
AUDIT EVIDENCE
 
Dasar Akuntansi & Kerangka Konseptual
Dasar Akuntansi & Kerangka KonseptualDasar Akuntansi & Kerangka Konseptual
Dasar Akuntansi & Kerangka Konseptual
 
Penyelesaian audit
Penyelesaian auditPenyelesaian audit
Penyelesaian audit
 
Chapter 2 .auditing it governance controls
Chapter 2 .auditing it governance controlsChapter 2 .auditing it governance controls
Chapter 2 .auditing it governance controls
 
Pengantar Auditing
Pengantar AuditingPengantar Auditing
Pengantar Auditing
 
PROSEDUR AUDIT
PROSEDUR AUDITPROSEDUR AUDIT
PROSEDUR AUDIT
 

En vedette

Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01Lukman Hakim
 
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 editPertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 editLukman Hakim
 
Bab 1 - Tinjauan Menyeluruh SIA (Romney & Steibart)
Bab 1 - Tinjauan Menyeluruh SIA (Romney & Steibart)Bab 1 - Tinjauan Menyeluruh SIA (Romney & Steibart)
Bab 1 - Tinjauan Menyeluruh SIA (Romney & Steibart)Budianto Budie
 
Bab 6 Dokumentasi Sistem Informasi Akuntansi_Flowchart
Bab 6   Dokumentasi Sistem Informasi Akuntansi_FlowchartBab 6   Dokumentasi Sistem Informasi Akuntansi_Flowchart
Bab 6 Dokumentasi Sistem Informasi Akuntansi_FlowchartBudianto Budie
 
Peran ia dalam mewujudkan 3 g
Peran ia dalam mewujudkan 3 gPeran ia dalam mewujudkan 3 g
Peran ia dalam mewujudkan 3 gSri Rahayu
 
Sistem informasi akuntansi - Teknik Dokumentasi dan penyususnan Sistem
Sistem informasi akuntansi - Teknik Dokumentasi dan penyususnan SistemSistem informasi akuntansi - Teknik Dokumentasi dan penyususnan Sistem
Sistem informasi akuntansi - Teknik Dokumentasi dan penyususnan SistemAdora Aline A.
 
Ppt bab 6 sia ii translate Teknik Dokumentasi dan pengembangan sistem
Ppt bab 6 sia ii translate Teknik Dokumentasi dan pengembangan sistemPpt bab 6 sia ii translate Teknik Dokumentasi dan pengembangan sistem
Ppt bab 6 sia ii translate Teknik Dokumentasi dan pengembangan sistemFergieta Prahasdhika
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 
Penipuan dan teknik penyalahgunaan komputer
Penipuan dan teknik penyalahgunaan komputer Penipuan dan teknik penyalahgunaan komputer
Penipuan dan teknik penyalahgunaan komputer Luthansa
 
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan KomputerPresentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan KomputerBelinda Isamar
 
Media dan komunikasi SSP
Media dan komunikasi SSPMedia dan komunikasi SSP
Media dan komunikasi SSPLukman Hakim
 
Computer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceComputer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceEric Vanderburg
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceShawn Tuma
 
Bab 5 sistem informasi akutansi
Bab 5   sistem informasi akutansiBab 5   sistem informasi akutansi
Bab 5 sistem informasi akutansifahmisholeh
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.pptshaks9151
 
Jawaban cash n receivable budget
Jawaban cash n receivable budgetJawaban cash n receivable budget
Jawaban cash n receivable budgetSri Rahayu
 

En vedette (20)

Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01Pertemuan 2 sistem informasi akuntansi romney ch01
Pertemuan 2 sistem informasi akuntansi romney ch01
 
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 editPertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
Pertemuan 3 Sistem Pemrosesan Transaksi Romney ch02 edit
 
Bab 1 - Tinjauan Menyeluruh SIA (Romney & Steibart)
Bab 1 - Tinjauan Menyeluruh SIA (Romney & Steibart)Bab 1 - Tinjauan Menyeluruh SIA (Romney & Steibart)
Bab 1 - Tinjauan Menyeluruh SIA (Romney & Steibart)
 
Bab 6 Dokumentasi Sistem Informasi Akuntansi_Flowchart
Bab 6   Dokumentasi Sistem Informasi Akuntansi_FlowchartBab 6   Dokumentasi Sistem Informasi Akuntansi_Flowchart
Bab 6 Dokumentasi Sistem Informasi Akuntansi_Flowchart
 
Peran ia dalam mewujudkan 3 g
Peran ia dalam mewujudkan 3 gPeran ia dalam mewujudkan 3 g
Peran ia dalam mewujudkan 3 g
 
Romney ch06
Romney ch06Romney ch06
Romney ch06
 
Sistem informasi akuntansi - Teknik Dokumentasi dan penyususnan Sistem
Sistem informasi akuntansi - Teknik Dokumentasi dan penyususnan SistemSistem informasi akuntansi - Teknik Dokumentasi dan penyususnan Sistem
Sistem informasi akuntansi - Teknik Dokumentasi dan penyususnan Sistem
 
Ppt bab 6 sia ii translate Teknik Dokumentasi dan pengembangan sistem
Ppt bab 6 sia ii translate Teknik Dokumentasi dan pengembangan sistemPpt bab 6 sia ii translate Teknik Dokumentasi dan pengembangan sistem
Ppt bab 6 sia ii translate Teknik Dokumentasi dan pengembangan sistem
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Dokumentasi sistem informasi akuntansi
Dokumentasi sistem informasi akuntansiDokumentasi sistem informasi akuntansi
Dokumentasi sistem informasi akuntansi
 
Penipuan dan teknik penyalahgunaan komputer
Penipuan dan teknik penyalahgunaan komputer Penipuan dan teknik penyalahgunaan komputer
Penipuan dan teknik penyalahgunaan komputer
 
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan KomputerPresentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
 
Dokumentasi sistem informasi akuntansi
Dokumentasi sistem informasi akuntansiDokumentasi sistem informasi akuntansi
Dokumentasi sistem informasi akuntansi
 
Pengendalian dan sia
Pengendalian dan siaPengendalian dan sia
Pengendalian dan sia
 
Media dan komunikasi SSP
Media dan komunikasi SSPMedia dan komunikasi SSP
Media dan komunikasi SSP
 
Computer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network ConferenceComputer Fraud - Eric Vanderburg - China Resource Network Conference
Computer Fraud - Eric Vanderburg - China Resource Network Conference
 
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The ConvergenceCybersecurity & Computer Fraud - The Convergence
Cybersecurity & Computer Fraud - The Convergence
 
Bab 5 sistem informasi akutansi
Bab 5   sistem informasi akutansiBab 5   sistem informasi akutansi
Bab 5 sistem informasi akutansi
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
Jawaban cash n receivable budget
Jawaban cash n receivable budgetJawaban cash n receivable budget
Jawaban cash n receivable budget
 

Similaire à Romney ch05

Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abusesharing notes123
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudEvan Francen
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...EY
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGARon Steinkamp
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIARon Steinkamp
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The FraudRaffa Learning Community
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsEMAC Consulting Group
 
09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturn09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturnacfesj
 
keys to fraud prevention in the public sector
keys to fraud prevention in the public sectorkeys to fraud prevention in the public sector
keys to fraud prevention in the public sectorRon Steinkamp
 
Fraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentFraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentRon Steinkamp
 
idBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewidBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewSteven Lane
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentBillyCheuk
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 

Similaire à Romney ch05 (20)

Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
2013-10-31 Nonprofit Fraud Part 1
2013-10-31 Nonprofit Fraud Part 12013-10-31 Nonprofit Fraud Part 1
2013-10-31 Nonprofit Fraud Part 1
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGA
 
Public Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIAPublic Sector Fraud - Central MO IIA
Public Sector Fraud - Central MO IIA
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
Ocupacional Fraud.pptx
Ocupacional Fraud.pptxOcupacional Fraud.pptx
Ocupacional Fraud.pptx
 
2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud
 
2013-04-04 Nonprofit Fraud: Part I
2013-04-04 Nonprofit Fraud: Part I2013-04-04 Nonprofit Fraud: Part I
2013-04-04 Nonprofit Fraud: Part I
 
Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 
09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturn09/16/2009 Meeting - Fraud In A Downturn
09/16/2009 Meeting - Fraud In A Downturn
 
keys to fraud prevention in the public sector
keys to fraud prevention in the public sectorkeys to fraud prevention in the public sector
keys to fraud prevention in the public sector
 
Fraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentFraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local Government
 
