Download presentation
Presentation is loading. Please wait.
Published byVictoria Blake Modified over 9 years ago
1
Computer Fraud and Security Merle P. Martin College of Business CSU Sacramento 7/11/02
2
Agenda Extent of Fraud Process of fraud Why fraud occurs Approaches and techniques used to commit computer fraud How to deter and detect computer fraud
3
E-Commerce Fraud t Worldwide E-Commerce Fraud Prevention Network, 2000 t 50% e-retailers: online fraud significant problem t 50% reported online losses of $1000 - $10,000 1 st quarter t 19% lost over $100,000
4
E-Commerce Fraud t Overall fraud rate is 7 cents per $100 in sales t Rate thought to be 3 to 4 times higher for E-Commerce transactions t Measures used to prevent fraud u address verification – 70% u customer follow-up – 54% u after-the-fact fraud handling – 43%
5
E-Commerce Fraud t Gartner Group survey, 7/00 t On-line retailers suffer 12 times as many incidents of fraud as off-line retailers t Especially common with product that can be downloaded
6
Internet Fraud t Internet Fraud Complaint Center (IFCC) – federal agency t 2001 Internet Fraud Report t Top 10 complaint categories t Dollar loss t Perpetrator characteristics
7
Types Internet Fraud t Auction fraud – 42.8% t Non-delivery – 20.3% t Credit Card fraud – 9.4% t Business fraud – 1.4% t Identity theft – 1.3% t Check fraud – 0.6%
8
Average Dollars Lost t Auction fraud - $395 t Non-delivery - $325 t Credit card - $450 t Business fraud - $160 t Identity theft - $3000 t Check fraud - $910
9
Perpetrators t 76% individuals, as opposed to businesses t 81% in 5 states t Highest per capita states (per 100K): u Nevada 11.9 u California 4 th t 81.3% male
10
Extent of Fraud t “Fraud: The Unmanaged Risk” t Ernst & Young, 2000 t 739 responses (companies) t Key findings t What is computer fraud? t What isn’t computer fraud?
11
Key Findings t More than two thirds of respondents have suffered from fraud loss during last 12 months t One in 10 suffered more than 50 frauds t Worst frauds: only 29% of total value recovered to date
12
Who Does It? t 82% by employees t one third of these by management t half had been in organization more than 5 years t one quarter had been in organization more than 10 years
13
Potential t 80% concerned significant fraud could occur within organization t Four out of 10 who were concerned had no explicit policy for fraud reporting
14
Resulting Actions t Worst Frauds: u 38% prosecuted u 28% dismissed u 2% no action u Other 32%? t Rare headline: “Stockbroker jailed in fraud case.” (Australian Financial Review, 3/4/2000)
15
Computer Fraud t Respondents asked to consider nine examples of computer related fraud t High agreement on only four types: u manipulation of data records held on computer to disguise true nature of transaction (97%)
16
Computer Fraud u hacking into organization’s computer system to steal or manipulate organizational information (97%) u manipulation of computer programs to disguise true nature of transaction (97%) u unauthorized transfer of funds electronically (96%)
17
Not Computer Fraud? t Use of organizational hardware and software for personal use u only 26% considered as computer fraud u 86% believed this was happening u “organizations turning a blind eye to this use”
18
Not Computer Fraud? t Only 40% respondents considered improper access to Internet as a fraud t But two-thirds of high-tech firms considered it fraud t No substantial costs to organization
19
Insider Fraud t Joint 2002 study by FBI and Computer Security Institute t Only 38% respondents detected insider attacks during preceding 12 months t Down from: u 71% in 2000 u 49% in 2001
20
Insider Fraud t Reduction in insider threat or not being caught as often? t Insider threats have become more cunning and sophisticated t “I don’t believe that many corporations know that the majority of attacks occur behind the firewall.” Mike Hager, VP Network Security, OppenheimerFunds
21
Agenda Extent of Fraud Process of fraud Why fraud occurs Approaches and techniques used to commit computer fraud How to deter and detect computer fraud
22
The Fraud Process Most frauds involve three steps. The theft of something The conversion to cash The concealment
23
The Fraud Process t Common way to hide theft charge stolen item to an expense account charge stolen item to an expense account t Payroll example add a fictitious name to company’s payroll add a fictitious name to company’s payroll
24
The Fraud Process t Lapping t Perpetrator steals cash received from customer A to pay its accounts receivable t Funds received at a later date from customer B are used to pay off customer A balance, etc
