Chapter 5
Chapter 5
FRAUD
FORMS OF FRAUD
1. Misappropriation of assets
“…intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements”
(The Treadway Commission).
1. Establish environment which supports the integrity of the financial reporting process.
SAS #99
1. Understand fraud
2. Obtain information
- See Chapter 3
A. Pressure
Types:
1. Employee
-Financial
-Emotional
-Lifestyle
2. Financial
- Industry conditions
- Management characteristics
B. Opportunity
-Lapping
-Kiting
1. Justification
2. Attitude
Computer Fraud
a. Perpetration
b. Investigation
c. Prosecution
2. Many go undetected
1. Input Fraud
2. Processor Fraud
- Modifying software, illegal copying of software, using software in an unauthorized manner, creating software to undergo
unauthorized activities
4. Data Fraud
5. Output Fraud
2. Social Engineering
3. Malware
1. Botnet—Robot Network
Zombie—hijacked computer
- Constant stream of requests made to a Web-server (usually via a Botnet) that overwhelms and shuts down service
3. Spoofing
- Making an electronic communication look as if it comes from a trusted official source to lure the recipient into providing
information
Types of Spoofing
1. E-mail
2. Caller-ID
3. IP address
- Forged IP address to conceal identity of sender of data over the Internet or to impersonate another computer system
- Allows a computer on a LAN to intercept traffic meant for any other computer on the LAN
5. SMS
- Incorrect number or name appears, similar to caller-ID but for text messaging
6. Web page
7. DNS
- Intercepting a request for a Web service and sending the request to a false service
Hacking Attacks
1. Cross-Site Scripting (XSS)
- Unwanted code is sent via dynamic Web pages disguised as user input.
2. Buffer Overflow
- Data is sent that exceeds computer capacity causing program instructions to be lost and replaced with attacker
instructions.
4. Man-in-the-Middle
1. Password Cracking
2. War Dialing
Computer
3. Phreaking
4. Data Diddling
5. Data Leakage
1. Salami Technique
2. Economic Espionage
3. Cyber-Bullying
- Internet, cell phones, or other communication technologies to support deliberate, repeated, and hostile behavior that
torments, threatens, harasses, humiliates, embarrasses, or otherwise harms another person.
4. Internet Terrorism
5. Internet Misinformation
6. Internet Auction
- Using an Internet auction site to defraud another person
7. Internet Pump-and-Dump
- Using the Internet to pump up the price of a stock and then selling it.
1. Identity Theft
2. Pretexting
- Inventing a scenario that will lull someone into divulging sensitive information
3. Posing
4. Phishing
- Posing as a legitimate company asking for verification type information: passwords, accounts, usernames
5. Pharming
6. Typesquatting
- Typographical errors when entering a Web site name cause an invalid site to be accessed
7. Tabnapping
8. Scavenging
9. Shoulder Surfing
1. Lebanese Loping
2. Skimming
3. Chipping
4. Eavesdropping
- Listening to private communications
Type of Malware
1. Spyware
- Secretly monitors and collects personal information about users and sends it to someone else
• Adware
- Pops banner ads on a monitor, collects information about the user’s Web-surfing, and spending habits, and forward it to
the adware creator
2. Key logging
- Records computer activity, such as a user’s keystrokes, e-mails sent and received, Web sites visited, and chat session
participation
3. Trojan Horse
- Idle until triggered by a specified date or time, by a change in the system, by a message sent to the system, or by an
event that does not occur
More Malware
- A way into a system that bypasses normal authorization and authentication controls
2. Packet Sniffers
• Rootkit
- Used to hide the presence of trap doors, sniffers, and key loggers; conceal software that originates a denial-of-service or
an e-mail spam attack; and access user names and log-in information
3. Superzapping
- Unauthorized use of special system programs to bypass regular system controls and perform illegal acts, all without
leaving an audit trail