Protecting Trade Secrets in China
Protecting Trade Secrets in ChinaProtecting Trade Secrets in China
Protecting Trade Secrets in China
 
idBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules OverviewidBUSINESS Red Flag Rules Overview
idBUSINESS Red Flag Rules Overview
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 

Plus de Sri Rahayu

Retail n service budget
Retail n service budgetRetail n service budget
Retail n service budgetSri Rahayu
 
Control and ais, revenue cycle
Control and ais, revenue cycleControl and ais, revenue cycle
Control and ais, revenue cycleSri Rahayu
 
Anggaran Piutang
Anggaran PiutangAnggaran Piutang
Anggaran PiutangSri Rahayu
 
Anggaran piutang
Anggaran piutangAnggaran piutang
Anggaran piutangSri Rahayu
 
Kasus flowchart
Kasus flowchartKasus flowchart
Kasus flowchartSri Rahayu
 

Plus de Sri Rahayu (11)

1stmeet
1stmeet1stmeet
1stmeet
 
Retail n service budget
Retail n service budgetRetail n service budget
Retail n service budget
 
Bahan lengkap
Bahan lengkapBahan lengkap
Bahan lengkap
 
Control and ais, revenue cycle
Control and ais, revenue cycleControl and ais, revenue cycle
Control and ais, revenue cycle
 