25
The Fraud Process t Kiting t Perpetrator covers up theft by creating cash through transfer of money between banks t Perpetrator deposits check from bank A to bank B and then withdraws money
26
Kiting (cont.) t Since insufficient funds in bank A to cover check, perpetrator deposits check from bank C to bank A before check to bank B clears t Since bank C also has insufficient funds, money deposited to bank C before check to bank A clears. t Scheme continues to keep checks from bouncing
27
Agenda Extent of Fraud Process of fraud Why fraud occurs Approaches and techniques used to commit computer fraud How to deter and detect computer fraud
28
Why Fraud Occurs t Common characteristics of fraud perpetrators u Most spend their illegal income rather than invest or save it u Once they begin the fraud, very hard for them to stop u They usually begin to rely on the extra income
29
Why Fraud Occurs t Perpetrators of computer fraud tend to be younger and possess more computer knowledge, experience, and skills t Some computer fraud perpetrators are more motivated by curiosity and challenge of “beating the system” t Others commit fraud to gain stature among others in computer community
30
Why Fraud Occurs t Three conditions necessary for fraud to occur: pressure or motive pressure or motive opportunity opportunity rationalization rationalization
31
Pressures t Some financial pressures living beyond means living beyond means high personal debt high personal debt “inadequate” income “inadequate” income poor credit ratings poor credit ratings heavy financial losses heavy financial losses large gambling debts large gambling debts
32
Pressures t Some work-related pressures: – low salary – non-recognition of performance – job dissatisfaction – fear of losing job – overaggressive bonus plans
33
Pressures t Other pressures – challenge – family/peer pressure – emotional instability – need for power or control – excessive pride or ambition
34
Opportunities t Opportunity is condition or situation that allows person to commit and conceal dishonest act t Opportunities often stem from lack of internal controls t Most prevalent opportunity for fraud results from company’s failure to enforce its system of internal controls
35
Rationalizations t Most perpetrators have excuse (rationalization) allowing them to justify their illegal behavior t Some rationalizations u just “borrowing” stolen assets u not hurting real person, just computer system
36
Fraud Tendencies Top- Level LevelManagers Top- Level LevelManagers Middle-Level Managers ManagersMiddle-Level Operational-Level Operational-Level Increasing ability to override controls mechanisms Increasing ability to override controls mechanisms Strongest Control Mechanisms Strongest Control Mechanisms Greatest Frequency of Fraud Greatest Frequency of Fraud
37
Agenda Extent of Fraud Process of fraud Why fraud occurs Approaches and techniques used to commit computer fraud How to deter and detect computer fraud
38
Definitions t Data Integrity: “.. requirement that information and programs are changed only in a specified and authorized manner.” “.. requirement that information and programs are changed only in a specified and authorized manner.” Computers at Risk; pg. 54 Computers at Risk; pg. 54 National Academy Press, 1991
39
Definitions t System Integrity: “.. requirement that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.” National Computer Security Center National Computer Security Center Pub. NCSC-TG-004-88 Pub. NCSC-TG-004-88
40
Definitions t Availability: “.. requirement intended to assure that systems work promptly and service is not denied to authorized users.” Computers at Risk, pg. 54 Computers at Risk, pg. 54
41
Computer Fraud t U.S. Department of Justice defines computer fraud as: “... any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution ”
42
Computer Fraud Types Unauthorized use, access, modification, copying, and destruction of software or data Theft of money by altering computer records or theft of computer time Theft or destruction of computer hardware
43
Computer Fraud Types – Use or conspiracy to use computer resources to commit a felony – Intent to illegally obtain information or tangible property through use of computers
44
Rise in Computer Fraud t Organizations that track computer fraud estimate that 80% of U.S. businesses have been victimized by at least one incident of computer fraud t However, no one knows for sure exactly how much companies lose to computer fraud t Why?
