CFE Accounting

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Quick ratio

(Cash + marketable securities + receivables) / current liabilities

Ways to prevent skimming scheme

Performing a physical inventory

Most shell company schemes involve the purchas of ficitious...

Services

Income statement

details how much profit or loss a company earned over a period of time

Statement of owners equity acts as the link between

income statement and balance sheet

Corruption

the wrongful use of influence to procure a benefit for the actor or another person, contrary to the duty or the rights of others.

Asset Turnover Ratio

(net sales divided/ by average total assets) is used to determine the efficiency with which asset resources are used by the entity. The asset turnover ratio is one of the more reliable indicators of financial statement fraud. A sudden or continuing decrease in this ratio is often associated with improper capitalization of expenses, which increases the denominator without a corresponding increase in the numerator.

is a program or command procedure that gives the appearance that it is useful but in fact contains hidden code that causes malicious damage. When the hidden code in a Trojan horse is activated, it performs some unwanted or harmful function. Often, viruses and worms attach themselves to other legitimate programs, becoming Trojan horses and spreading to other systems.

A Trojan horse

Skimming

A credit card skimming scheme requires a device, often referred to as a skimmer or a wedge, that scans and stores a large amount of credit card numbers. Credit card skimming is more frequent in businesses where an employee is able to remove the card from the customer's view in order to run the transaction. This scam might occur in a retail situation in which a credit card is processed behind a tall counter, or in a restaurant scenario wherein a waiter walks away with a customer's card to run the transaction.

is the practice of recording the deposit of an interbank transfer before recording the disbursement, thus briefly double-counting the amount of cash. In a kiting scheme, multiple bank accounts are opened and money is "deposited" from account to account, although the money never exists.

Check kiting

is a type of fraudulent disbursement scheme in which an employee either (1) prepares a fraudulent check for his own benefit or (2) intercepts a check intended for a third party and converts the check for his own benefit.

Check tampering

Appears on the balance sheet

Current assets

Current ratio

Current assets/ current liabilities

viruses load themselves onto the target system's memory, infect other files, and then unload themselves.

Direct-action

Accounts

Entries to the left side of an account are referred to as debits, and entries to the right side of an account are referred to as credits. Debits increase asset and expense accounts, whereas credits decrease these accounts. On the other side of the equation, credits increase liability, revenue, and owners' equity accounts. Conversely, debits decrease liabilities, revenues, and owners' equity.

Forged maker

Forges the signature

Comparing personnel records maintained by the human resources department to payroll data can be useful in detecting ghost employee schemes. An analysis of payroll withholdings might also reveal either ghost employees or trust account abuses. Ghost employees often will have no withholding taxes, insurance, or other normal deductions. Therefore, a listing of any employee without these items might reveal a ghost employee. Another way to detect a ghost employee scheme is to examine paychecks for dual endorsements. This might indicate that the fraudster has forged an endorsement in order to deposit the ghost's paycheck into his own account.

Ghost employees

In general, payroll schemes fall into one of the following categories:

Ghost employees Falsified hours and salary Commission schemes

Income statement

How much profit or loss the company earned over a particular time.

a bank buys, sells, and swaps its bad loans for the bad loans of another bank, creating new documentation in the process. Its purpose is to mask or hide bad loans by making them look like they are recent and good.

In a daisy chain,

refers to the process by which users are allowed to use computer systems and networks, and logical access control refers to a process by which users are identified and granted certain privileges to information, systems, or resources. These controls are designed to protect the confidentiality, integrity, and availability of informational resources. Logical access controls can be used to verify a person's identity and privileges before granting the person logical access to information or other online resources.