Romney ch12
Romney ch12Romney ch12
Romney ch12
 
Romney ch11
Romney ch11Romney ch11
Romney ch11
 
Cash Budget
Cash BudgetCash Budget
Cash Budget
 
Contoh Soal
Contoh SoalContoh Soal
Contoh Soal
 
Anggaran Piutang
Anggaran PiutangAnggaran Piutang
Anggaran Piutang
 
Anggaran piutang
Anggaran piutangAnggaran piutang
Anggaran piutang
 
Kasus flowchart
Kasus flowchartKasus flowchart
Kasus flowchart
 

Dernier

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 

Dernier (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

Romney ch05

  • 1. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 1 of 175 C HAPTER 5 Computer Fraud and Abuse
  • 2. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 2 of 175 INTRODUCTION • Questions to be addressed in this chapter: – What is fraud, and how are frauds perpetrated? – Who perpetrates fraud and why? – What is computer fraud, and what forms does it take? – What approaches and techniques are used to commit computer fraud?
  • 3. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 3 of 175 INTRODUCTION • Information systems are becoming increasingly more complex and society is becoming increasingly more dependent on these systems. – Companies also face a growing risk of these systems being compromised. – Recent surveys indicate 67% of companies suffered a security breach in the last year with almost 60% reporting financial losses.
  • 4. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 4 of 175 INTRODUCTION • Companies face four types of threats to their information systems: – Natural and political disasters • Include: – Fire or excessive heat – Floods – Earthquakes – High winds – War and terrorist attack • When a natural or political disaster strikes, many companies can be affected at the same time. – Example: Bombing of the World Trade Center in NY. • The Defense Science Board has predicted that attacks on information systems by foreign countries, espionage agents, and terrorists will soon be widespread.
  • 5. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 5 of 175 INTRODUCTION • Companies face four types of threats to their information systems: – Natural and political disasters – Software errors and equipment malfunction • Include: – Hardware or software failures – Software errors or bugs – Operating system crashes – Power outages and fluctuations – Undetected data transmission errors • Estimated annual economic losses due to software bugs = $60 billion. • 60% of companies studied had significant software errors in previous year.
  • 6. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 6 of 175 INTRODUCTION • Companies face four types of threats to their information systems: – Natural and political disasters – Software errors and equipment malfunction – Unintentional acts • Include – Accidents caused by: • Human carelessness • Failure to follow established procedures • Poorly trained or supervised personnel – Innocent errors or omissions – Lost, destroyed, or misplaced data – Logic errors – Systems that do not meet needs or are incapable of performing intended tasks • Information Systems Security Assn. estimates 65% of security problems are caused by human error.
  • 7. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 7 of 175 INTRODUCTION • Companies face four types of threats to their information systems: – Natural and political disasters – Software errors and equipment malfunction – Unintentional acts – Intentional acts (computer crime) • Include: – Sabotage – Computer fraud – Misrepresentation, false use, or unauthorized disclosure of data – Misappropriation of assets – Financial statement fraud • Information systems are increasingly vulnerable to these malicious attacks.
  • 8. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 8 of 175 INTRODUCTION • In this chapter we’ll discuss: – The fraud process – Why fraud occurs – Approaches to computer fraud – Specific techniques used to commit computer fraud – Ways companies can deter and detect computer fraud
  • 9. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 9 of 175 INTRODUCTION • In this chapter we’ll discuss: – The fraud process – Why fraud occurs – Approaches to computer fraud – Specific techniques used to commit computer fraud – Ways companies can deter and detect computer fraud
  • 10. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 10 of 175 THE FRAUD PROCESS • Fraud is any and all means a person uses to gain an unfair advantage over another person. • In most cases, to be considered fraudulent, an act must involve: – A false statement (oral or in writing) – About a material fact – Knowledge that the statement was false when it was uttered (which implies an intent to deceive) – A victim relies on the statement – And suffers injury or loss as a result • The definition is the same whether it is a criminal or civil fraud case. – The only difference is the burden of proof required. • Criminal case: beyond a reasonable doubt. • Civil case: preponderance of the evidence OR clear and convincing evidence.
  • 11. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 11 of 175 THE FRAUD PROCESS • Because fraudsters don’t make journal entries to record their frauds, we can only estimate the amount of losses caused by fraudulent acts: – The Association of Certified Fraud Examiners (ACFE) estimates that total fraud losses in the United States run around 6% of annual revenues or approximately $660 billion in 2004. • More than we spend on education and roads in a year. • Six times what we pay for the criminal justice system. – Income tax fraud (the difference between what taxpayers owe and what they pay to the government) is estimated to be over $200 billion per year. – Fraud in the healthcare industry is estimated to exceed $100 billion a year.
  • 12. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 12 of 175 THE FRAUD PROCESS • Fraud against companies may be committed by an employee or an external party. – Former and current employees (called knowledgeable insiders) are much more likely than non-employees to perpetrate frauds (and big ones) against companies. • Largely owing to their understanding of the company’s systems and its weaknesses, which enables them to commit the fraud and cover their tracks. – Organizations must utilize controls to make it difficult for both insiders and outsiders to steal from the company.
  • 13. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 13 of 175 THE FRAUD PROCESS • Fraud perpetrators are often referred to as white-collar criminals. – Distinguishes them from violent criminals, although some white-collar crime can ultimately have violent outcomes, such as: • Perpetrators or their victims committing suicide. • Healthcare patients killed because of alteration of information, etc., that can result in their deaths.
  • 14. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 15 of 175 THE FRAUD PROCESS • Three types of occupational fraud: – Misappropriation of assets • Involves theft, embezzlement, or misuse of company assets for personal gain. • Examples include billing schemes, check tampering, skimming, and theft of inventory. • In the 2004 Report to the Nation on Occupational Fraud and Abuse, 92.7% of occupational frauds involved asset misappropriation at a median cost of $93,000.
  • 15. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 16 of 175 THE FRAUD PROCESS • Three types of occupational fraud: – Misappropriation of assets – Corruption • Corruption involves the wrongful use of a position, contrary to the responsibilities of that position, to procure a benefit. • Examples include kickback schemes and conflict of interest schemes. • About 30.1% of occupational frauds include corruption schemes at a median cost of $250,000.
  • 16. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 17 of 175 THE FRAUD PROCESS • Three types of occupational fraud: – Misappropriation of assets – Corruption – Fraudulent statements • Financial statement fraud involves misstating the financial condition of an entity by intentionally misstating amounts or disclosures in order to deceive users. • Financial statements can be misstated as a result of intentional efforts to deceive or as a result of undetected asset misappropriations that are so large that they cause misstatement. • About 7.9% of occupational frauds involve fraudulent statements at a median cost of $1 million. (The median pales in comparison to the maximum cost.)
  • 17. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 18 of 175 THE FRAUD PROCESS • A typical employee fraud has a number of important elements or characteristics: – The fraud perpetrator must gain the trust or confidence of the person or company being defrauded in order to commit and conceal the fraud. – Instead of using a gun, knife, or physical force, fraudsters use weapons of deceit and misinformation. – Frauds tend to start as the result of a perceived need on the part of the employee and then escalate from need to greed. Most fraudsters can’t stop once they get started, and their frauds grow in size. – The fraudsters often grow careless or overconfident over time. – Fraudsters tend to spend what they steal. Very few save it. – In time, the sheer magnitude of the frauds may lead to detection. – The most significant contributing factor in most employee frauds is the absence of internal controls and/or the failure to enforce existing controls.
  • 18. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 19 of 175 THE FRAUD PROCESS • The National Commission on Fraudulent Financial Reporting (aka, the Treadway Commission) defined fraudulent financial reporting as intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements. • Financial statements can be falsified to: – Deceive investors and creditors – Cause a company’s stock price to rise – Meet cash flow needs – Hide company losses and problems
  • 19. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 20 of 175 THE FRAUD PROCESS • Fraudulent financial reporting is of great concern to independent auditors, because undetected frauds lead to half of the lawsuits against auditors. • In the case of Enron, a financial statement fraud led to the total elimination of Arthur Andersen, a premiere international public accounting firm.
  • 20. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 21 of 175 THE FRAUD PROCESS • Common approaches to “cooking the books” include: – Recording fictitious revenues – Recording revenues prematurely – Recording expenses in later periods – Overstating inventories or fixed assets (WorldCom) – Concealing losses and liabilities
  • 21. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 22 of 175 THE FRAUD PROCESS • The Treadway Commission recommended four actions to reduce the possibility of fraudulent financial reporting: – Establish an organizational environment that contributes to the integrity of the financial reporting process. – Identify and understand the factors that lead to fraudulent financial reporting. – Assess the risk of fraudulent financial reporting within the company. – Design and implement internal controls to provide reasonable assurance that fraudulent financial reporting is prevented.
  • 22. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 23 of 175 THE FRAUD PROCESS • SAS 99: The Auditor’s Responsibility to Detect Fraud – In 1997, SAS-82, Consideration of Fraud in a Financial Statement Audit, was issued to clarify the auditor’s responsibility to detect fraud.
  • 23. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 24 of 175 THE FRAUD PROCESS • A revision to SAS-82, SAS-99, was issued in December 2002. SAS-99 requires auditors to: – Understand fraud • Auditors can’t effectively audit something they don’t understand. • SAS-99 also indicated that auditors are not lawyers and “do not make legal determinations of whether fraud has occurred.” • The external auditor’s interest specifically relates to acts that result in a material misstatement of the financial statements. • Note that SAS-99 relates to external auditors. Internal auditors will have a more extensive interest in fraud than just those that impact financial statements.
  • 24. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 25 of 175 THE FRAUD PROCESS • A revision to SAS-82, SAS-99, was issued in December 2002. SAS-99 requires auditors to: – Understand fraud – Discuss the risks of material fraudulent misstatements • While planning the audit, members of the audit team should discuss how and where the company’s financial statements might be susceptible to fraud.
  • 25. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 26 of 175 THE FRAUD PROCESS • A revision to SAS-82, SAS-99, was issued in December 2002. SAS-99 requires auditors to: – Understand fraud – Discuss the risks of material fraudulent misstatements – Obtain information • The audit team must gather evidence about the existence of fraud by: – Looking for fraud risk factors – Testing company records – Asking management, the audit committee, and others if they know of any past or current fraud or of fraud risks the organization faces. • Special care needs to be exercised in examining revenue accounts, since they are particularly popular fraud targets.
