Chapter 11: Computer Crime, Fraud, Ethics, and Privacy

Slides:



Advertisements
Similar presentations
ACCOUNTING INFORMATION SYSTEMS
Advertisements

Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Financial Accounting, Sixth Edition
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Slide 1-1 Chapter 2 Principles of Accounting Analyzing Business Transactions.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 15 Computer Crime and Information Technology Security Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
© Copyright 2011 John Wiley & Sons, Inc.
ACCOUNTING INFORMATION SYSTEMS
MODERN AUDITING 7th Edition
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Chapter 101 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Lesson 19: Configuring Windows Firewall
Full Disclosure in Financial Reporting
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
Chapter 16 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Topics Beyond the Integrated Audit.
F- 1. F- 2 F PAYROLL ACCOUNTING Accounting, Fifth Edition.
Chapter 7 Computer Crime, Ethics, and Privacy
ACCT341, Chapter 11 Computer Crime, Ethics, and Privacy
Chapter 11 Security and Privacy: Computers and the Internet.
Introduction to Databases Chapter 1: Introducing Data and Data Management.
General Awareness Training
ACCOUNTING INFORMATION SYSTEMS
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Accounting Principles, Ninth Edition
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Chapter 2 Information Technology and AISs
John Wiley & Sons, Inc. © 2005 Chapter 2 The Recording Process Prepared by Naomi Karolinski Monroe Community College and and Marianne Bradford Bryant.
MODERN AUDITING 7th Edition Developed by: Gregory K. Lowry, MBA, CPA Saint Paul’s College John Wiley & Sons, Inc. William C. Boynton California Polytechnic.
Core Concepts of ACCOUNTING INFORMATION SYSTEMS Moscove, Simkin & Bagranoff John Wiley & Sons, Inc. Developed by: Marianne Bradford, Ph.D. Bryant College.
Financial Accounting A Decision-Making Approach, 2nd Edition King, Lembke, and Smith John Wiley & Sons, Inc. Prepared by Dr. Denise English, Boise State.
Chapter 9 Enhancing Information/Computer Security.
MODERN AUDITING 7th Edition Developed by: Gregory K. Lowry, MBA, CPA Saint Paul’s College John Wiley & Sons, Inc. William C. Boynton California Polytechnic.
MARKETING RESEARCH ESSENTIALS WITH DATA ANALYSIS IN EXCEL AND SPAA McDaniel │ Gates │ Sivaramakrishnan │ Main Chapter Three: Secondary Data Collection.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Chapter 16 Information and Operations Management 1e Management 1e - 2 Management 1e Learning Objectives  Explain how managers use controls.
Chapter 24-1 Full Disclosure: Concepts and Practices Chapter24 Intermediate Accounting 12th Edition Kieso, Weygandt, and Warfield Prepared by Coby Harmon,
Slide D 1. Slide D 2 Appendix D Payroll Accounting Financial Accounting, Seventh Edition.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 2-1 Chapter 2 Information Systems in Organizations Introduction to Information Systems Judith C. Simon.
Chapter 9: Introduction to Internal Control Systems
Cybercrime What is it, what does it cost, & how is it regulated?
CONTROLLING INFORMATION SYSTEMS
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
MIS323 – Business Telecommunications Chapter 10 Security.
I- 1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
H-1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Chapter 1-1. Chapter 1-2 Accounting in Action Accounting Principles, Ninth Edition.
Chapter 4 Using Financial Statements to Analyze Value Creation
Add video notes to lecture
Dinesh Mirchandani University of Missouri – St. Louis
Using Technology to Manage Information
1-1 Chapter 1 Charles P. Jones, Investments: Analysis and Management, Tenth Edition, John Wiley & Sons Prepared by G.D. Koppenhaver, Iowa State University.
Financial Accounting, IFRS Edition
Understanding Investments
MACROECONOMICS AND THE GLOBAL BUSINESS ENVIRONMENT
Presentation transcript:

Chapter 11: Computer Crime, Fraud, Ethics, and Privacy Introduction Computer Crime, Abuse, and Fraud Three Examples of Computer Crimes Preventing Computer Crime and Fraud Ethical Issues, Privacy, and Identity Theft

Computer Crime, Abuse, and Fraud High level of public interest Data on incidents is limited Sources of information Computer Security Institute (CSI) annual survey KPMG surveys Association of Certified Fraud Examiners (ACFE) survey

Computer Crime, Abuse, and Fraud Manipulation of a computer or computer data Dishonestly obtain money, acquire property, or something of value, or cause a loss Computer Abuse Unauthorized use of, or access to, a computer Against the wishes of the owner

Computer Crime Examples

Computer Crime, Abuse, and Fraud Fraudulent Financial Reporting Intentional falsification of accounting records Intend to mislead analysts, creditors, investors Misappropriation of Assets Misuse of company assets Committed by employees within an organization

Asset Misappropriation Examples

Federal Legislation of Computer Crimes Computer Fraud and Abuse Act of 1986 (CFAA) Amended in 1994 and 1996 Computer Fraud Definition An illegal act Computer technology essential for perpetration, investigation, or prosecution

CFAA Fraudulent Acts Unauthorized theft, use, access, modification, copying, or destruction of software or data Theft of money by altering computer records or the theft of computer time Intent to illegally obtain information or tangible property through the use of computers

