AIS Chapter 3: Cybercrime, Fraud, and Ethics

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

most computer criminals: a. have non technical backgrounds b. have noncriminal backgrounds c. have little college education d. are young and bright e. have probably not been caught, so we don't really know much about them

E

which of these is a software tool often used by forensic accountants? a. MS-DOS b. ACFE c. computer spy d. logic bomb e. EnCase

E

fraudulent financial reporting

intentional falsification of accounting records

other names for ethical hacking

intrusion testing, penetration testing, and red teaming

integrated computer assisted surveillance system (ICASS)

is a customer-driven, voluntary interagency system for managing and funding administrative support services abroad

Denial or service (DOS)

is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service

is engaging in non working activities using the internet at work considered a cyber crime?

it can be because you are using the companies time and money

why is hacking such a widespread problem?

many computer applications now involve cloud, local, and wide area networks

misappropriation of assets

misuse of company assets

ethical hackers

organizations hire these people to test their vulnerability to hacking

logic bomb

programs similar to trojan horse program, except that they remain dormant until the computer system encounters a specific condition

encryption protection

protects transmitted data that might be intercepted en route and also stored data, which are rendered useless to a hacker even if he/she manages to gain access to files that are protected by other means - it's an algorithm, series of keys that are being used to unlock what had been encrypted on the other end (have to have that key in order to decrypt it)

encryption

protects transmitted data that much be intercepted en route and also stored data

computer fraud

refers specifically to the use of computers or network to commit a fraudulent act (specific form of cybercrime)

identify theft

refers to an act in which someone wrongfully obtains and uses another persons personal data for fraud or deception

data diddling

refers to changing data before, during, or after they are entered into a computer system change can delete, alter, or add important system data, especially the data stored in corporate databases

worms

replicate themselves repeatedly like a virus but can consume internal memory, disk space, and internal bandwidth (worms are animals, can consume)

trojan horse programs

reside in disk space occupied by legitimate copies of computer program (e.g., Excel) and then release a bomb

RITE

responsibility, integrity of the individual, trustworthiness, ethical

opportunity for fraud

results from lack of controls

smishing

similar scam to phishing except it uses text messages on cell phones

applet

small program stored in a web page file and designed to run by web browser software

computer abuse

someone who does not have permission, uses or accesses someone else's computer or causes damage without intention to harm

misappropriation of assets involves

stealing assets from a company and is usually committed by employees within an organization or through collusion of employees and outside conspirators (occupational fraud)

dumpster diving

stealing personal information from garbage cans, taking delivered or outgoing mail from house mail boxes, or making phone solicitations that ask for personal info

CIA

the principals behind COBIT 1. confidentiality 2. Integrity 3. availability

computer fraud and abuse act of 1986 (CFAA)

defines cybercrime as any illegal act for which knowledge of computer technology is essential for perpetration, investigation, or prosecution

boot-sector viruses

hide in the boot sectors of a disk, where the operating system access them every time it accesses the disk itself (when you re-boot machine)

rationalization for fraud

how the individual internalizes it (i deserve this, they deserve this)

5 antivirus control procedures

1. buying software from reputable sources 2. avoiding illegal software copying 3. not downloading suspicious files from the internet 4. deleting email messages from unknown sources before opening them 5. maintaining complete backup files in the event you must rebuild your system

examples of cybercrime

1. compromising valuable information 2. hacking 3. denial of service

The TRW Credit Data Case

-Credit rating company -Altered company credit ratings for a fee -Clients relied on inaccurate information -Fair Credit Reporting Act Issues: (1) accuracy of inputs used to update a specific AIS (2) protection of users of credit info and protection of indiv. whose credit info is gathered by a private company

smishing is a form of: a. fishing b. local area network c. computer worm d. identity theft

D

Fraud is estimated to cost the US how much each year?

1 trillion dollars

the FBI estimates how much of all cybercrime is detected?

1%

the symptoms of employee fraud

1. accounting irregularities 2. internal control weaknesses 3. anomalies 4. lifestyle changes 5. behavioral changes

ways to prevent and detect cybercrime and fraud

1. enlist top management support 2. increase employee awareness and education 3. asses security policies and protect passwords 4. implement controls 5. identify computer criminals 6. maintain physical security 7. recognize the symptoms of employee fraud 8. use data driven techniques 9. employe forensic accountants

3 ways to prevent computer viruses

1. firewalls 2. antivirus software 3. antivirus control procedures

the systems of auditing standards No. 99 identifies two types of accounting related fraud

1. fraudulent financial reporting (cooking the books) 2. misappropriation of assets (stealing assets)

ethical issues in computer usage

1. honesty 2. protecting computer systems 3. protecting confidential information 4. social responsibility 5. acceptable use 6. rights of privacy

whats the most common form of motivation for fraud?