  • 26. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 27 of 175 THE FRAUD PROCESS • A revision to SAS-82, SAS-99, was issued in December 2002. SAS-99 requires auditors to: – Understand fraud – Discuss the risks of material fraudulent misstatements – Obtain information – Identify, assess, and respond to risks • Use the gathered information to identify, assess, and respond to risks. • Auditors can respond by varying the nature, timing, and extent of auditing procedures they perform. • They should also carefully evaluate risks related to management override of controls.
  • 27. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 28 of 175 THE FRAUD PROCESS • A revision to SAS-82, SAS-99, was issued in December 2002. SAS-99 requires auditors to: – Understand fraud – Discuss the risks of material fraudulent misstatements – Obtain information – Identify, assess, and respond to risks – Evaluate the results of their audit tests • Auditors must assess the risk of fraud throughout the audit. • When the audit is complete, they must evaluate whether any identified misstatements indicate the presence of fraud. • If so, they should determine the impact on the financial statements and the audit.
  • 28. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 29 of 175 THE FRAUD PROCESS • A revision to SAS-82, SAS-99, was issued in December 2002. SAS-99 requires auditors to: – Understand fraud – Discuss the risks of material fraudulent misstatements – Obtain information – Identify, assess, and respond to risks – Evaluate the results of their audit tests – Communicate findings • Auditors communicate their fraud findings to management, the audit committee, and others.
  • 29. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 30 of 175 THE FRAUD PROCESS • A revision to SAS-82, SAS-99, was issued in December 2002. SAS-99 requires auditors to: – Understand fraud – Discuss the risks of material fraudulent misstatements – Obtain information – Identify, assess, and respond to risks – Evaluate the results of their audit tests – Communicate findings – Document their audit work • Auditors must document their compliance with SAS-99 requirements.
  • 30. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 31 of 175 THE FRAUD PROCESS • A revision to SAS-82, SAS-99, was issued in December 2002. SAS-99 requires auditors to: – Understand fraud – Discuss the risks of material fraudulent misstatements – Obtain information – Identify, assess, and respond to risks – Evaluate the results of their audit tests – Communicate findings – Document their audit work – Incorporate a technology focus • SAS-99 recognizes that technology impacts fraud risks and notes opportunities that auditors have to use technology-oriented tools and techniques to design fraud auditing procedures.
  • 31. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 32 of 175 INTRODUCTION • In this chapter we’ll discuss: – The fraud process – Why fraud occurs – Approaches to computer fraud – Specific techniques used to commit computer fraud – Ways companies can deter and detect computer fraud
  • 32. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 33 of 175 WHO COMMITS FRAUD AND WHY • Researchers have compared the psychological and demographic characteristics of three groups of people: – White-collar criminals – Violent criminals – The general public • They found: – Significant differences between violent and white-collar criminals. – Few differences between white-collar criminals and the general public.
  • 33. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 34 of 175 WHO COMMITS FRAUD AND WHY • White-collar criminals tend to mirror the general public in: – Education – Age – Religion – Marriage – Length of employment – Psychological makeup
  • 34. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 35 of 175 WHO COMMITS FRAUD AND WHY • Perpetrators of computer fraud tend to be younger and possess more computer knowledge, experience, and skills. • Hackers and computer fraud perps tend to be more motivated by: – Curiosity – A quest for knowledge – The desire to learn how things work – The challenge of beating the system
  • 35. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 36 of 175 WHO COMMITS FRAUD AND WHY • They may view their actions as a game rather than dishonest behavior. • Another motivation may be to gain stature in the hacking community. • Some see themselves as revolutionaries spreading a message of anarchy and freedom. • But a growing number want to profit financially. To do so, they may sell data to: – Spammers – Organized crime – Other hackers – The intelligence community
  • 36. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 37 of 175 WHO COMMITS FRAUD AND WHY • Some fraud perpetrators are disgruntled and unhappy with their jobs and are seeking revenge against their employers. • Others are regarded as ideal, hard-working employees in positions of trust. • Most have no prior criminal record. • So why are they willing to risk everything?
  • 37. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 38 of 175 WHO COMMITS FRAUD AND WHY • Criminologist Donald Cressey, interviewed 200+ convicted white-collar criminals in an attempt to determine the common threads in their crimes. As a result of his research, he determined that three factors were present in the commission of each crime. These three factors have come to be known as the fraud triangle. – Pressure – Opportunity – Rationalization
  • 38. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 39 of 175 The “Fraud Triangle” Donald Cressey Pressure Opportunity Rationalization
  • 39. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 40 of 175 The “Fraud Triangle” Donald Cressey Pressure Pressure Opportunity Rationalization
  • 40. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 41 of 175 WHO COMMITS FRAUD AND WHY • Pressure –Cressey referred to this pressure as a “perceived non-shareable need.” –The pressure could be related to finances, emotions, lifestyle, or some combination.
  • 41. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 42 of 175 WHO COMMITS FRAUD AND WHY • The most common pressures were: - Not being able to pay one’s debts, nor admit it to one’s employer, family, or friends (which makes it non-shareable). • May be associated with vices, such as drugs, gambling, mistresses, etc.
  • 42. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 43 of 175 WHO COMMITS FRAUD AND WHY • The most common pressures were: - Not being able to pay one’s debts, nor admit it to one’s employer, family, or friends (which makes in non-shareable). - Fear of loss of status because of a personal failure • Example would be mismanagement of a personal investment or retirement fund.
  • 43. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 44 of 175 WHO COMMITS FRAUD AND WHY • The most common pressures were: - Not being able to pay one’s debts, nor admit it to one’s employer, family, or friends (which makes in non-shareable). - Fear of loss of status because of a personal failure - Business reversals • Not many people can walk away from a failing business.
  • 44. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 45 of 175 WHO COMMITS FRAUD AND WHY • The most common pressures were: - Not being able to pay one’s debts, nor admit it to one’s employer, family, or friends (which makes in non-shareable). - Fear of loss of status because of a personal failure - Business reversals - Physical isolation • When an individual is isolated, physically or psychologically, almost any pressure becomes non- shareable.
  • 45. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 46 of 175 WHO COMMITS FRAUD AND WHY • The most common pressures were: - Not being able to pay one’s debts, nor admit it to one’s employer, family, or friends (which makes in non-shareable). - Fear of loss of status because of a personal failure - Business reversals - Physical isolation - Status gaining • Many frauds are motivated by nothing more than a perceived need to keep up with the Joneses. • The problem is that there is always a richer “Jones” down the street and the pressure continues to mount, as do the resulting thefts.
  • 46. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 47 of 175 WHO COMMITS FRAUD AND WHY • The most common pressures were: - Not being able to pay one’s debts, nor admit it to one’s employer, family, or friends (which makes in non-shareable). - Fear of loss of status because of a personal failure - Business reversals - Physical isolation - Status gaining - Difficulties in employer-employee relations • May create pressure to get revenge, take the money you feel is rightfully owed to you, etc.
  • 47. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 48 of 175 WHO COMMITS FRAUD AND WHY • What’s important here is the perception of the pressure. – There might be a number of people who could and would help a tentative fraudster out of his financial woes. – But as long as he perceives that he cannot share his burden, the pressure is present. – Research has also found that an individual’s propensity to commit fraud is more related to how much he worries about his financial position than his actual position. – The millionaire who frets a lot about his financial condition is more likely to commit fraud than the guy who doesn’t have two dimes to rub together but isn’t worried about it.
  • 48. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 49 of 175 WHO COMMITS FRAUD AND WHY • Financial statement fraud is distinct from other types of fraud in that the individuals who commit the fraud are not the direct beneficiaries. – The company is the direct beneficiary. – The perpetrators are typically indirect beneficiaries.
  • 49. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 50 of 175 WHO COMMITS FRAUD AND WHY • In the case of financial statement frauds, common pressures include: – To prop up earnings or stock price so that management can: • Receive performance-related compensation. • Preserve or improve personal wealth held in company stock or stock options. • Keep their jobs. – To cover the inability to generate cash flow. – To obtain financing. – To appear to comply with bond covenants or other agreements. – May be opposite of propping up earnings in cases involving income-tax motivations, government contracts, or regulation. • Click here for a comprehensive list of pressures. PressuresPressures
  • 50. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 52 of 175 The “Fraud Triangle” Donald Cressey Pressure Opportunity Opportunity Rationalization
  • 51. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 53 of 175 WHO COMMITS FRAUD AND WHY • Opportunity is the opening or gateway that allows an individual to: – Commit the fraud – Conceal the fraud – Convert the proceeds
  • 52. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 54 of 175 WHO COMMITS FRAUD AND WHY • Opportunity is the opening or gateway that allows an individual to: – Commit the fraud – Conceal the fraud – Convert the proceeds
  • 53. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 55 of 175 WHO COMMITS FRAUD AND WHY • Committing the fraud might involve acts such as: – Misappropriating assets. – Issuing deceptive financial statements. – Accepting a bribe in order to make an arrangement that is not in the company’s best interest.
  • 54. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 56 of 175 WHO COMMITS FRAUD AND WHY • Opportunity is the opening or gateway that allows an individual to: – Commit the fraud – Conceal the fraud – Convert the proceeds
  • 55. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 57 of 175 WHO COMMITS FRAUD AND WHY • Concealing the fraud often takes more time and effort and leaves more evidence than the actual theft or misrepresentation. • Examples of concealment efforts: – Charge a stolen asset to an expense account or to an account receivable that is about to be written off.
  • 56. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 58 of 175 WHO COMMITS FRAUD AND WHY • Concealing the fraud often takes more time and effort and leaves more evidence than the actual theft or misrepresentation. • Examples of concealment efforts: – Charge a stolen asset to an expense account or to an account receivable that is about to be written off. – Create a ghost employee who receives an extra paycheck.
  • 57. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 59 of 175 WHO COMMITS FRAUD AND WHY • Concealing the fraud often takes more time and effort and leaves more evidence than the actual theft or misrepresentation. • Examples of concealment efforts: – Charge a stolen asset to an expense account or to an account receivable that is about to be written off. – Create a ghost employee who receives an extra paycheck. – Lapping. • Steal a payment from Customer A. • Apply Customer B’s payment to Customer A’s account so Customer A won’t get a late notice. • Apply Customer C’s payment to Customer B’s account, so Customer B won’t get a late notice, etc.
  • 58. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 60 of 175 WHO COMMITS FRAUD AND WHY • Concealing the fraud often takes more time and effort and leaves more evidence than the actual theft or misrepresentation. • Examples of concealment efforts: – Charge a stolen asset to an expense account or to an account receivable that is about to be written off. – Create a ghost employee who receives an extra paycheck. – Lapping. – Kiting. • Creates “cash” by transferring money between banks. • Requires multiple bank accounts. • Basic scheme: – Write a check on the account of Bank A. – Bank A doesn’t have sufficient funds to cover the check, so write a check from an account in Bank B to be deposited in Bank A. – Bank B doesn’t have sufficient funds to cover the check, so write a check from an account in Bank C to be deposited in Bank B, etc.
