AIS Chapter 11
AIS Chapter 11
AIS Chapter 11
Computer
Crime, Fraud,
Ethics and
Privacy
Introduction
The connection between AISS and computer crime and fraud is
both straightforward and important. Managers, accountants, and investors
all use computerized information to control valuable resources, help sell
products, authenticate accounting transactions, and make investment
decisions.
2
Introduction
➢ Computer crime, fraud, and other irregularities that have occurred
in the past and that may also occur in the future.
3
3 REPUTABLE ORGANIZATIONS
3 REPUTABLE ORGANIZATIONS
- conduct surveys that help us understand the breadth and depth of these
crimes:
1. The Computer Security Institute (CSI) - conducts an annual survey to
help determine the scope of computer crime in the United States. The
respondents to this survey are computer security practitioners in U.S.
corporations, government agencies, financial institutions, medical
institutions, and universities.
2. KPMG - a global network of professional firms providing audit, tax, and
advisory services, conducts surveys on fraud and business integrity. Survey
4participants are the business professionals who work for one of the top
2,000 companies listed in Dun and Bradstreet.
3 REPUTABLE ORGANIZATIONS
The participants in this survey are its members, each of whom provides
detailed information on one occupational fraud case he or she had
personally investigated within the past two years.
5
3 REPUTABLE ORGANIZATIONS
The participants in this survey are its members, each of whom provides
detailed information on one occupational fraud case he or she had
personally investigated within the past two years.
6
COMPUTER CRIME vs. COMPUTER ABUSE vs. FRAUD
✓ AISS help control financial resources and thus are often the favored
targets of computer abusers and criminals.
✓ AISS are prized targets for disgruntled employees seeking to
compromise computer systems for revenge.
✓ Accountants are responsible for designing, selecting, or implementing
the control procedures that protect AISS.
✓ Both the government and the investing public rely on internal and
external auditors to vouch- safe the accuracy and completeness of the
financial statements of the corporations and government agencies they
audit.
8
The Importance of Computer Crime and Abuse to AISS
✓ Computer crime and abuse are also significant because of the large
proportion of firms that suffer million-dollar losses due to frauds,
computer viruses, unauthorized access, and denial-of-service attacks.
9
The Importance of Computer Crime and Abuse to AISS
The 2008 ACFE Report to the Nation estimates that the annual total losses
from occupational fraud are almost $1 trillion (not all of which is computer
based). The 2008 annual survey of the Computer Security Institute
estimates that the average cost to target organizations from a computer-
abuse incident is about $500,000-an amount whose financial impact can
range from "substantial" to "catastrophic" to the victim firm.
10
THREE EXAMPLES OF COMPUTER CRIMES
3. Denial of Service
▪ A number of computer viruses and computer worms have gained
media attention, but none have been as swift or as "deadly" as the
Slammer worm. In 2003, this computer worm nearly shut down the
Internet in less than 15 minutes. Internet service providers (ISPs) on the
east coast of the United States were the first to recognize the problem,
but the full impact of this computer worm quickly spread to other
countries.
▪ Denial-of-service (DOS) attacks take many forms, including (1)
computer viruses, (2) computer worms, or (3) distributed systems.
12
Denial-of-Service
▪ Trojan horse and logic bomb programs are termed "programs" rather
than "viruses" because they.
15
Denial-of-Service
This is why experts agree that computer security begins (or ends) with the
top management and security policies.
18
PREVENTING COMPUTER CRIME AND FRAUD
Without such policies, for example, organizations can only expect limited
employee:
(1) compliance with security procedures,
(2) sensitivity to potential problems,
(3) awareness of why computer abuse is important.
▪ Unfortunately, many top managers are not fully aware of the dangers
of computer crime, abuse, and fraud and therefore are not sufficiently
concerned about this type of offense.
▪ This is why security safeguards are effective only if top management
takes computer crime seriously and chooses to financially support and
19
enforce control procedures to stop, or at least minimize, computer
crimes.
PREVENTING COMPUTER CRIME AND FRAUD
24
QUIZ!
Let’s challenge our minds…
“
Your positive action combined with
positive thinking results in success
-Shiv Khera
26
27