Podcast
Questions and Answers
What are the key steps auditors must take according to SAS-99?
What are the key steps auditors must take according to SAS-99?
What is a significant difference between white-collar criminals and violent criminals?
What is a significant difference between white-collar criminals and violent criminals?
What is the main focus of the content provided?
What is the main focus of the content provided?
Which of the following is NOT considered a type of fraud?
Which of the following is NOT considered a type of fraud?
Signup and view all the answers
What is SAS-99's focus on technology?
What is SAS-99's focus on technology?
Signup and view all the answers
Which of the following is a key characteristic of perpetrators of computer fraud?
Which of the following is a key characteristic of perpetrators of computer fraud?
Signup and view all the answers
What is a common characteristic of white-collar criminals?
What is a common characteristic of white-collar criminals?
Signup and view all the answers
Why is it important to document audit work according to SAS-99?
Why is it important to document audit work according to SAS-99?
Signup and view all the answers
Which of the following is NOT a common pressure leading to fraud as stated in the passage?
Which of the following is NOT a common pressure leading to fraud as stated in the passage?
Signup and view all the answers
According to the passage, how does a person's perception of pressure affect their likelihood of committing fraud?
According to the passage, how does a person's perception of pressure affect their likelihood of committing fraud?
Signup and view all the answers
What is a key difference between financial statement fraud and other types of fraud, as described in the passage?
What is a key difference between financial statement fraud and other types of fraud, as described in the passage?
Signup and view all the answers
Which of the following is NOT mentioned as a common pressure in financial statement fraud?
Which of the following is NOT mentioned as a common pressure in financial statement fraud?
Signup and view all the answers
How does a person's actual financial situation relate to their propensity to commit fraud, according to the passage?
How does a person's actual financial situation relate to their propensity to commit fraud, according to the passage?
Signup and view all the answers
What action might a company's management take to prop up their company's earnings?
What action might a company's management take to prop up their company's earnings?
Signup and view all the answers
Which of the following BEST describes the passage's main focus?
Which of the following BEST describes the passage's main focus?
Signup and view all the answers
According to the passage, what is the main focus of financial statement fraud?
According to the passage, what is the main focus of financial statement fraud?
Signup and view all the answers
What is a logic time bomb?
What is a logic time bomb?
Signup and view all the answers
Which of these is NOT a technique used for committing computer fraud and abuse?
Which of these is NOT a technique used for committing computer fraud and abuse?
Signup and view all the answers
What is the primary objective of 'data diddling' in computer fraud?
What is the primary objective of 'data diddling' in computer fraud?
Signup and view all the answers
How does a packet sniffer work?
How does a packet sniffer work?
Signup and view all the answers
What is the main aim of internet terrorism?
What is the main aim of internet terrorism?
Signup and view all the answers
What is a common outcome of 'denial-of-service attacks'?
What is a common outcome of 'denial-of-service attacks'?
Signup and view all the answers
How can someone commit masquerading or impersonation?
How can someone commit masquerading or impersonation?
Signup and view all the answers
Which of the following techniques is NOT directly related to the theft of sensitive information?
Which of the following techniques is NOT directly related to the theft of sensitive information?
Signup and view all the answers
What is the most accurate description of 'hacking' in the context of computer fraud?
What is the most accurate description of 'hacking' in the context of computer fraud?
Signup and view all the answers
What is an example of internet misinformation?
What is an example of internet misinformation?
Signup and view all the answers
What is the main purpose of 'email forgery' (also known as 'spoofing')?
What is the main purpose of 'email forgery' (also known as 'spoofing')?
Signup and view all the answers
How can password cracking be used to gain access to a system?
How can password cracking be used to gain access to a system?
Signup and view all the answers
How does 'phreaking' typically involve the use of phone lines?
How does 'phreaking' typically involve the use of phone lines?
Signup and view all the answers
What is the most common type of internet terrorism?
What is the most common type of internet terrorism?
Signup and view all the answers
Which of the following is NOT a typical financial gain for criminals who engage in identity theft?
Which of the following is NOT a typical financial gain for criminals who engage in identity theft?
Signup and view all the answers
What is the primary difference between 'data leakage' and 'data diddling'?
What is the primary difference between 'data leakage' and 'data diddling'?
Signup and view all the answers
What is a significant difference between a virus and a worm?
What is a significant difference between a virus and a worm?
Signup and view all the answers
Why is it important to apply software patches as soon as possible?
