Ais CH5
Ais CH5
Ais CH5
AIS THREAT
Natural and political disasters – as fires, floods, earthquakes, hurricanes, tornadoes, blizzards, wars, and attacks
by terrorists—can destroy an information system and cause many companies to fail
Software errors and equipment malfunctions - Software errors, operating system crashes, hardware failures,
power outages and fluctuations, and undetected data transmission errors
Unintentional acts - accidents or innocent errors
and omissions, is the greatest risk to information
systems
- caused by human carelessness, failure to
follow established procedures, and poorly
trained or supervised personnel.
intentional act - a computer crime, a fraud, or
sabotage
deliberate destruction or harm to a system.
sabotage - An intentional act where the intent is
to destroy a system or some of its components.
cookie - A text file created by a Web site and stored on a visitor’s hard drive. Cookies store information about who the
user is and what the user has done on the site
Fraud - Any and all means a person uses to gain an unfair advantage over another person.
Legally, for an act to be fraudulent there must be:
1. A false statement, representation, or disclosure
2. A material fact, which is something that induces a person to act
3. An intent to deceive
4. A justifiable reliance; that is, the person relies on the misrepresentation to take an action
5. An injury or loss suffered by the victim
corruption - Dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or
incompatible with ethical standards.
Examples include bribery and bid rigging
investment fraud - Misrepresenting or leaving out facts in order to promote an investment that promises fantastic
profits with little or no risk.
Examples: Ponzi schemes and securities fraud
The Treadway Commission recommended four actions to reduce fraudulent financial reporting:
1. Establish an organizational environment that contributes to the integrity of the financial reporting process.
2. Identify and understand the factors that lead to fraudulent financial reporting.
3. Assess the risk of fraudulent financial reporting within the company.
4. Design and implement internal controls to provide reasonable assurance of preventing fraudulent financial
reporting.
rationalization - The excuse that fraud perpetrators use to justify their illegal behavior.
Forms:
a justification (“I only took what they owed me”)
an attitude (“The rules do not apply to me”)
a lack of personal integrity (“Getting what I want is more
important than being honest”).
perpetrators rationalize that:
they are not being dishonest
that honesty is not required of them
they value what they take more than honesty and integrity
COMPUTER FRAUD
Computer fraud is any fraud that requires computer technology to perpetrate it.
Examples
Unauthorized theft, use, access, modification, copying, or destruction of software, hardware, or data
Theft of assets covered up by altering computer records
Obtaining information or tangible property illegally using computers