Logical access

GAAP principle corresponding expenses and revenue

Matching

Skimming Scheme

More difficult than cash larcency,

is an information security goal that an e-commerce system should strive to provide its users and asset holders. It refers to a method used to guarantee that the parties involved in an e-commerce transaction cannot repudiate (deny) participation in that transaction. Non-repudiation is obtained through the use of digital signatures, confirmation services, and timestamps. Additional information security goals that should be provided to users and account holders of information systems include: Confidentiality of data Integrity of data Availability of data Authentication

Non-repudiation

Pass through Scheme

Pass-through schemes are usually undertaken by employees in charge of purchasing on the victim company's behalf. Instead of buying merchandise directly from a vendor, the employee sets up a shell company and purchases the merchandise through that fictitious entity. He then resells the merchandise to his employer from the shell company at an inflated price, thereby making an unauthorized profit on the transaction.

Overstated refund

Rather than create an entirely fictitious refund, some employees merely overstate the amount of a legitimate refund and steal the excess money. For example, if a customer returns $100 worth of merchandise, the employee might ring up a $200 return. The employee gives the customer $100 in return for the merchandise and then pockets the remaining $100. The customer might or might not be aware of the scheme taking place. This will result in shrinkage of $100 worth of inventory. In other words, the inventory balance on the books will be overstated by the amount of the excess refund.

means of measuring the relationship between two different financial statement amounts

Ratio analysis

is the amount withheld from each draw request until such time as the construction is complete and the lien period has expired.

Retainage

is a method for gaining unauthorized access to a computer system in which the attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker's intended scheme.

Social engineering

Going Concern

The assumption that a business will continue indefinitely is reflected in the accounting concept of:

Matching principle

The matching principle requires that expenses be recorded in the same accounting period as the revenues they help generate. Estimates, accruals, and allocations are often required to meet this requirement. As a sale is made, the appropriate charges for cost of goods sold, or other expenses directly corresponding to the sale, should be recorded in the same accounting period.

is built to overcome people's most common misgivings about investment. Promoters are very specific in their prospectus. The offer sounds good and (within its own logic) makes sense. The "opportunity" is usually pitched by someone familiar to the victim, or at least by someone with an affinity the victim trusts. Most important, the pyramid does return people's money, with the incredible profits attached as promised. Pyramid schemes are designed to initially pay off to the earliest investors.

The pyramid investment structure

involves the company that initially conned the consumer. Using a different company's name, the outfit contacts the consumer again and asks if he would like to help put the unethical company out of business and get his money back. Naturally, an upfront fee is required to finance the investigation.

The scavenger or revenge scheme

Cash Flow statement includes

The statement of cash flows reports a company's sources and uses of cash during the accounting period. This statement is often used by potential investors and other interested parties in tandem with the income statement to determine the true financial performance of a company during the period being reported. The statement of cash flows is broken down into three sections: Cash flows from operating activities Cash flows from investing activities Cash flows from financing activities

What financial statement fraud scheme involves recording revenues and expenses in improper periods

Timing differences

Assets, liabilities, and owners' equity are all items that appear on a company's balance sheet.

True

Credits decrease asset and expense accounts

True

Sales that are contingent on additional terms should not be recorded as revenue on the selling company's books.

True

a large amount of overdue accounts receivable on the books is a red flag of a fictitious revenue scheme

True

comprise an industry of their own by providing the collateral a telemarketing scam needs—turnkeys launder credit card receipts and checks, sell autodialers and phone lists, and provide the merchandise portrayed as valuable prizes.

Turnkeys

scam users (both consumers and businesses) into disclosing personal information. Government and financial institutions, as well as online auctions and their payment services, can be targets of voice phishing. A vishing scheme is generally transmitted as an incoming recorded telephone message that uses a spoofed (fraudulent) caller ID matching the identity of a misrepresented organization. The message uses an urgent pretext to direct unsuspecting users to another telephone number. The victim is invited to punch his personal information on his telephone keypad. The criminals capture the key tones and convert them back to numerical format.