Why is it important to apply software patches as soon as possible?
Signup and view all the answers
How can a worm reproduce and spread?
How can a worm reproduce and spread?
Signup and view all the answers
What is a concern with 'low-tech, do-it-yourself' attacks?
What is a concern with 'low-tech, do-it-yourself' attacks?
Signup and view all the answers
Which of the following is NOT a device that is vulnerable to a virus attack?
Which of the following is NOT a device that is vulnerable to a virus attack?
Signup and view all the answers
What is a phishing scam?
What is a phishing scam?
Signup and view all the answers
Which of these is NOT a technique commonly used to commit computer fraud and abuse?
Which of these is NOT a technique commonly used to commit computer fraud and abuse?
Signup and view all the answers
How can you protect yourself from phishing scams?
How can you protect yourself from phishing scams?
Signup and view all the answers
What effect does a script downloaded through a phishing email have on a user's web browser?
What effect does a script downloaded through a phishing email have on a user's web browser?
Signup and view all the answers
Why is it recommended to type "https:" in the URL instead of "http:" when accessing PayPal?
Why is it recommended to type "https:" in the URL instead of "http:" when accessing PayPal?
Signup and view all the answers
What is the significance of the South American bank phishing scam mentioned in the text?
What is the significance of the South American bank phishing scam mentioned in the text?
Signup and view all the answers
What is the purpose of a logic bomb?
What is the purpose of a logic bomb?
Signup and view all the answers
How can you mitigate the risk of falling victim to impersonation or masquerading online?
How can you mitigate the risk of falling victim to impersonation or masquerading online?
Signup and view all the answers
Flashcards
SAS-99 Requirements
SAS-99 Requirements
SAS-99 mandates auditors to understand fraud and its risks, gather information, assess risks, communicate findings, and document their work.
Fraud Process
Fraud Process
The series of steps involved in fraud detection and prevention, including understanding, assessment, and communication of risks.
Technology in SAS-99
Technology in SAS-99
SAS-99 incorporates technology to address fraud risks and encourages auditors to use tech tools in audits.
Types of Fraud
Types of Fraud
Signup and view all the flashcards
White-Collar Criminals
White-Collar Criminals
Signup and view all the flashcards
Young Perpetrators
Young Perpetrators
Signup and view all the flashcards
Auditor Documentation
Auditor Documentation
Signup and view all the flashcards
Psychological Characteristics
Psychological Characteristics
Signup and view all the flashcards
Common pressures for fraud
Common pressures for fraud
Signup and view all the flashcards
Perception of pressure
Perception of pressure
Signup and view all the flashcards
Propensity to commit fraud
Propensity to commit fraud
Signup and view all the flashcards
Financial statement fraud
Financial statement fraud
Signup and view all the flashcards
Management incentives
Management incentives
Signup and view all the flashcards
Covering cash flow issues
Covering cash flow issues
Signup and view all the flashcards
Bond covenants compliance
Bond covenants compliance
Signup and view all the flashcards
Income-tax motivations
Income-tax motivations
Signup and view all the flashcards
Data Diddling
Data Diddling
Signup and view all the flashcards
Data Leakage
Data Leakage
Signup and view all the flashcards
Denial of Service Attacks
Denial of Service Attacks
Signup and view all the flashcards
Eavesdropping
Eavesdropping
Signup and view all the flashcards
Email Spoofing
Email Spoofing
Signup and view all the flashcards
Phreaking
Phreaking
Signup and view all the flashcards
Hacking
Hacking
Signup and view all the flashcards
Identity Theft
Identity Theft
Signup and view all the flashcards
Internet Misinformation
Internet Misinformation
Signup and view all the flashcards
Internet Terrorism
Internet Terrorism
Signup and view all the flashcards
Logic Bomb
Logic Bomb
Signup and view all the flashcards
Masquerading
Masquerading
Signup and view all the flashcards
Packet Sniffer
Packet Sniffer
Signup and view all the flashcards
Password Cracking
Password Cracking
Signup and view all the flashcards
Viruses and Worms
Viruses and Worms
Signup and view all the flashcards
Computer Fraud
Computer Fraud
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Virus vs. Worm
Virus vs. Worm
Signup and view all the flashcards
Email virus warning
Email virus warning
Signup and view all the flashcards
Software patches
Software patches
Signup and view all the flashcards
Logic Time Bombs
Logic Time Bombs
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Secure Website Protocol
Secure Website Protocol
Signup and view all the flashcards
Study Notes
Computer Fraud and Security
- This chapter addresses fraud, who perpetrates it, and its computer forms.