  • 59. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 61 of 175 WHO COMMITS FRAUD AND WHY • Opportunity is the opening or gateway that allows an individual to: – Commit the fraud – Conceal the fraud – Convert the proceeds
  • 60. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 62 of 175 WHO COMMITS FRAUD AND WHY • Unless the target of the theft is cash, then the stolen goods must be converted to cash or some form that is beneficial to the perpetrator. – Checks can be converted through alterations, forged endorsements, check washing, etc. – Non-cash assets can be sold (online auctions are a favorite forum) or returned to the company for cash.
  • 61. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 63 of 175 WHO COMMITS FRAUD AND WHY • If the fraud is a financial statement fraud, then the gains received may include: – I have to keep my job. – The value of my stock or stock options rose. – I received a raise, promotion, or bonus. – I have power.
  • 62. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 64 of 175 • There are many opportunities that enable fraud. Some of the most common are: – Lack of internal controls – Failure to enforce controls (the most prevalent reason) – Excessive trust in key employees – Incompetent supervisory personnel – Inattention to details – Inadequate staff • Click here for a comprehensive list of opportunities. WHO COMMITS FRAUD AND WHY OpportunitiesOpportunities
  • 63. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 69 of 175 WHO COMMITS FRAUD AND WHY • Internal controls that may be lacking or un- enforced include: – Authorization procedures – Clear lines of authority – Adequate supervision – Adequate documents and records – A system to safeguard assets – Independent checks on performance – Separation of duties • One control feature that many companies lack is a background check on all potential employees.
  • 64. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 70 of 175 WHO COMMITS FRAUD AND WHY • Management may allow fraud by: – Not getting involved in the design or enforcement of internal controls; – Inattention or carelessness; – Overriding controls; and/or – Using their power to compel subordinates to carry out the fraud.
  • 65. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 71 of 175 The “Fraud Triangle” Donald Cressey Pressure Opportunity RationalizationRationalization
  • 66. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 72 of 175 WHO COMMITS FRAUD AND WHY • How many people do you know who regard themselves as being unprincipled or sleazy? • It is important to understand that fraudsters do not regard themselves as unprincipled. – In general, they regard themselves as highly principled individuals. – That view of themselves is important to them. – The only way they can commit their frauds and maintain their self image as principled individuals is to create rationalizations that recast their actions as “morally acceptable” behaviors.
  • 67. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 73 of 175 WHO COMMITS FRAUD AND WHY • These rationalizations take many forms, including: – I was just borrowing the money. – It wasn’t really hurting anyone. (Corporations are often seen as non-persons, therefore crimes against them are not hurting “anyone.”) – Everybody does it. – I’ve worked for them for 35 years and been underpaid all that time. I wasn’t stealing; I was only taking what was owed to me. – I didn’t take it for myself. I needed it to pay my child’s medical bills.
  • 68. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 74 of 175 WHO COMMITS FRAUD AND WHY • Creators of worms and viruses often use rationalizations like: – The malicious code helped expose security flaws, so I did a good service. – It was an accident. – It was not my fault—just an experiment that went bad. – It was the user’s fault because they didn’t keep their security up to date. – If the code didn’t alter or delete any of their files, then what’s the problem?
  • 69. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 75 of 175 WHO COMMITS FRAUD AND WHY • Fraud occurs when: – People have perceived, non-shareable pressures; – The opportunity gateway is left open; and – They can rationalize their actions to reduce the moral impact in their minds (i.e., they have low integrity). • Fraud is much less likely to occur when: – There is low pressure, low opportunity, and high integrity. • Unfortunately, there is usually a mixture of these forces in play, and it can be very difficult to determine the pressures that may apply to an individual and the rationalizations he/she may be able to produce.
  • 70. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 76 of 175 INTRODUCTION • In this chapter we’ll discuss: – The fraud process – Why fraud occurs – Approaches to computer fraud – Specific techniques used to commit computer fraud – Ways companies can deter and detect computer fraud
  • 71. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 77 of 175 APPROACHES TO COMPUTER FRAUD • The U.S. Department of Justice defines computer fraud as any illegal act for which knowledge of computer technology is essential for its: – Perpetration; – Investigation; or – Prosecution.
  • 72. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 78 of 175 APPROACHES TO COMPUTER FRAUD • Computer fraud includes the following: – Unauthorized theft, use, access, modification, copying, and destruction of software or data. – Theft of money by altering computer records. – Theft of computer time. – Theft or destruction of computer hardware. – Use or the conspiracy to use computer resources to commit a felony. – Intent to illegally obtain information or tangible property through the use of computers.
  • 73. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 79 of 175 APPROACHES TO COMPUTER FRAUD • In using a computer, fraud perpetrators can steal: – More of something – In less time – With less effort • They may also leave very little evidence, which can make these crimes more difficult to detect.
  • 74. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 80 of 175 APPROACHES TO COMPUTER FRAUD • Computer systems are particularly vulnerable to computer crimes for several reasons: – Company databases can be huge and access privileges can be difficult to create and enforce. Consequently, individuals can steal, destroy, or alter massive amounts of data in very little time. – Organizations often want employees, customers, suppliers, and others to have access to their system from inside the organization and without. This access also creates vulnerability. – Computer programs only need to be altered once, and they will operate that way until: • The system is no longer in use; or • Someone notices.
  • 75. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 81 of 175 APPROACHES TO COMPUTER FRAUD – Modern systems are accessed by PCs, which are inherently more vulnerable to security risks and difficult to control. • It is hard to control physical access to each PC. • PCs are portable, and if they are stolen, the data and access capabilities go with them. • PCs tend to be located in user departments, where one person may perform multiple functions that should be segregated. • PC users tend to be more oblivious to security concerns.
  • 76. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 82 of 175 APPROACHES TO COMPUTER FRAUD – Computer systems face a number of unique challenges: • Reliability (accuracy and completeness) • Equipment failure • Environmental dependency (power, water damage, fire) • Vulnerability to electromagnetic interference and interruption • Eavesdropping • Misrouting
  • 77. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 83 of 175 APPROACHES TO COMPUTER FRAUD • Organizations that track computer fraud estimate that most U.S. businesses have been victimized by at least one incident of computer fraud.
  • 78. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 84 of 175 APPROACHES TO COMPUTER FRAUD • These frauds cost billions of dollars each year, and their frequency is increasing because: – Not everyone agrees on what constitutes computer fraud. • Many don’t believe that taking an unlicensed copy of software is computer fraud. (It is and can result in prosecution.) • Some don’t think it’s a crime to browse through someone else’s computer if their intentions aren’t malicious.
  • 79. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 85 of 175 APPROACHES TO COMPUTER FRAUD – Many computer frauds go undetected. – An estimated 80–90% of frauds that are uncovered are not reported because of fear of: • Adverse publicity • Copycats • Loss of customer confidence – There are a growing number of competent computer users, and they are aided by easier access to remote computers through the Internet and other data networks.
  • 80. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 86 of 175 APPROACHES TO COMPUTER FRAUD – Some folks believe “it can’t happen to us.” – Many networks have a low level of security. – Instructions on how to perpetrate computer crimes and abuses are readily available on the Internet. – Law enforcement is unable to keep up with the growing number of frauds. – The total dollar value of losses is difficult to calculate.
  • 81. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 87 of 175 APPROACHES TO COMPUTER FRAUD • Economic espionage, the theft of information and intellectual property, is growing especially fast. • This growth has led to the need for investigative specialists or cybersleuths.
  • 82. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 88 of 175 APPROACHES TO COMPUTER FRAUD • Computer fraud classification – Frauds can be categorized according to the data processing model: • Input • Processor • Computer instructions • Stored data • Output
  • 83. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 89 of 175 COMPUTER FRAUD CLASSIFICATIONS Processor Fraud Input Fraud Output Fraud Data Fraud Computer Instructions Fraud
  • 84. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 90 of 175 COMPUTER FRAUD CLASSIFICATIONS Processor Fraud Input Fraud Output Fraud Data Fraud Computer Instructions Fraud
  • 85. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 91 of 175 APPROACHES TO COMPUTER FRAUD • Input Fraud – The simplest and most common way to commit a fraud is to alter computer input. • Requires little computer skills • Perpetrator only needs to understand how the system operates – Can take a number of forms, including: • Disbursement frauds • The perpetrator causes a company to: – Pay too much for ordered goods; or – Pay for goods never ordered.
  • 86. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 92 of 175 APPROACHES TO COMPUTER FRAUD • Input Fraud – The simplest and most common way to commit a fraud is to alter computer input. • Requires little computer skills. • Perpetrator only needs to understand how the system operates. – Can take a number of forms, including: • Disbursement frauds • Inventory frauds • The perpetrator enters data into the system to show that stolen inventory has been scrapped.
  • 87. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 93 of 175 APPROACHES TO COMPUTER FRAUD • Input Fraud – The simplest and most common way to commit a fraud is to alter computer input. • Requires little computer skills. • Perpetrator only need to understand how the system operates – Can take a number of forms, including: • Disbursement frauds • Inventory frauds • Payroll frauds • Perpetrators may enter data to: – Increase their salaries. – Create a fictitious employee. – Retain a terminated employee on the records. • In the latter two instances, the perpetrator intercepts and cashes the resulting paychecks.
  • 88. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 94 of 175 APPROACHES TO COMPUTER FRAUD • Input Fraud – The simplest and most common way to commit a fraud is to alter computer input. • Requires little computer skills. • Perpetrator only needs to understand how the system operates – Can take a number of forms, including: • Disbursement frauds • Inventory frauds • Payroll frauds • Cash receipt frauds • The perpetrator hides the theft by falsifying system input. • EXAMPLE: Cash of $200 is received. The perpetrator records a cash receipt of $150 and pockets the $50 difference.
  • 89. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 95 of 175 APPROACHES TO COMPUTER FRAUD • Input Fraud – The simplest and most common way to commit a fraud is to alter computer input. • Requires little computer skills. • Perpetrator only needs to understand how the system operates – Can take a number of forms, including: • Disbursement frauds • Inventory frauds • Payroll frauds • Cash receipt frauds • Fictitious refund fraud • The perpetrator files for an undeserved refund, such as a tax refund.
  • 90. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 96 of 175 COMPUTER FRAUD CLASSIFICATIONS Processor Fraud Input Fraud Output Fraud Data Fraud Computer Instructions Fraud