Vishing

Contingent liabilities

are potential obligations that will materialize only if certain events occur in the future. A corporate guarantee of personal loans taken out by an officer or a private company controlled by an officer is an example of a contingent liability. Such a liability must be disclosed if it is material.

asset & liability accounts

are flipped in thinking for debits and credits in regards to increasing and decreasing

Accounting model

assests= liabilities + owners equity

balance sheet

assets are generally presented on the balance sheet in order of liquidity

Vertical analysis

is the expression of the relationship or percentage of component items to a specific base item on the income statement or balance sheet.

Historical cost

is the proper basis for recording a piece of equipment on a company's books.

debt to equity ratio

dividing total liabilities/ by total equity

three common methods for concealing liabilities and expenses on financial statements

failure to disclose warranty cost and liabilities, capitalized expenses, liability/expense omissions

Ditching

falsely reports a vehicle as stolen to cash in on an insurance policy

permit onto an organization's internal network based on factors such as origination or destination address, content of the message, protocol being used to transmit the message, and other filtering methods.

firewall

Crimeware

is the term used to describe malicious software used to simplify or automate online criminal activities.

statement of cash flows

is used in tandem with the income statemnt to determine a company's true financial performance

Forged endorsement

forges the endorsement on back to a 3rd party

Ratio analysis

is a means of measuring the relationship between any two different financial statement amounts. The relationship and comparison are the keys to any of these types of financial analyses.

Horizontal analysis

is a technique for analyzing the percentage change in individual financial statement items from one accounting period to the next.

Password cracking

is an automated process by which an attacker attempts to guess a system user's most likely passwords.

Financial statement fraud

is the deliberate misrepresentation of the financial condition of an enterprise accomplished through the intentional misstatement or omission of amounts or disclosures in the financial statements to deceive financial statement users.

Not ture about the statement of cash flows

shows the companies financial position at a specific point in time

The quick ratio

is used to assess a company's ability to meet sudden cash requirements. This ratio compares the most liquid assets to current liabilities by dividing the total of cash, securities, and receivables by current liabilities. The quick ratio is a conservative measurement of liquidity that is often used in turbulent economic times to provide an analyst with a worst-case scenario of a company's working capital situation.

Pay and return scheme

issues two payments asks one to be returned then cashes it for them selves

Electronic payment tampering is generally ............ difficult to detect than traditional check tampering schemes.

more

vertical analysis on an income statment what coponent is assigned 100%

net sales

A method for gaining unauthorized access to a computer system in which an attacker dupes a target into providing sensitive data by falsely claiming to be from an actual business, bank, ISP, or other entity with which the target does business

phishing?

Workers comp schemes

premium, agent, claimant,....

Timing difference financial statement fraud scheme

recording revenue in year 1 when payment is received, but serviced wont be performed until year 2

There are three principal types of billing schemes:

shell companies, nonaccomplice vendors, Personal purchases with company funds

The most common giveaway scam is known as............ A postcard arrives in the mail telling the receiver he has already won a prize. A new luxury vehicle tops the list, along with cash, jewelry, a living room set, and gift certificates. The odds of winning any of the prizes are astronomical. Victims are given trinkets or coupons redeemable only for the company's own shoddy merchandise.

the "1-in-5."

Asset turnover ratio

to determine the efficiency with which assets are used during the period. The asset turnover ratio is typically calculated by dividing net sales by average total assets (net sales / average total assets). However, average operating assets can also be used as the denominator (net sales / average operating assets).

off book sales always cause shrinkage

true

The caller is passed to a ............. who reads some vague words about the deal and records the person's agreement. These recordings are intentionally vague, leaving out the pitch and key details, essentially recording only the customer's consent. Verifiers also stall customers who call back to complain (heat calls), finding reasons why a little more patience will solve the problem, and in some cases, convincing the person to send a little more money to help the process along.

verifier,


Kaugnay na mga set ng pag-aaral

CCNA 3 Test Part 2 Multiple Answer

View Set

Intro to Health info-Ch.1 The Health Care Industry (Miyashita Yuu)

View Set