- It discusses the fraud process, reasons for fraud, computer fraud approaches, and methods companies use to prevent and detect fraud.
- Information systems are becoming increasingly complex, and society relies more on them.
- Companies face a growing risk of these systems being compromised, with recent surveys indicating that 67% of companies suffered a security breach in the last year, and nearly 60% reported financial losses.
Introduction
- Questions to be addressed include: What is fraud, how are frauds perpetrated, who perpetrates fraud and why, what is computer fraud and what forms it takes, and what approaches and techniques are used to commit computer fraud?
- Companies face threats from natural and political disasters, software errors/equipment malfunction, and intentional acts (computer crime).
Natural and Political Disasters
- Includes fire, excessive heat, floods, earthquakes, and high winds.
- War and terrorist attacks can affect many companies simultaneously (e.g., the World Trade Center bombing).
- The Defense Science Board predicts widespread attacks on information systems by foreign nations, espionage agents, and terrorists.
Software Errors and Equipment Malfunction
- Includes hardware or software failures, software errors/bugs, operating system crashes, power outages/fluctuations, and undetected data transmission errors.
- Annual economic losses due to software bugs are estimated at $60 billion.
- Almost 60% of companies studied experienced significant software errors in the previous year.
Unintentional Acts
- Accidents caused by human carelessness, failure to follow procedures, inadequately trained personnel, innocent errors/omissions, lost/destroyed/misplaced data, logic errors, and systems not meeting needs or performing intended tasks.
- Information Systems Security Association estimates 65% of security problems are caused by human error.
Intentional Acts (Computer Crime)
- Includes sabotage, which encompasses computer fraud (misrepresentation, false use, unauthorized disclosure of data), misappropriation of assets, and financial statement fraud.
- Information systems are increasingly vulnerable to these malicious attacks.
The Fraud Process
- Fraud is any means a person uses to gain an unfair advantage over another person.
- Fraudulent acts typically involve a false statement (oral or written) about a material fact, knowledge that the statement was false when made (intent to deceive), the victim relying on the statement, and the victim suffering injury/loss.
- The burden of proof differs between criminal and civil cases, with criminal cases requiring "beyond a reasonable doubt" and civil cases requiring "preponderance of the evidence."
- ACFE estimates total fraud losses in the US at approximately $660 billion in 2004, exceeding spending on education and roads and the criminal justice system.
- Income tax fraud estimates are over $200 billion annually, and healthcare fraud exceeds $100 billion annually.
- Fraud against companies can be committed by an employee (knowledgeable insider) or an external party, and insiders are often more successful.
- Fraud perpetrators are often referred to as white-collar criminals, although some white-collar crimes have violent outcomes (e.g., suicide, patient deaths).
- Types of occupational fraud include misappropriation of assets (theft/embezzlement), corruption (wrongful use of position for personal benefit), and fraudulent statements (misstating financial condition).
Fraud Perpetration
- Typical elements include gaining trust, using deceit/misinformation, starting with need and escalating to greed, becoming careless/overconfident, spending stolen money, and detecting theft. The absence of internal controls is a significant factor.
- The Treadway Commission defined fraudulent financial reporting as intentional or reckless conduct resulting in materially misleading financial statements.
- This can involve deceiving investors and creditors, inflating stock prices, or hiding losses/problems.
- Enron fraud led to the demise of Arthur Andersen, a premier international accounting firm, highlighting the concern for undetected frauds for independent auditors and resulting lawsuits.
Common Approaches to “Cooking the Books”
- Fictitious revenues, premature revenue recognition, recording expenses in later periods, overstating inventories/fixed assets (like WorldCom), and concealing losses/liabilities.
Treadway Commission Recommendations
- Establish organizational environments that promote financial reporting integrity.
- Identify and understand factors related to fraudulent financial reporting risk.
- Assess risk of fraudulent financial reporting within the company.
- Design and implement internal controls to prevent fraudulent financial reporting.
PSA 20
- The primary responsibility for fraud prevention and detection falls on those responsible for the entity's governance and its management.
Understand Fraud
- Auditors need to understand fraud to effectively audit, specifically to know that they are not lawyers. Their concern should focus on acts that create a material misstatement in the financial statements.
