Chapter 6 Handout
Chapter 6 Handout
CHAPTER 6
Handout
Computer Fraud and Abuse
Unintentional Acts
• Include
– Accidents caused by:
• Human carelessness
• Failure to follow established procedures
• Poorly trained or supervised personnel
– Innocent errors or omissions
– Lost, destroyed, or misplaced data
– Logic errors
– Systems that do not meet needs or are incapable of performing intended
tasks
• Information Systems Security Assn. estimates 65% of security problems are
caused by human error.
Intentional Acts
• Include:
– Sabotage
– Computer fraud
– Misrepresentation, false use, or unauthorized disclosure of data
– Misappropriation of assets
– Financial statement fraud
• Information systems are increasingly vulnerable to these malicious attacks.
Fraud is any and all means a person uses to gain an unfair advantage over another
person.
Fraudulent acts include:
Lies/false statement uttered with an intention to deceive
Suppressions of the truth
Tricks and cunning
Violation of trust and confidence
And suffers injury or loss as a result
White-collar criminals
– Fraud perpetrators are often referred to as white-collar criminals.
– The term is used to distinguish them from violent criminals.
Types of Fraud
• Occupational Fraud (Employee Fraud)
Asset Misappropriation
• Theft of Cash
• Fraudulent disbursements
• Theft of inventory and other assets
Corruption
• Bribery
• Illegal gratuities
• Economic extortion
• Conflict of interest
Fraudulent Statements
• Financial
• Non-financial
• Other Types of Fraud
Intellectual Property Theft Consumer Fraud
Tax fraud Insurance Fraud
Financial institution fraud Securities Fraud
Money Laundering Bankruptcy Fraud
Check and Credit cards fraud Computer and Internet Fraud
• OPPORTUNITIES
Opportunity is the opening or gateway that allows an individual to:
– Commit the fraud
– Conceal the fraud
– Convert the proceeds
There are many opportunities that enable fraud. Some of the most common
are:
– Lack of internal controls
– Failure to enforce controls (the most prevalent reason)
– Excessive trust in key employees
– Incompetent supervisory personnel
– Inattention to details
– Inadequate staff
Internal controls that may be lacking or un-enforced include:
– Authorization procedures
– Clear lines of authority
– Adequate supervision
– Adequate documents and records
– A system to safeguard assets
– Independent checks on performance
– Separation of duties
One control feature that many companies lack is a background check on all
potential employees.
Management may allow fraud by:
– Not getting involved in the design or enforcement of internal controls;
– Inattention or carelessness;
– Overriding controls; and/or
– Using their power to compel subordinates to carry out the fraud.
• INTEGRITY/ETHICS/RATIONALIZATION
It is important to understand that fraudsters do not regard themselves as
unprincipled.
• In general, they regard themselves as highly principled individuals.
• That view of themselves is important to them.
• The only way they can commit their frauds and maintain their self
image as principled individuals is to create rationalizations that recast
their actions as “morally acceptable” behaviors.
These rationalizations take many forms, including:
• I was just borrowing the money.
• It wasn’t really hurting anyone. (Corporations are often seen as non-
persons; therefore crimes against them are not hurting “anyone.”)
• Everybody does it.
• I’ve worked for them for 35 years and been underpaid all that time. I
wasn’t stealing; I was only taking what was owed to me.
• I didn’t take it for myself. I needed it to pay my child’s medical bills.
• CONCLUSION
• Fraud occurs when:
People have perceived, non-shareable pressures;
The opportunity gateway is left open; and
They can rationalize their actions to reduce the moral impact in their minds
(i.e., they have low integrity).
• Fraud is much less likely to occur when
There is low pressure, low opportunity, and high integrity.
COMPUTER FRAUD
Computer fraud is defined as any illegal act for which knowledge of computer
technology is essential for its perpetration, investigation and/or prosecution.
• Computer fraud includes the following:
– Unauthorized theft, use, access, modification, copying, and destruction of
software or data.
– Theft of money by altering computer records.
– Theft of computer time.
– Theft or destruction of computer hardware.
– Use or the conspiracy to use computer resources to commit a felony.
– Intent to illegally obtain information or tangible property through the use of
computers.
• In using a computer, fraud perpetrators can steal:
– More of something
– In less time
– With less effort
• They may also leave very little evidence, which can make these crimes more
difficult to detect.
• Computer systems are particularly vulnerable to computer crimes for several
reasons:
– Company databases can be huge and access privileges can be difficult to
create and enforce. Consequently, individuals can steal, destroy, or alter
massive amounts of data in very little time.
– Organizations often want employees, customers, suppliers, and others to
have access to their system from inside the organization and without. This
access also creates vulnerability.
– Computer programs only need to be altered once, and they will operate that
way until:
• The system is no longer in use; or
• Someone notices.