  • 91. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 97 of 175 APPROACHES TO COMPUTER FRAUD • Processor fraud – Involves computer fraud committed through unauthorized system use. – Includes theft of computer time and services. – Incidents could involve employees: • Surfing the Internet; • Using the company computer to conduct personal business; or • Using the company computer to conduct a competing business.
  • 92. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 98 of 175 APPROACHES TO COMPUTER FRAUD • In one example, an agriculture college at a major state university was experiencing very sluggish performance from its server. • Upon investigating, IT personnel discovered that an individual outside the United States had effectively hijacked the college’s server to both store some of his/her research data and process it. • The college eliminated the individual’s data and blocked future access to the system. • The individual subsequently contacted college personnel to protest the destruction of the data. • Demonstrates both: – How a processor fraud can be committed. – How oblivious users can sometimes be to the unethical or illegal nature of their activities.
  • 93. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 99 of 175 COMPUTER FRAUD CLASSIFICATIONS Processor Fraud Input Fraud Output Fraud Data Fraud Computer Instructions Fraud
  • 94. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 100 of 175 APPROACHES TO COMPUTER FRAUD • Computer instructions fraud – Involves tampering with the software that processes company data. – May include: • Modifying the software • Making illegal copies • Using it in an unauthorized manner – Also might include developing a software program or module to carry out an unauthorized activity.
  • 95. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 101 of 175 APPROACHES TO COMPUTER FRAUD • Computer instruction fraud used to be one of the least common types of frauds because it required specialized knowledge about computer programming beyond the scope of most users. • Today these frauds are more frequent—courtesy of Web pages that instruct users on how to create viruses and other schemes.
  • 96. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 102 of 175 COMPUTER FRAUD CLASSIFICATIONS Processor Fraud Input Fraud Output Fraud Data Fraud Computer Instructions Fraud
  • 97. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 103 of 175 APPROACHES TO COMPUTER FRAUD • Data fraud – Involves: • Altering or damaging a company’s data files; or • Copying, using, or searching the data files without authorization. – In many cases, disgruntled employees have scrambled, altered, or destroyed data files. – Theft of data often occurs so that perpetrators can sell the data. • Most identity thefts occur when insiders in financial institutions, credit agencies, etc., steal and sell financial information about individuals from their employer’s database.
  • 98. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 104 of 175 COMPUTER FRAUD CLASSIFICATIONS Processor Fraud Input Fraud Output Fraud Data Fraud Computer Instructions Fraud
  • 99. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 105 of 175 APPROACHES TO COMPUTER FRAUD • Output fraud – Involves stealing or misusing system output. – Output is usually displayed on a screen or printed on paper. – Unless properly safeguarded, screen output can easily be read from a remote location using inexpensive electronic gear. – This output is also subject to prying eyes and unauthorized copying. – Fraud perpetrators can use computers and peripheral devices to create counterfeit outputs, such as checks.
  • 100. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 106 of 175 INTRODUCTION • In this chapter we’ll discuss: – The fraud process – Why fraud occurs – Approaches to computer fraud – Specific techniques used to commit computer fraud – Ways companies can deter and detect computer fraud
  • 101. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 107 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Changing data before, during, or after it is entered into the system. • Can involve adding, deleting, or altering key system data.
  • 102. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 108 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Unauthorized copying of company data.
  • 103. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 109 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • An attacker overloads and shuts down an Internet service provider’s email system by sending email bombs at a rate of thousands per second—often from randomly generated email addresses. • May also involve shutting down a Web server by sending a load of requests for the Web pages.
  • 104. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 110 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Carried out as follows: – The attacker infects dozens of computers that have broadband Internet access with denial-of-service programs. These infected computers are the zombies. – The attacker then activates the denial-of-service programs, and the zombies send pings (emails or requests for data) to the target server. The victim responds to each, not realizing they have fictitious return addresses, and waits for responses that don’t come. – While the victim waits, system performance degrades until the system freezes up or crashes. – The attacker terminates the program after an hour or two to limit the victim’s ability to trace the source.
  • 105. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 111 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Experts estimate there as many as 5,000 denial-of-service attacks weekly in the United States. • A denial-of-service can cause severe economic damage to its victim or even drive them out of business.
  • 106. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 112 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Eavesdropping • Perpetrators surreptitiously observe private communications or transmission of data. • Equipment to commit these “electronic wiretaps” is readily available at electronics stores.
  • 107. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 113 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Eavesdropping • Email threats • A threatening message is sent to a victim to induce the victim to do something that would make it possible to be defrauded. • Several banks in the Midwest were contacted by an overseas perpetrator who indicated that: – He had broken into their computer system and obtained personal and banking information about all of the bank’s customers. – He would notify the bank’s customers of this breach if he was not paid a specified sum of money.
  • 108. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 114 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Eavesdropping • Email threats • Email forgery (aka, spoofing) • Involves sending an email message that appears to have come from someone other than the actual sender. • Email spoofers may: – Claim to be system administrators and ask users to change their passwords to specific values. – Pretend to be management and request a copy of some sensitive information.
  • 109. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 115 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Eavesdropping • Email threats • Email forgery (aka, spoofing) • Hacking • Unauthorized access to and use of computer systems—usually by means of a personal computer and a telecommunications network. • Most hackers break into systems using known flaws in operating systems, applications programs, or access controls. • Some are not very malevolent and mainly motivated by curiosity and a desire to overcome a challenge. • Others have malicious intent and can do significant damage.
  • 110. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 116 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Eavesdropping • Email threats • Email forgery (aka, spoofing) • Hacking • Phreaking • Hacking that attacks phone systems and uses phone lines to transmit viruses and to access, steal, and destroy data. • They also steal telephone services and may break into voice mail systems. • Some hackers gain access to systems through dial-up modem lines.
  • 111. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 117 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Eavesdropping • Email threats • Email forgery (aka, spoofing) • Hacking • Phreaking • Hijacking • Involves gaining control of someone else’s computer to carry out illicit activities without the user’s knowledge. • The illicit activity is often the perpetuation of spam emails.
  • 112. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 118 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Eavesdropping • Email threats • Email forgery (aka, spoofing) • Hacking • Phreaking • Hijacking • Identity theft • Assuming someone’s identity, typically for economic gain, by illegally obtaining and using confidential information such as the person’s social security number, bank account number, or credit card number. • Identity thieves benefit financially by: – Taking funds out of the victim’s bank account. – Taking out mortgages or other loans under the victim’s identity. – Taking out credit cards and running up large balances. • If the thief is careful and ensures that bills and notices are sent to an address he controls, the scheme may be prolonged until such time as the victim attempts to buy a home or car and finds out that his credit is destroyed.
  • 113. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 119 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Eavesdropping • Email threats • Email forgery (aka, spoofing) • Hacking • Phreaking • Hijacking • Identity theft • Victims can usually clear their credit, but the effort requires a significant amount of time and expense. • Identity theft was made a federal offense in 1998, but it is a growing crime industry. • One U.S. postal inspector, whose job duties involved investigation of identity thefts, was himself a victim. The thief ran up $80,000 in debt under the postal inspector’s identity before the inspector discovered the problem.
  • 114. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 120 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Eavesdropping • Email threats • Email forgery (aka, spoofing) • Hacking • Phreaking • Hijacking • Identity theft • Identity thieves can steal corporate or individual identities by: – Shoulder surfing • Watching people enter telephone calling card numbers or credit card numbers or listening to communications as they provide this information to sales clerks or others. – Scavenging or dumpster diving • Searching corporate or personal records by rifling garbage cans, communal trash bins, and city dumps for documents with confidential company information. • May also look for personal information such as checks, credit card statements, bank statements, tax returns, discarded applications for pre-approved credit cards, or other records that contain social security numbers, names, addresses, phone numbers, and other data that allow them to assume an identity. – Redirecting mail • Intercepting mail and having it delivered to a location where others can access it. – Using Internet, email, and other technology in spoofing, phishing, eavesdropping, impersonating, social engineering, and data leakage schemes.
  • 115. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 121 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Data diddling • Data leakage • Denial of service attacks • Eavesdropping • Email threats • Email forgery (aka, spoofing) • Hacking • Phreaking • Hijacking • Identity theft • The U.S. Department of Justice suggests the following four ways to minimize the chances of being victimized by identity theft: – Do not give out corporate or personal information unless there is a good reason to trust the person to whom it is given. – Check financial information regularly for what should be there, as well as for what should not be there. – Periodically review your credit report. – Maintain careful records of banking and financial accounts.
  • 116. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 122 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Using the Internet to spread false or misleading information about people or companies. • May involve: – Planting inflammatory messages in online chat rooms. – Websites with misinformation. – Pretending to be someone else online and making inflammatory comments that will be attributed to that person. – A “pump-and-dump” occurs when an individual spreads misinformation, often through Internet chat rooms, to cause a run- up in the value a stock and then sells off his shares of the stock. A number of pump-and-dump cases have been prosecuted by the SEC.