Discuss the Risks of Material Fraudulent Misstatements
- Audit team members should discuss areas of the company's financial statements that are susceptible to fraud.
Obtain Information
- Fraud risk factors must be identified, and company records tested. Management, the audit committee, and others should be asked if there is existing or prior fraud, or fraud risks. Revenue accounts are scrutinized, as they are popular targets.
Identify, Assess, and Respond to Risks
- Assess the risk of fraud throughout the audit. Determine any identified misstatements that indicate fraud, the impact on financial statements, and the impact on the audit itself.
Communicate Findings
- Auditors communicate fraud findings to management, the audit committee, and others.
Document Their Audit Work
- Auditors must document their compliance with SAS-99 requirements.
Incorporate a Technology Focus
- Technology impacts fraud risks, and auditors should leverage technology-oriented tools for fraud auditing.
Why Fraud Occurs
- Fraud occurs when there are perceived non-shareable pressures, the opportunity for fraud is open, and the individual can rationalize their actions. Fraud will be less common when pressures are low, opportunities are limited, and integrity is high.
Who Commits Fraud and Why
- Research indicates white-collar criminals exhibit similar demographic characteristics to the general public, differing primarily in psychological makeup from violent criminals, showing few similarities to the general public, and perpetrators of computer fraud often are younger, with more computer skills, knowledge, and experience.
- Rationalizations can include viewing fraud as a game, believing their actions do not have harmful impacts, wanting to gain stature within the hacking community, wanting to spread a rebellious message, or viewing gaining financially from the theft as valid motives. Difficulties in employer relations can create significant pressures.
- The perception of pressure plays a significant role, and three factors often present in fraud are stress or need (pressure), opportunity, and rationalization.
- Common pressures for financial statement fraud include supporting personal wealth, maintaining jobs, covering cash flow deficiencies, and complying with financial covenants.
Approaches to Computer Fraud
- The U.S. Department of Justice defines computer fraud as any illegal action requiring computer technology for perpetration, investigation, or prosecution. This includes unauthorized theft, use, access, modification, or destruction of software/data; theft of money by altering records; theft of computer time; theft or destruction of hardware; use of resources for a felony; intent to obtain property.
Computer Fraud Techniques
Common Techniques Include:
- Data diddling: Changing data before, during, or after entry.
- Data leakage: Unauthorized copying of data.
- Denial of service attacks: Overloading a system to shut it down.
- Eavesdropping: Intercepting communications.
- Email threats: Sending messages to induce actions.
- Email forgery (spoofing): Creating emails that appear to come from others.
- Hacking: Unauthorized access to systems.
- Phreaking: Utilizing phone systems for illicit activity.
- Hijacking: Gaining control of another's computer.
- Identity theft: Assuming someone's identity for financial gain.
- Shoulder surfing: Watching individuals enter information.
- Scavenging/dumpster diving: Searching for discarded documents.
- Redirecting mail: Intercepting and changing mail delivery.
- Internet misinformation: Spreading false information.
- Internet terrorism: Disrupting e-commerce and communications.
- Logic time bombs: Programs acting at a predetermined time.
- Masquerading/impersonation: Pretending to be an authorized user.
- Packet sniffers: Capturing data from network traffic.
- Password cracking: Accessing accounts with stolen passwords.
- Piggybacking: Unauthorized use of a legitimate user's log-in.
- Round-down technique: A fraudulent method of rounding down numbers.
- Salami technique: Repeatedly stealing small amounts of money.
- Social engineering: Tricking employees into revealing information.
- Software piracy: Copying software without permission.
- Spamming: Sending unsolicited messages.
- Spyware: Software that monitors computer usage without permission
- Superzapping: Unauthorized use of special system programs to bypass controls.
- Trap doors: Hidden ways into a system.
- War dialing: Checking for idle modems on phone lines.
- War driving: Driving around searching for unprotected wireless networks.
Preventing and Detecting Computer Fraud
- Organizations must take precautions to protect their systems.
- Creating a culture of ethical values; formal/rigorous controls; conducting periodic audits; installing fraud detection software; employing security officers/consultants; monitoring system activities; using intrusion detection systems; and maintaining adequate insurance/contingency plans are all part of preventing/detecting computer fraud.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz explores critical aspects of SAS-99, including the steps auditors must take, the nature of white-collar crime, and key characteristics of fraud perpetrators. It is essential for students of accounting and finance to understand these concepts as they prepare for real-world auditing scenarios.