Other Types of Fraud FRAUD EXAMINATION ALBRECHT & ALBRECHT Fraud in E-Commerce Chapter 15.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL 1 Preparing for & Maintaining PCI Compliance.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 1, Introduction to e-Business and e-Commerce Outline 1.1Introduction: Transitioning to the Web.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
PKI and . Considerations Behind Firewall System Security On the Internet –Simple Mail Transfer Protocol (SMTP)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FORENSIC ACCOUNTING - BA124 - Fall 2007Slide 17-1 Today’s Topics n E-Commerce Fraud n E-Commerce Fraud Risks n E-Commerce Fraud Prevention n Shenanigan.
FORENSIC ACCOUNTING - BA Slide 17-1 Today’s Topics n E-Commerce Fraud n E-Commerce Fraud Risks n E-Commerce Fraud Prevention.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
1 Hackers 101 Julie Keil JoAna Swan John Adamo John Ponessa Arturo Jose` Ortiz.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Securing Information Systems
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Internet Security for Small & Medium Business Week 6
FORENSIC ACCOUNTING - BA Today’s Topics n E-Commerce Fraud n Cash Flow Shenanigans n Metrics Shenanigans.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
1 Electronic Commerce Value Chains and Using the Web to Sell Products and Services.
Dimensions of E – Commerce Security
Types of Electronic Infection
Fraud Examination, 3E Chapter 17: Fraud in E-Commerce COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Unit 9: Electronic Fraud Professor Thomas Genovese.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
EXAM PREP WORKSHOP MANAGEMENT INFORMATION SYSTEMS.
CYBER BULLYING CODY KLARMAN. TYPES OF CYBER BULLYING Sending mean messages or threats to a person's account or cell phone Spreading rumors online.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Consumer Fraud Chapter 14.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
E-Fraud: Motives, Techniques, and Research Agenda Presentation at the Second Student Conference of Research in Business April 2008, HEC Montreal Muhammad.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Data and Computer Communications Chapter 21 – Network SecurityChapter 21 – Network Security.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud in E-Commerce Chapter 17.
IT Security  .
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Securing Information Systems
FRAUD EXAMINATION ALBRECHT & ALBRECHT
Digital Signatures and Forms
Chapter 5 Electronic Commerce | Security
FRAUD EXAMINATION ALBRECHT & ALBRECHT
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Other Types of Fraud FRAUD EXAMINATION ALBRECHT & ALBRECHT Fraud in E-Commerce Chapter 15

Other Types of Fraud Discuss Internet Statistics

Other Types of Fraud Review the Fraud Triangle

Other Types of Fraud Discuss Fraud Risks of E- Commerce - Pressure

Other Types of Fraud Discuss Fraud Risks of E- Commerce - Opportunities

Other Types of Fraud Discuss Fraud Risks of E- Commerce - Rationalization

Other Types of Fraud What is the best way to prevent E – Fraud?

Other Types of Fraud List & Comment on Internal Control Components

Other Types of Fraud Discuss Topics in Risk Assessment

Other Types of Fraud What control activities can be used to prevent E – fraud? Highlight Most Significant

Other Types of Fraud What should be done to discover management fraud in E - Commerce?

Other Types of Fraud What should fraud examiners endeavor to do in an examination?

Other Types of Fraud What is one thing that should be done with E – businesses?

Other Types of Fraud Terms Match Using unique human body features to secure controls Stealing data or personal information A signature sent over the internet Exchanging business information & transactions in electronic paperless form Biometrics Data Theft Digital Signatures & Certificates E-Business

Other Types of Fraud Terms Match Pretending to be someone else Illegal or unauthorized viewing of information passed along a network Changing information in an e- mail header or IP address to hide identity Mimicking another web site to trick or confuse or e- business users Falsified Identity Sniffing Spoofing Hijacking