  • 117. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 123 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Another common form of Internet misinformation is the spreading of “urban legends”—often by innocently forwarding emails. – Urban legends may often include damaging implications about company products, such as a recent email suggesting that certain lipsticks contain lead or that using plastic cookware in the microwave can cause cancer. – Before forwarding any emails with negative information about individuals, companies, or their products, it’s a good idea to check the veracity of the information first. – Emails with urban legends often attribute their “facts” to credible sources, such as the federal government, Stanford University researchers, the FBI, etc. – There are several Websites that attempt to verify the truth of emails that are circulated. One such Website is www.snopes.com. You can easily locate the email you received on these Websites, by searching under a key term in the email, such as “lipstick.” – You are likely to find that most emails you were getting ready to forward are either false or only partially true.
  • 118. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 124 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Hackers use the Internet to disrupt electronic commerce and destroy company and individual communications. • Viruses and worms are two main forms of Internet terrorism.
  • 119. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 125 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • A program that lies idle until triggered by some circumstance or a particular time. • Once triggered, it sabotages the system, destroying programs, data, or both. • Usually written by disgruntled programmers. • EXAMPLE: A programmer places a logic bomb in a payroll application that will destroy all the payroll records if the programmer is terminated.
  • 120. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 126 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • The perpetrator gains access to the system by pretending to be an authorized user. • The perpetrator must know the legitimate user’s ID and password. • Once in the system, he enjoys the same privileges as the legitimate user.
  • 121. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 127 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • Packet sniffers • Programs that capture data from information packets as they travel over the Internet or company networks. • Confidential information and access information can be gleaned from the captured data—some of which is later sold.
  • 122. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 128 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • Packet sniffers • Password cracking • An intruder penetrates a system’s defenses, steals the file of valid passwords, decrypts them, and then uses them to gain access to almost any system resources.
  • 123. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 129 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • Packet sniffers • Password cracking • Phishing • Sending out a spoofed email that appears to come from a legitimate company, such as a financial institution. eBay, PayPal, and banks are commonly spoofed. • The recipient is advised that information or a security check is needed on his account, and advised to click on a link to the company’s website to provide the information. • The link connects the individual to a Website that is an imitation of the spoofed company’s actual Website. These counterfeit Websites appear very authentic, as do the emails.
  • 124. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 130 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • Packet sniffers • Password cracking • Phishing • One newly graduated college student recently took a job in California and deposited his first paycheck of approximately $5,000 in the bank. • That same night, he received an email from the bank, inviting him to click on the link in the email to set up online banking for his new bank account. • He followed directions and provided the requested information to set up online banking. • Two hours later, he was nervous and called the bank—only to find out that his bank account had been cleaned out and closed.
  • 125. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 131 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • Packet sniffers • Password cracking • Phishing • As a rule of thumb, it is a good idea not to click on any link provided in an email and to go directly to the Website instead. • PayPal, whose email address is commonly spoofed for phishing scams, offers the following advice: – If PayPal ever sends you an email, they will include your first and last name in the salutation of the email. – If you need to enter PayPal’s Website, type “https:” in the URL instead of “http:” in order to enter on the company’s secured server. – If you receive a suspicious email, get out of your browser and go back in before proceeding directly to a company Website.
  • 126. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 132 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • Packet sniffers • Password cracking • Phishing  In 2004, a phishing-related scam took place in South America with respect to three large South American banks. Once an individual opened the related email, a script was downloaded on their computer. The script would alter the individual’s Web browser so that if the user entered the URL of one of these three banks, the browser would redirect them to a counterfeit Website for that bank. The oblivious user would provide ID and password information, and was instantly set up for a high-tech robbery of his bank account.
  • 127. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 133 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • Packet sniffers • Password cracking • Phishing • Consumer Reports suggests that if you have any questions about the legitimacy of a Website, you should try entering the wrong password. A phishing Website will typically accept an incorrect password—which cues you that it is a phishing scam.
  • 128. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 134 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Example of a Website produced for a phishing scam.
  • 129. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 135 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • Packet sniffers • Password cracking • Phishing • Piggybacking • Tapping into a telecommunications line and latching onto a legitimate user before that user logs into a system. • The legitimate user unknowingly carries the perpetrator into the system.
  • 130. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 136 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • Packet sniffers • Password cracking • Phishing • Piggybacking • Round-down technique • Made famous in the movie, Office Space. • The programmer instructs the computer to round interest calculations down to two decimal places and deposits the remaining fraction into the account of a programmer or an accomplice.
  • 131. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 137 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Internet misinformation • Internet terrorism • Logic time bombs • Masquerading or impersonation • Packet sniffers • Password cracking • Phishing • Piggybacking • Round-down technique • Salami technique • Involves the theft of tiny slices of money over a period of time. • The round-down is just a special form of a salami technique.
  • 132. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 138 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Perpetrators trick employees into giving them information they need to get into the system. • A perpetrator might call an employee and indicate he is the systems administrator and needs to get the employee’s password.
  • 133. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 139 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Copying software without the publisher’s permission. • In the United States, it’s estimated that 26% of software in use is pirated. • Fines for individuals and corporations are stiff, and individuals convicted of software piracy can serve jail terms of up to 5 years.
  • 134. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 140 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Emailing an unsolicited message to multitudes of people, often in an attempt to sell a product. • Many times the product offers are fraudulent.
  • 135. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 141 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Spammers use creative means to find valid email addresses: – Scanning the Internet for addresses posted online. – Hacking into company databases and stealing mailing lists. – Staging dictionary (aka direct harvesting) attacks. • These attacks use special software to guess addresses at a particular company and send blank emails. • Messages not returned are usually valid. • These attacks are very burdensome to corporate email systems.
  • 136. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 142 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Companies may use filtering software to detect dictionary attacks, search mail for competitive leaks, and block inappropriate attachments, such as pornography and illegal MP3 files. • Filtering is not always viable. The director of internal audit at a major healthcare company changes email addresses frequently because of the volume of spam email in his inbox. When asked why his company did not filter the spam, he replied, “Because we’re a healthcare company, we cannot filter out any references to body parts or prescription medications.” • There is increasing public clamor for laws to clamp down on spamming. In December 2004, a federal judge awarded over $1 billion to a small Midwestern Internet service provider in an action against three spammers.
  • 137. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 143 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Spyware • Software that monitors computing habits, such as Web-surfing habits, and sends the data it gathers to someone else, typically without the user’s permission. – One type, called adware (for advertising- supported software) does two things: • Causes banner ads to pop up on your monitor as you surf the net. • Collects information about your Web- surfing and spending habits and forward it to a company gathering the data—often an advertising or large media organization.
  • 138. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 144 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Spyware • Usually comes bundled with freeware and shareware downloaded from the Internet. • May be disclosed in the licensing agreement, but users are unlikely to read it. • Reputable adware companies claim they don’t collect sensitive or identifying data. – But there is no way for users to control or limit the activity. – It is not illegal, but many find it objectionable. • Software has been developed to detect and eliminate spyware, but it may also impair the downloaded software. – Some is intentionally difficult to uninstall.
  • 139. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 145 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Spyware • Keystroke loggers • A keystroke logger records a user’s keystrokes and emails them to or saves them for the party that planted the logger. These are sometimes used by: – Parents to monitor their children’s computer usage. – Businesses to monitor employee activity. – Fraudsters to capture passwords, credit card numbers, etc. – A keystroke logger can be a hardware device attached to a computer or can be downloaded on an individual’s computer in the same way that any Trojan horse might be downloaded.
  • 140. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 146 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Spyware • Keystroke loggers • Spyware and keystroke loggers are very problematic for companies with employees who telecommute or contact the company’s computer from remote locations. • Spyware on those computers makes the company’s systems vulnerable. • Individuals are also exposed when they use wireless networks, such as those that may be available in coffee shops.
  • 141. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 147 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Spyware • Keystroke loggers • Superzapping • Unauthorized use of special system programs to bypass regular system controls and perform illegal acts. • The name is derived from an IBM software utility called Superzap that was used to restored crashed systems.
  • 142. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 148 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Spyware • Keystroke loggers • Superzapping • Trap doors • Also called back doors. • Programmers create trap doors to modify programs. • The trap door is a way into the system that bypasses normal controls. • The trap door should be removed before the program is implemented. • If it is not, the programmer or others may later gain unauthorized access to the system.
  • 143. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 149 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Spyware • Keystroke loggers • Superzapping • Trap doors • Trojan horse • A set of unauthorized computer instructions planted in an authorized and otherwise properly functioning program. • Allows the creator to control the victim’s computer remotely. • The code does not try to replicate itself but performs an illegal act at some specific time or when some condition arises. • Programs that launch denial of service attacks are often Trojan horses.
