FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud in E-Commerce Chapter 17.

Slides:



Advertisements
Similar presentations
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Advertisements

1 MIS 2000 Class 22 System Security Update: Winter 2015.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
PKI and . Considerations Behind Firewall System Security On the Internet –Simple Mail Transfer Protocol (SMTP)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FORENSIC ACCOUNTING - BA124 - Fall 2007Slide 17-1 Today’s Topics n E-Commerce Fraud n E-Commerce Fraud Risks n E-Commerce Fraud Prevention n Shenanigan.
FORENSIC ACCOUNTING - BA Slide 17-1 Today’s Topics n E-Commerce Fraud n E-Commerce Fraud Risks n E-Commerce Fraud Prevention.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Today’s Strategic Imperative: E-Business Jeremy Malley BSAD – 145 Ch February 2002.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
1 Hackers 101 Julie Keil JoAna Swan John Adamo John Ponessa Arturo Jose` Ortiz.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Securing Information Systems
Electronic Payment Systems
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Internet Security for Small & Medium Business Week 6
FORENSIC ACCOUNTING - BA Today’s Topics n E-Commerce Fraud n Cash Flow Shenanigans n Metrics Shenanigans.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Dimensions of E – Commerce Security
Types of Electronic Infection
1.The Nature, Impact and Issues of Information Technology 1.6Strategies used to Prevent Deliberate and Accidental Illegal Actions.
Fraud Examination, 3E Chapter 17: Fraud in E-Commerce COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Other Types of Fraud FRAUD EXAMINATION ALBRECHT & ALBRECHT Fraud in E-Commerce Chapter 15.
Unit 9: Electronic Fraud Professor Thomas Genovese.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
E-Fraud: Motives, Techniques, and Research Agenda Presentation at the Second Student Conference of Research in Business April 2008, HEC Montreal Muhammad.
Securing Information Systems
IT Security  .
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
BY GAWARE S.R. DEPT.OF COMP.SCI
Securing Information Systems
FRAUD EXAMINATION ALBRECHT & ALBRECHT
Digital Signatures and Forms
Chapter 5 Electronic Commerce | Security
FRAUD EXAMINATION ALBRECHT & ALBRECHT
The E-Commerce Act and the Right to Privacy
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud in E-Commerce Chapter 17

Learning Objectives 1.Understand e- commerce fraud risk. 2.Take measures to prevent fraud in e-commerce. 3.Detect e- business fraud.

Discuss Internet Statistics. Number of People Using Internet Internet Usage Doubles Every 100 Days Value of Internet Transactions In Million $ Years to Reach 60 Million People RadioTVInternet 0 200,000, ,000, ,000, ,000,000 1,000,000,

Review the Fraud Triangle.

Discuss Fraud Risks of E- Commerce – Pressure.

Discuss Fraud Risks of E- Commerce – Opportunities.

Discuss Fraud Risks of E- Commerce - Rationalization

What is the Best Way to Prevent E – Fraud?

List & Comment on Internal Control Components.

What Are Three Common Authorization Controls?

Discuss Topics in Risk Assessment

What Control Activities Can be Used to Prevent E – fraud? Highlight the Most Significant.

What Should be Done to Discover Management Fraud in E - Commerce?

What Should Fraud Examiners Endeavor to do in an Examination?

What is One Thing That Should be Done with E – Businesses?

Terms Match Using unique human body features to secure controls Stealing data or personal information A signature sent over the internet Exchanging business information & transactions in electronic paperless form Biometrics Data Theft Digital Signatures & Certificates E-Business

Terms Match Pretending to be someone else Illegal or unauthorized viewing of information passed along a network Changing information in an e- mail header or IP address to hide identity Mimicking another web site to trick or confuse or e- business users Falsified Identity Sniffing Spoofing Hijacking