Computer Fraud Pertemuan XVI Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.

Slides:



Advertisements
Similar presentations
Corporate Fraud Risk Assesment Pertemuan XXI Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Advertisements

Basic Fraud Audit Pertemuan X Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Basic Fraud Audit Pertemuan VIII Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
Copyright © Pearson Education Limited Computer Fraud and Abuse Techniques Chapter
Fraud Audit Pertemuan V Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Computer Fraud and Abuse Techniques
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Chapter 9: Privacy, Crime, and Security
Chapter 6 Computer Fraud and Abuse Techniques Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 6-1.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
Basic Fraud Audit Pertemuan IX Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Fraud Risk Assesment Pertemuan XIX Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Computer Fraud Pertemuan XVII Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Fraud Audit Pertemuan VI Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Forensic Accounting Pertemuan XI Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Background Pertemuan II Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Computer Fraud Pertemuan XVIII Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Background Pertemuan I Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Fraud Scheme Pertemuan IV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Copyright © 2015 Pearson Education, Inc. Computer Fraud and Abuse Techniques Chapter
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
Program Objective Security Basics
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Cyber crime & Security Prepared by : Rughani Zarana.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
7 Information Security.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Ingredients of Security
Fraud and Forensic Auditing Pertemuan 23-24
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
IT Security  .
CHAPTER 4 Information Security.
Cyber Crimes Chunlian QU 9/18/2018.
Prepared By : Binay Tiwari
Societal Issues in Computing (COMP466)
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Computer Fraud Pertemuan XVI Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007

Bina Nusantara Mahasiswa diharapkan dapat mengidentifikasi metode- metode kecurangan berbasis komputer Mahasiswa diharapkan mampu mengetahui pengendalian yang diperlukan untuk mengatasi kecurangan berbasis komputer Learning Outcomes 3

Bina Nusantara Computer fraud category Computer Fraud Theory Nature of Computer Fraud Type of Computer Fraud Internal Control for Computer Fraud Outline Materi 4

Characteristics of the Computer Environment Data are concentrated in one place The storage medium is vulnerable The audit trail may be obscure Visible records may be nonexistent Programs and Data can be altered leaving no trace of the alteration Tampering can be carried out almost instantly Network increase the risks Bina Nusantara

Characteristics of the Computer Environment (Con’t) Computer systems are not widely understood Security features are not always built in Internal control features may be inadequate Trusted Personnel may circumvent controls Bina Nusantara

Vulnerability in the Computer Crimes Almost all corporate data stored in the corporate database Internal and often external parties can access to the system Programs or Applications only need to be changed or modified without permission once Computer system face a number of unique challenges Bina Nusantara

Categorization of Threats to Computer Systems Theft, including theft of assets, data, and programs Manipulations, including the additions or deletions of information in data files or program Theft of computer time Bina Nusantara

Computer Fraud Classifications Processor fraud Data Fraud Output fraud Program fraud Input Fraud Bina Nusantara

Computer Fraud Techniques Adware Data diddling Data leakage Denial of Service Dictionary attack Eavesdropping forgery threats Hacking Hijacking Identity theft Internet misinformation Internet terrorism Key logger Logic time bomb Masquerading Packet Sniffing Bina Nusantara

Computer Fraud Techniques (Con’t) Password cracking Phishing Phreaking Piggybacking Round-down Salami techniques Scavenging / dumpster diving Shoulder surfing Social Engineering Software piracy Spamming Spyware Superzapping Trap door Trojan horse Virus War dialing Worm Bina Nusantara

Prevention Method Develop a strong internal control system Proper segregation duties Segregate the accounting functions of authorization, recording, and custody Restrict physical and remote access to authorized personnel Adequate supervisory control Use properly designed documents and records to capture and process transactions Safeguard all assets, records and data Bina Nusantara

Prevention Method (Con’t) Require independent checks on performance Implement computer based controls over input, process, storage, transmission, and output Encrypt stored and transmitted data and programs to protect them from unauthorized access and use Fix known software vulnerabilities Bina Nusantara