1. money 2. promotion opportunities 3. retaliation

the fraud triangle

1. motivation/pressure 2. opportunity 3. rationalization

why is cybercrime growing?

1. the exponential growth in the use of computer resources 2. continual lax security

for an activity to be determined computer fraud it must involve (2)

1. the use of computer to create an intentional, dishonest misrepresentation of fact 2. the intentional attempt to cause another person or business to do or refrain from doing something which causes loss

data diddling is a problem because

1. these data are often proprietary 2. may give a firm a competitive advantage 3. sometimes an organizations most valuable asset

the types of computer fraud and abuse that the CFAA identifies

1. unauthorized theft, use, access, modification, copying, or destruction of software/data 2. theft of money by altering computer records or theft of computer time 3. intent to illegally obtain info or tangible property through computer use 4. use or the conspiracy to use computer resolves to commit a felony 5. theft, vandalism, or description of computer hardware 6. trafficking in passwords or other login info 7. extortion that uses a computer system as a target

Which of the following is NOT an example of computer fraud? a. entering invoices into the AIS for services that were not provided and depositing the check in a private bank account b. sending an email to everyone in your address book asking for a $1 donation c. programming a change to decrease the dividend payment to stockholders of a firm and issuing a check to your friend for the total change d. using a university computer to set up a realistic looking "virtual store" to sell toys, although you don't have any - you just don't have time to get real job and need some money to cover the rent

B

which of these is not helpful in attempting to thwart computer crime and abuse? a. enlist the support of top management b. keep employees in the dark so that they cannot penetrate them c. use strong words d. design and test disaster recovery programs

B

What is it called when someone intentionally changes data before, during, or after they are entered into the computer (with the intent to illegally obtain information or assets?) a. trojan horse b. logic bomb c. data diddling d. a cookie

C

which of the following pieces of computer legislation is probably the most important? a. cyber security enhancement act of 2002 b. computer security act of 1987 c. computer fraud and abuse act of 1986 d. federal privacy act of 1974

C

The TRW case is notable because: a. the amount of dollars involved was not significant b. no one got caught c. the fraud was detected by a surprise audit d. the real victims are TRW customers

D

a local area network administrator receives a call from an employee requesting his password. the person calling is not a real employee. this is an example of: a. a DOS system b. security trojan horse c. a worm d. social engineering e. a security policy

D

virus

a code that attaches itself to other innocent files or programs and replicates itself

cybercrime

a general term that refers to any criminal activity that involves computers or networks; also referred to as e-crime or computer crime can involve direct attacks on computers/networks (w/ viruses or denial of service) or the use of computers/networks to commit a crime

malware

a term for many types of malicious or damaging software (mal-malicious ware-software)

computer fraud and abuse act of 1986

act makes it a federal crime to intentionally access a computer for purposes such as (1) obtaining top-secret military info or personal financial or credit info, (2) committing a fraud, or (3) altering or destroying federal info amendment: prohibits unauthorized access to a protected computer and illegal possession of stolen "access devices," which includes passwords and credit card numbers

Association of Certified Fraud Examiners (ACFE)

an international professional organization committed to detecting, deterring, and preventing fraud and white collar crime

CFAA

computer fraud and abuse act of 1986 states that computer fraud is an illegal act and computer technology is essential for preparation, investigation, or prosecution

Computer Security Institute (CSI)

conducts an annual survey to help determine the scope of cybercrime in the US

fraudulent financial reporting occurs when

corporate officials intentionally falsify accounting records to mislead analysts, creditors, or investors

cyber security enhancement act of 2002

this act permits the US Sentencing Commission to review and, if appropriate, amend guidelines and policy statements applicable to persons convicted of a computer crime to reflect the serious nature of (1) the growing incidence of computer crimes, (2) the need for an effective deterrent, and (3) appropriate punishment to help prevent such offenses

phishing scams

use email or websites that claim to be legitimate but that ask you to provide or update your personal info such as account number, credit card number, or password

social engineering

when hackers pose as bonafide employees and convince network administrators to give them passwords over the phone

what is essential for a computer related crime prosecution?

willful intent


Kaugnay na mga set ng pag-aaral

CH 15 reading questions/ study guide

View Set

DNA, Hot Pockets, & The Longest Word Ever

View Set

Unit 3 Sensation and Perception Retake

View Set

Unit 4 Quiz 2 APUSH (UPDATED 11/15)

View Set

Developmental Psychology Module 13

View Set

Training and Development Chapter 3

View Set

vocabulaire TB (2) 5a à bord de l'avion: partie b, vocabulaire TB (2) 5a à l'aéroport: partie a COMBO

View Set

Foundations of Employee Motivation MPO exam 3

View Set

Fundamentals Practice Questions Exam 2

View Set