– Modern systems are accessed by PCs, which are inherently more
vulnerable to security risks and difficult to control.
• It is hard to control physical access to each PC.
• PCs are portable, and if they are stolen, the data and access
capabilities go with them.
• PCs tend to be located in user departments, where one person may
perform multiple functions that should be segregated.
• PC users tend to be more oblivious to security concerns.
– Computer systems face a number of unique challenges:
• Reliability (accuracy and completeness)
• Equipment failure
• Environmental dependency (power, water damage, fire)
• Vulnerability to electromagnetic interference and interruption
• Eavesdropping
• Misrouting
• Organizations that track computer fraud estimate that most U.S. businesses have
been victimized by at least one incident of computer fraud.
• These frauds cost billions of dollars each year, and their frequency is increasing
because:
– Not everyone agrees on what constitutes computer fraud.
• Many don’t believe that taking an unlicensed copy of software is
computer fraud. (It is and can result in prosecution.)
• Some don’t think it’s a crime to browse through someone else’s
computer if their intentions aren’t malicious.
– Many computer frauds go undetected.
– An estimated 80-90% of frauds that are uncovered are not reported because
of fear of:
• Adverse publicity
• Copycats
• Loss of customer confidence.
– There are a growing number of competent computer users, and they are
aided by easier access to remote computers through the Internet and other
data networks.
– Some folks believe “it can’t happen to us.”
– Many networks have a low level of security.
– Instructions on how to perpetrate computer crimes and abuses are readily
available on the Internet.
– Law enforcement is unable to keep up with the growing number of frauds.
– The total dollar value of losses is difficult to calculate.
• Economic espionage, the theft of information and intellectual property, is growing
especially fast.
• This growth has led to the need for investigative specialists or cybersleuths.
Computer Fraud and Abuse Techniques – Check the other file for an updated list.
DETER AND DETECT
• Organizations must take every precaution to protect their information systems.
• Certain measures can significantly decrease the potential for fraud and any
resulting losses.
• These measures include:
– Make fraud less likely to occur
• Create a culture that stresses integrity and commitment to ethical
values and competence.
• Adopt an organizational structure, management philosophy,
operating style, and appetite for risk that minimizes the likelihood of
fraud.
• Require oversight from an active, involved, and independent audit
committee.
• Assign authority and responsibility for business objectives to specific
departments and individuals, encourage initiative in solving problems,
and hold them accountable for achieving those objectives.
• Identify the events that lead to increased fraud risk, and take steps to
prevent, avoid, share, or accept that risk.
• Develop a comprehensive set of security policies to guide the design
and implementation of specific control procedures, and communicate
them effectively to company employees.
• Implement human resource policies for hiring, compensating,
evaluating, counseling, promoting, and discharging employees that
send messages about the required level of ethical behavior and
integrity.
• Effectively supervise employees, including monitoring their
performance and correcting their errors.
• Train employees in integrity and ethical considerations, as well as
security and fraud prevention measures.
• Require annual employee vacations, periodically rotate duties of key
employees, and require signed confidentiality agreements.
• Implement formal and rigorous project development and acquisition
controls, as well as change management controls.
• Increase the penalty for committing fraud by prosecuting fraud
perpetrators more vigorously.
– Increase the difficulty of committing fraud
• Develop a strong system of internal controls
• Segregate the accounting functions of:
• Authorization
• Recording
• Custody
• Implement a program segregation of duties between systems
functions
• Restrict physical and remote access to system resources to
authorized personnel
• Require transactions and activities to be authorized by appropriate
supervisory personnel. Have the system authenticate the person and
their right to perform the transaction before allowing the transaction to
take place.
• Use properly designed documents and records to capture and
process transactions.
• Safeguard all assets, records, and data.
• Require independent checks on performance, such as reconciliation
of two independent sets of records, where possible and appropriate.
• Implement computer-based controls over data input, computer
processing, data storage, data transmission, and information output.
• Encrypt stored and transmitted data and programs to protect them
from unauthorized access and use.
• Fix known software vulnerabilities by installing the latest updates to
operating systems, security, and applications programs.
– Improve detection methods
• Create an audit trail so individual transactions can be traced through
the system to the financial statements and vice versa.
• Conduct periodic external and internal audits, as well as special
network security audits.
• Install fraud detection software.
• Implement a fraud hotline
• Employ a computer security officer, as well as computer consultants
and forensic specialists as needed.
• Monitor system activities, including computer and network security
efforts, usage and error logs, and all malicious actions.
• Use intrusion detection systems to help automate the monitoring
process.
– Reduce fraud losses
• Maintain adequate insurance.
• Develop comprehensive fraud contingency, disaster recovery, and
business continuity plans.
• Store backup copies of program and data files in a secure, off-site
location.
• Use software to monitor system activity and recover from fraud.