45
Rise in Computer Fraud t Disagreement on what computer fraud is t Many computer frauds go undetected, or unreported t Most networks have low level of security t Many Internet pages tell how to perpetrate computer crimes t Law enforcement is unable to keep up with fraud
46
Malicious Code t Virus: code segment that replicates itself by attaching copies to existing executables t Trojan Horse: Program that performs desired task, but also includes unexpected (undesired) functions t Worm: Self-replicating program that is self-contained – does not require host program NIST Special Publications 800-5 NIST Special Publications 800-5
47
Computer Fraud and Abuse Techniques t Textbook list 26 abuse techniques t Four of special interest to accountants
48
Fraud Techniques t Round-down: u interest calculations to 2 decimal places u fractions posted to bogus account u books balance
49
Fraud Techniques t Salami: u tiny slices of money stolen over period of time u e.g., increase all production costs by fraction of percent u post to bogus account
50
Fraud Techniques t Trojan Horse: u unauthorized computer instructions in authorized program u performs illegal operation at v predetermined time v predetermined set of conditions u aka “time bomb”
51
Fraud Techniques t Data diddling : change data before, during, or after entering
52
Agenda Extent of Fraud Process of fraud Why fraud occurs Approaches and techniques used to commit computer fraud How to deter and detect computer fraud
53
Loss / Fraud Conditions t Threat : potential adverse or unwanted event that can be injurious to AIS t Exposure : potential maximum $ loss if event occurs t Risk : likelihood that event will occur t Expected Loss: Risk * Exposure
54
Decreasing Fraud Potential Fraud Probable Fraud Motivation Actual Fraud Difficulty Detected Detection Control Culture Control Culture Internal Controls Internal Controls Internal Audits Internal Audits Unde- tected Unde- tected Prosecution
55
Undetected Fraud 0 0 100 Percent Fraud Detected Percent Fraud Detected Internal Control Costs Internal Control Costs L L H H Internal Control Costs = Expected Fraud Losses Internal Control Costs = Expected Fraud Losses Similar to Auditor’s “Threshold Value” Similar to Auditor’s “Threshold Value”
56
Preventing / Deterring Fraud Make Less Likely to Occur Increase Difficulty Improve Detection Reduce Losses Prosecute / Incarcerate Perpetrators
57
Emphasis t From the Aggie handbook: t “An ounce of preventive is worth a pound of detective or corrective” t “A good, advertised detective control can be a deterrent to crime.”
58
Deter and Detect Make fraud less likely to occur: Proper hiring / firing Proper hiring / firing Manage disgruntled employees Manage disgruntled employees Train employees in security and fraud prevention Train employees in security and fraud prevention Manage and track software licenses Manage and track software licenses Require signed confidentiality agreements Require signed confidentiality agreements
59
Deter and Detect Increase difficulty of committing fraud: u Develop strong system of internal controls u Segregate duties u Require vacations and rotate duties u Restrict access to computer equipment and data files u Encrypt data and programs
60
Deter and Detect Improve detection methods Protect telephone lines and system from viruses Protect telephone lines and system from viruses Control sensitive data Control sensitive data Control laptop computers Control laptop computers Monitor hacker information Monitor hacker information
61
Deter and Detect Reduce fraud losses: u Maintain adequate insurance u Store backup copies of programs and data files in secure, off-site location u Develop contingency plan for fraud occurrences u Use software to monitor system activity and recover from fraud
62
Deter and Detect Prosecute and incarcerate fraud perpetrators: t Most fraud cases go unreported and are not prosecuted u Many cases of computer fraud are as yet undetected u Companies are reluctant to report computer crimes
63
Why No Prosecution? t Law enforcement officials, courts so busy with violent crimes u little time for fraud cases t Difficult, costly, and time consuming to investigate t Many law enforcement officials, lawyers, judges lack computer skills needed to prosecute computer crimes
64
Fraud Case Study t Georgia Bureau of Investigation spent 18 months investigating an alleged corporate computer criminal t Oct 01: charged him with 8 felony counts under Georgia computer crime law t Each count could carry $50K fine and 15 years in prison
65
Fraud Case Study t Result?: Jan 02, plea bargain u $2100 in fines u one year probation u 80 hours community service t Deterrent or incentive? t Why a plea bargain?
66
Topics Covered Process of fraud Why fraud occurs Approaches and techniques used to commit computer fraud How to deter and detect computer fraud
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.