  • 144. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 150 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Spyware • Keystroke loggers • Superzapping • Trap doors • Trojan horse • War dialing • Hackers search for an idle modem by programming their computers to dial thousands of phone lines. • Hackers enter through the idle modem and gain access to the connected network.
  • 145. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 151 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Social engineering • Software piracy • Spamming • Spyware • Keystroke loggers • Superzapping • Trap doors • Trojan horse • War dialing • War driving • Driving around in cars looking for unprotected home or corporate wireless networks. • If the hackers mark the sidewalk of the susceptible wireless network, the practice is referred to as warchalking.
  • 146. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 152 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Virus • Many viruses have two phases: – First, when some predefined event occurs, the virus replicates itself and spreads to other systems or files. – Another event triggers the attack phase in which the virus carries out its mission. – A virus may lay dormant or propagate itself without causing damage for an extended period.
  • 147. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 153 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Virus • Damage may take many forms: – Send email with the victim’s name as the alleged source. – Destroy or alter data or programs. – Take control of the computer. – Destroy or alter file allocation tables. – Delete or rename files or directories. – Reformat the hard drive. – Change file content. – Prevent users from booting. – Intercept and change transmissions. – Print disruptive images or messages on the screen. – Change screen appearance. • As viruses spread, they take up much space, clog communications, and hinder system performance.
  • 148. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 154 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Virus • Virus symptoms: – Computer will not start or execute – Performs unexpected read or write operations – Unable to save files – Long time to load programs – Abnormally large file sizes – Slow systems operation – Unusual screen activity – Error messages
  • 149. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 155 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Virus • Viruses are contagious and easily spread from one system to another. • They are usually spread by: – Opening an infected email attachment or file (most common); or – Running an infected program. • Some viruses can mutate, which makes them more difficult to detect and destroy. • The emails often appear to come from sources like Microsoft and seem very convincing.
  • 150. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 156 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Virus • Virus protections include: – Install reliable virus software that scans for, identifies, and destroys viruses. – Keep the antivirus program up to date. – Scan incoming email at the server level, rather than when it hits the desktops. – Certify all software as virus-free before loading it. • Software from unknown sources may be virus bait, especially if it seems too good to be true. – Deal with trusted software retailers. – Use electronic techniques to make tampering evident. – Check new software on an isolated machine. – Have two backups of all files. – Do not put diskettes or CDs in strange machines, or let others put unscanned disks in your machine.
  • 151. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 157 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Virus • Viruses attack computers, but any device that is part of the communications network is vulnerable, including: – Cell phones – Smart phones – PDAs
  • 152. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 158 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Virus • Worms • A worm is similar to a virus except that: – A worm is a stand-alone program, while a virus is only a segment of code hidden in a host program or executable file. – A worm will replicate itself automatically, while a virus requires a human to do something like open a file. • Worms often reproduce by mailing themselves to the recipient’s mailing list. • They are not confined to PCs and have infected cell phones in Japan. • A worm typically has a short but very destructive life. • It takes little technical knowledge to create worms or viruses; several Websites provide instructions. • Most exploit known software vulnerabilities that can be corrected with a software patch, making it important to install all patches as soon as they are available.
  • 153. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 159 of 175 COMPUTER FRAUD AND ABUSE TECHNIQUES • Perpetrators have devised many methods to commit computer fraud and abuse. These include: • Virus • Worms • The low-tech, do-it-yourself attack • You receive an email from a friend, apologizing profusely that he/she has previously sent you an email that was infected with a virus. • The friend’s email gives you instructions to look for and remove the offending virus. • You delete the file from your hard drive. The only problem is that the file you just deleted was part of your operating system. • Your friend was well-intended and has done the same thing to his/her computer. • REMEDY: Before even considering following instructions of this sort, check the list of hoaxes that are available on any virus protection Website, such as: – www.norton.com – www.mcafee.com
  • 154. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 160 of 175 INTRODUCTION • In this chapter we’ll discuss: – The fraud process – Why fraud occurs – Approaches to computer fraud – Specific techniques used to commit computer fraud – Ways companies can deter and detect computer fraud
  • 155. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 161 of 175 PREVENTING AND DETECTING COMPUTER FRAUD • Organizations must take every precaution to protect their information systems. • Certain measures can significantly decrease the potential for fraud and any resulting losses. • These measures include: – Make fraud less likely to occur – Increase the difficulty of committing fraud – Improve detection methods – Reduce fraud losses
  • 156. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 162 of 175 PREVENTING AND DETECTING COMPUTER FRAUD • Organizations must take every precaution to protect their information systems. • Certain measures can significantly decrease the potential for fraud and any resulting losses. • These measures include: – Make fraud less likely to occur – Increase the difficulty of committing fraud – Improve detection methods – Reduce fraud losses
  • 157. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 163 of 175 PREVENTING AND DETECTING COMPUTER FRAUD • Make fraud less likely to occur – Create a culture that stresses integrity and commitment to ethical values and competence. – Adopt an organizational structure, management philosophy, operating style, and appetite for risk that minimizes the likelihood of fraud. – Require oversight from an active, involved, and independent audit committee. – Assign authority and responsibility for business objectives to specific departments and individuals, encourage initiative in solving problems, and hold them accountable for achieving those objectives.
  • 158. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 164 of 175 PREVENTING AND DETECTING COMPUTER FRAUD – Identify the events that lead to increased fraud risk, and take steps to prevent, avoid, share, or accept that risk. – Develop a comprehensive set of security policies to guide the design and implementation of specific control procedures, and communicate them effectively to company employees. – Implement human resource policies for hiring, compensating, evaluating, counseling, promoting, and discharging employees that send messages about the required level of ethical behavior and integrity. – Effectively supervise employees, including monitoring their performance and correcting their errors.
  • 159. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 165 of 175 PREVENTING AND DETECTING COMPUTER FRAUD – Train employees in integrity and ethical considerations, as well as security and fraud prevention measures. – Require annual employee vacations, periodically rotate duties of key employees, and require signed confidentiality agreements. – Implement formal and rigorous project development and acquisition controls, as well as change management controls. – Increase the penalty for committing fraud by prosecuting fraud perpetrators more vigorously.
  • 160. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 166 of 175 PREVENTING AND DETECTING COMPUTER FRAUD • Organizations must take every precaution to protect their information systems. • Certain measures can significantly decrease the potential for fraud and any resulting losses. • These measures include: – Make fraud less likely to occur – Increase the difficulty of committing fraud – Improve detection methods – Reduce fraud losses
  • 161. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 167 of 175 PREVENTING AND DETECTING COMPUTER FRAUD • Increase the difficulty of committing fraud – Develop a strong system of internal controls – Segregate the accounting functions of: • Authorization • Recording • Custody – Implement a program segregation of duties between systems functions – Restrict physical and remote access to system resources to authorized personnel
  • 162. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 168 of 175 PREVENTING AND DETECTING COMPUTER FRAUD – Require transactions and activities to be authorized by appropriate supervisory personnel. Have the system authenticate the person and their right to perform the transaction before allowing the transaction to take place. – Use properly designed documents and records to capture and process transactions. – Safeguard all assets, records, and data. – Require independent checks on performance, such as reconciliation of two independent sets of records, where possible and appropriate.
  • 163. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 169 of 175 PREVENTING AND DETECTING COMPUTER FRAUD – Implement computer-based controls over data input, computer processing, data storage, data transmission, and information output. – Encrypt stored and transmitted data and programs to protect them from unauthorized access and use. – Fix known software vulnerabilities by installing the latest updates to operating systems, security, and applications programs.
  • 164. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 170 of 175 PREVENTING AND DETECTING COMPUTER FRAUD • Organizations must take every precaution to protect their information systems. • Certain measures can significantly decrease the potential for fraud and any resulting losses. • These measures include: – Make fraud less likely to occur – Increase the difficulty of committing fraud – Improve detection methods – Reduce fraud losses
  • 165. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 171 of 175 PREVENTING AND DETECTING COMPUTER FRAUD • Improve detection methods – Create an audit trail so individual transactions can be traced through the system to the financial statements and vice versa. – Conduct periodic external and internal audits, as well as special network security audits. – Install fraud detection software. – Implement a fraud hotline.
  • 166. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 172 of 175 PREVENTING AND DETECTING COMPUTER FRAUD – Employ a computer security officer, as well as computer consultants and forensic specialists as needed. – Monitor system activities, including computer and network security efforts, usage and error logs, and all malicious actions. – Use intrusion detection systems to help automate the monitoring process.
  • 167. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 173 of 175 PREVENTING AND DETECTING COMPUTER FRAUD • Organizations must take every precaution to protect their information systems. • Certain measures can significantly decrease the potential for fraud and any resulting losses. • These measures include: – Make fraud less likely to occur – Increase the difficulty of committing fraud – Improve detection methods – Reduce fraud losses
  • 168. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 174 of 175 PREVENTING AND DETECTING COMPUTER FRAUD • Reduce fraud losses – Maintain adequate insurance. – Develop comprehensive fraud contingency, disaster recovery, and business continuity plans. – Store backup copies of program and data files in a secure, off-site location. – Use software to monitor system activity and recover from fraud.
  • 169. © 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart 175 of 175 SUMMARY • In this chapter, you’ve learned what fraud is, who commits fraud, and how it’s perpetrated. • You’ve learned about the many variations of computer fraud, and you’ve learned about techniques to reduce an organization’s vulnerability to these types of fraud.