Tải bản đầy đủ (.ppt) (35 trang)

Core concepts of accounting information systems 13 by simkin norman chapter 03

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.05 MB, 35 trang )

Prepared by Paula Funkhouser
University of Nevada, Reno

Core Concepts of Accounting Information Systems, 13th Edition
Mark G. Simkin ● Jacob M. Rose ● Carolyn S. Norman

Computer Crime,
Fraud,
and Ethics
Chapter 3

1


Chapter 3: Computer Crime, Fraud,
and Ethics
• Introduction
• Computer Crime and Fraud
• Examples of Computer Crimes
• Preventing and Detecting Computer Crime and Fraud
• Ethical Issues, Privacy, and Identity Theft

2
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Computer Crime and Fraud
• High level of public interest
• Data on incidents is limited
• Sources of information
– Computer Security Institute (CSI) annual survey


– KPMG surveys
– Association of Certified Fraud Examiners (ACFE) survey

3
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Computer Crime and Fraud
• Computer Crime
– Criminal activity that involves computers
– Dishonestly obtain money, acquire property, or something of
value, or cause a loss
– Steal identities
– Harass an individual

4
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Computer Crime Examples

5
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Computer Crime and Fraud
• Fraudulent Financial Reporting
– Intentional falsification of accounting records
– Intend to mislead analysts, creditors, investors
• Misappropriation of Assets

– Misuse of company assets
– Committed by employees within an organization

6
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Asset Misappropriation Examples

7
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Federal Legislation of Computer
Crimes
• Computer Fraud and Abuse Act of 1986 (CFAA)
– Amended in 1994 and 1996
• Computer Fraud Definition
– An illegal act
– Computer technology essential for perpetration, investigation,
or prosecution

8
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


CFAA Fraudulent Acts
• Unauthorized theft, use, access, modification,
copying, or destruction of software or data
• Theft of money by altering computer records or

the theft of computer time
• Intent to illegally obtain information or tangible
property through the use of computers

9
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


CFAA Fraudulent Acts
• Use, or the conspiracy to use, computer
resources to commit a felony
• Theft, vandalism, destruction of computer
hardware
• Trafficking in passwords or other login
information for accessing a computer
• Extortion that uses a computer system as a
target
10
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Federal Legislation Affecting the
Use of Computers

11
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Federal Legislation Affecting the
Use of Computers


12
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


State Legislation
• Every state has a computer crime law
• State law provisions
– Define computer terms
– Define some acts as misdemeanors
– Declare other acts as felonies

13
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Computer Crime Statistics
• Limited availability of data
– Private companies handle abuse internally
– Most computer abuse is probably not discovered

• Growth of computer crime
– Exponential growth in use of computer resources
– Continuing lax security
– Availability of information about how to perpetrate
computer crimes
14
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.



Study Break #1
Which of the following pieces of computer legislation is probably
the most important?
A.
B.
C.
D.

Cyber Security Enhancement Act of 2002
Computer Security Act of 1987
The Computer Fraud and Abuse Act of 1986
Federal Privacy Act of 1974

15
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Study Break #2
Which legislation might help discourage computer hacking?
A.
B.
C.
D.

Federal Privacy Act of 1974
Computer Fraud and Abuse Act of 1986
USA Patriot act of 2001
CAN-SPAM Act of 2003

16

Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Examples of Cybercrime
• The TRW Credit Data Case
– Credit rating company
– Altered company credit ratings for a fee
– Clients relied on inaccurate information
• Analysis
– Data diddling – proprietary data
– Fair Credit Reporting Act – protection of consumer

17
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Computer Hacking
• Analysis
– Growth of hacking
• Cloud computing
• Wide area networks
– Encryption protection
– Utilize ethical hackers for intrusion and penetration
testing

18
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Computer Hacking

Slammer worm
– Identified weakness in Microsoft SQL Server 2000
software

• Denial of Service (DOS)
– Malware
– Computer worms
– Boot-sector viruses
– Trojan horse programs
– Logic bombs
19
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Protecting Systems
• Preventing Viruses
– Firewalls
– Antivirus software
– Antivirus control procedures

• Organizational Control Procedures
– Discourage free exchange of computer disks or external programs
– Require strong passwords to limit unauthorized access
– Use antivirus filters

20
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Preventing and Detecting

Cybercrime and Fraud
• Enlist Top-Management Support
• Increase Employee Awareness and Education
• Assess Security Policies and Protect Passwords
– Strong passwords
– Social engineering

21
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


10 Simple Steps to Safer PCs

22
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


10 Simple Steps to Safer PCs

23
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Preventing and Detecting
Cybercrime and Fraud
• Implement Controls
• Identify Computer Criminals
– Nontechnical Backgrounds
– Noncriminal Backgrounds
– Education


• Maintain Physical Security

24
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


Recognizing Symptoms of
Employee Fraud
• Accounting Irregularities
• Internal Control Weaknesses
• Unreasonable Anomalies
• Lifestyle Changes
• Behavioral Changes
25
Copyright © 2015. John Wiley & Sons, Inc. All rights reserved.


×