CFAA Fraudulent Acts Use, or the conspiracy to use, computer resources to commit a felony Theft, vandalism, destruction of computer hardware Trafficking in passwords or other login information for accessing a computer Extortion that uses a computer system as a target

Federal Legislation Affecting the Use of Computers

Federal Legislation Affecting the Use of Computers

State Legislation Every state has a computer crime law State law provisions Define computer terms Define some acts as misdemeanors Declare other acts as felonies

Study Break #1 Which of the following pieces of computer legislation is probably the most important? Cyber Security Enhancement Act of 2002 Computer Security Act of 1987 The Computer Fraud and Abuse Act of 1986 Federal Privacy Act of 1974

Study Break #1 - Answer Which of the following pieces of computer legislation is probably the most important? Cyber Security Enhancement Act of 2002 Computer Security Act of 1987 The Computer Fraud and Abuse Act of 1986 Federal Privacy Act of 1974

Study Break #2 Which legislation might help discourage computer hacking? Federal Privacy Act of 1974 Computer Fraud and Abuse Act of 1986 USA Patriot act of 2001 CAN-SPAM Act of 2003

Study Break #2 - Answer Which legislation might help discourage computer hacking? Federal Privacy Act of 1974 Computer Fraud and Abuse Act of 1986 USA Patriot act of 2001 CAN-SPAM Act of 2003

Computer-Crime Statistics Limited availability of data Private companies handle abuse internally Most computer abuse is probably not discovered Growth of computer crime Exponential growth in use of computer resources Continuing lax security Availability of information about how to perpetrate computer crimes

Importance of Computer Crime and Abuse to AISs Impact on AISs Favored target due to control of financial resources Prized target for disgruntled employees Responsible for designing, selecting, and implementing controls that protect AISs Reliance on auditors to verify financial statement Additional Items Ability to mislead public if information is incomplete or inaccurate Difficulty in detecting fraudulent activities Large amount of losses

Compromising Valuable Information: The TRW Credit Data Case Summary Credit rating company Altered company credit ratings for a fee Clients relied on inaccurate information Analysis Data diddling – proprietary data Fair Credit Reporting Act – protection of consumer

Wire Fraud and Computer Hacking: Edwin Pena and Robert Moore Summary Voice over Internet Protocol (VoIP) Hacked into other provider’s network Billed those companies Analysis Growth of hacking Importance of education and prevention Utilize ethical hackers for instrusion testing

Denial of Service: The 2003 Internet Crash Summary Slammer worm Identified weakness in Microsoft SQL Server 2000 software Analysis Denial of Service (DOS) attacks Computer Viruses Computer Worms and Worm Programs Boot-sector Viruses and Trojan Horse Programs

Protecting Systems Preventing Viruses Firewalls Antivirus software Antivirus control procedures Organizational Control Procedures Discourage free exchange of computer disks or external programs Require strong passwords to limit unauthorized access Use antivirus filters

Common Types of Computer Crime and Abuse

Preventing Computer Crime and Fraud Enlist Top-Management Support Increase Employee Awareness and Education Assess Security Policies and Protect Passwords Strong passwords Social engineering Lock-out systems Dialback systems

10 Simple Steps to Safer PCs

10 Simple Steps to Safer PCs

Preventing Computer Crime and Fraud Implement Controls Identify Computer Criminals Nontechnical Backgrounds Noncriminal Backgrounds Education, Gender, and Age Don’t Forget Physical Security Employ Forensic Accountants

Occupations of Computer Abuse Offenders

Fraud Losses and Education Level of Perpetrator

Recognizing Symptoms of Employee Fraud Accounting Irregularities Internal Control Weaknesses Unreasonable Anomalies Lifestyle Changes Behavioral Changes

Study Break #3 Which of these is not helpful in attempting to thwart computer crime and abuse? Enlist the support of top management Keep employees in the dark so that they cannot perpetrate them Use strong passwords Design and test disaster recovery programs

Study Break #3 - Answer Which of these is not helpful in attempting to thwart computer crime and abuse? Enlist the support of top management Keep employees in the dark so that they cannot perpetrate them Use strong passwords Design and test disaster recovery programs

Study Break #4 Most computer criminals: Have nontechnical backgrounds Have noncriminal backgrounds Have little college education Are young and bright Have probably not been caught, so we don’t know much about them

Study Break #4 - Answer Most computer criminals: Have nontechnical backgrounds Have noncriminal backgrounds Have little college education Are young and bright Have probably not been caught, so we don’t know much about them

Ethical Issues, Privacy, and Identity Theft Ethics A set of moral principles or values Governs organizations and individuals Ethical behavior Making choices and judgments that are morally proper Acting accordingly

Ethical Issues, Privacy, and Identity Theft Ethical Issues and Professional Associations Codes of Ethics/Professional Conduct Certification programs and Ethics committees Meeting the Ethical Challenges Inform employees of importance of ethics Ethics training Lead by example Utilize reward system

Ethical Issues in Computer Usage

Ethical Issues, Privacy, and Identity Theft Company Policies with Respect to Privacy Who owns the computer and data stored on it? What purposes the computer may be used? What uses are authorized or prohibited? Identity Theft Dumpster diving Phishing Smishing

Identity Theft Methods

Study Break #5 Smishing is a form of: Dial-back system Local area network Computer worm Identity theft

Study Break #5 - Answer Smishing is a form of: Dial-back system Local area network Computer worm Identity theft

Copyright Copyright 2012 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

Chapter 11