Download presentation
Presentation is loading. Please wait.
2
Fraud and Forensic Auditing Pertemuan 23-24
Matakuliah : F0174 / Audit Laporan Keuangan Berbasis Komputer Tahun : 2008 Fraud and Forensic Auditing Pertemuan 23-24
3
Understanding Fraud 3 Bina Nusantara
4
Most frauds involve three steps.
The Fraud Process Most frauds involve three steps. The theft of something The conversion to cash The concealment Bina Nusantara
5
The Fraud Process What is a common way to hide a theft?
to charge the stolen item to an expense account What is a payroll example? to add a fictitious name to the company’s payroll Bina Nusantara
6
The Fraud Process What is lapping?
In a lapping scheme, the perpetrator steals cash received from customer A to pay its accounts receivable. Funds received at a later date from customer B are used to pay off customer A’s balance, etc. Bina Nusantara
7
The Fraud Process What is kiting?
In a kiting scheme, the perpetrator covers up a theft by creating cash through the transfer of money between banks. The perpetrator deposits a check from bank A to bank B and then withdraws the money. Bina Nusantara
8
The Fraud Process Since there are insufficient funds in bank A to cover the check, the perpetrator deposits a check from bank C to bank A before his check to bank B clears. Since bank C also has insufficient funds, money must be deposited to bank C before the check to bank A clears. The scheme continues to keep checks from bouncing. Bina Nusantara
9
Learning Objective 2 Discuss why fraud occurs, including the pressures, opportunities, and rationalizations that are present in most frauds. Bina Nusantara
10
Significant differences
Why Fraud Occurs Researchers have compared the psychological and demographic characteristics of three groups of people: White-collar criminals Few differences Significant differences General public Violent criminals Bina Nusantara
11
Significant differences
Why Fraud Occurs Researchers have compared the psychological and demographic characteristics of three groups of people: White-collar criminals Few differences Significant differences General public Violent criminals Bina Nusantara
12
Why Fraud Occurs What are some common characteristics of fraud perpetrators? Most spend their illegal income rather than invest or save it. Once they begin the fraud, it is very hard for them to stop. They usually begin to rely on the extra income. Bina Nusantara
13
Why Fraud Occurs Perpetrators of computer fraud tend to be younger and possess more computer knowledge, experience, and skills. Some computer fraud perpetrators are more motivated by curiosity and the challenge of “beating the system.” Others commit fraud to gain stature among others in the computer community. Bina Nusantara
14
Why Fraud Occurs Three conditions are necessary for fraud to occur:
A pressure or motive An opportunity A rationalization Bina Nusantara
15
Protection of the information technology architecture and assets:
15 Bina Nusantara
16
Computer Fraud The U.S. Department of Justice defines computer fraud as any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution. What are examples of computer fraud? unauthorized use, access, modification, copying, and destruction of software or data Bina Nusantara
17
Computer Fraud theft of money by altering computer records or the theft of computer time theft or destruction of computer hardware use or the conspiracy to use computer resources to commit a felony intent to illegally obtain information or tangible property through the use of computers Bina Nusantara
18
The Rise in Computer Fraud
Organizations that track computer fraud estimate that 80% of U.S. businesses have been victimized by at least one incident of computer fraud. However, no one knows for sure exactly how much companies lose to computer fraud. Why? Bina Nusantara
19
The Rise in Computer Fraud
There is disagreement on what computer fraud is. Many computer frauds go undetected, or unreported. Most networks have a low level of security. Many Internet pages give instructions on how to perpetrate computer crimes. Law enforcement is unable to keep up with fraud. Bina Nusantara
20
Computer Fraud Classifications
Data fraud Input fraud Output fraud Processor fraud Computer instruction fraud Bina Nusantara
21
Computer Fraud and Abuse Techniques
What are some of the more common techniques to commit computer fraud? Cracking Data diddling Data leakage Denial of service attack Eavesdropping forgery and threats Bina Nusantara
22
Computer Fraud and Abuse Techniques
Hacking Internet misinformation and terrorism Logic time bomb Masquerading or impersonation Password cracking Piggybacking Round-down Salami technique Bina Nusantara
23
Computer Fraud and Abuse Techniques
Software piracy Scavenging Social engineering Superzapping Trap door Trojan horse Virus Worm Bina Nusantara
24
Describe how to deter and detect computer fraud.
Learning Objective 4 Describe how to deter and detect computer fraud. Bina Nusantara
25
Preventing and Detecting Computer Fraud
What are some measures that can decrease the potential of fraud? Make fraud less likely to occur. Increase the difficulty of committing fraud. Improve detection methods. Reduce fraud losses. Prosecute and incarcerate fraud perpetrators. Bina Nusantara
26
Preventing and Detecting Computer Fraud
Make fraud less likely to occur. Use proper hiring and firing practices. Manage disgruntled employees. Train employees in security and fraud prevention. Manage and track software licenses. Require signed confidentiality agreements. Bina Nusantara
27
Preventing and Detecting Computer Fraud
Increase the difficulty of committing fraud. Develop a strong system of internal controls. Segregate duties. Require vacations and rotate duties. Restrict access to computer equipment and data files. Encrypt data and programs. Bina Nusantara
28
Preventing and Detecting Computer Fraud
Improve detection methods. Protect telephone lines and the system from viruses. Control sensitive data. Control laptop computers. Monitor hacker information. Bina Nusantara
29
Preventing and Detecting Computer Fraud
Reduce fraud losses. Maintain adequate insurance. Store backup copies of programs and data files in a secure, off-site location. Develop a contingency plan for fraud occurrences. Use software to monitor system activity and recover from fraud. Bina Nusantara
30
Preventing and Detecting Computer Fraud
Prosecute and incarcerate fraud perpetrators. Most fraud cases go unreported and unprosecuted. Why? Many cases of computer fraud are as yet undetected. Companies are reluctant to report computer crimes. Bina Nusantara
31
Preventing and Detecting Computer Fraud
Law enforcement officials and the courts are so busy with violent crimes that they have little time for fraud cases. It is difficult, costly, and time consuming to investigate. Many law enforcement officials, lawyers, and judges lack the computer skills needed to investigate, prosecute, and evaluate computer crimes. Bina Nusantara
32
Disaster recovery & Rebuild File
32 Bina Nusantara
33
Minimizing System Downtime
Significant financial losses can be incurred if hardware or software malfunctions cause an AIS to fail. What are some methods used to minimize system downtime? preventive maintenance uninterruptible power system fault tolerance Bina Nusantara
34
Disaster Recovery Plan
Every organization should have a disaster recovery plan so that data processing capacity can be restored as smoothly and quickly as possible in the event of a major disaster. What are the objectives of a recovery plan? Minimize the extent of the disruption, damage, and loss. Temporarily establish an alternative means of processing information. Bina Nusantara
35
Disaster Recovery Plan
Resume normal operations as soon as possible. Train and familiarize personnel with emergency operations. A sound disaster plan should contain the following elements: Priorities for the recovery process Backup data and program files Bina Nusantara
36
Disaster Recovery Plan
Specific assignments Complete documentation Backup computer and telecommunications facilities reciprocal agreements hot and cold sites Bina Nusantara
37
Disaster Recovery Plan
There are other aspects of disaster recovery planning that deserve mention: The recovery plan is incomplete until it has been satisfactorily tested by simulating a disaster. The recovery plan must be continuously reviewed and revised to ensure that it reflects current situation. The plan should include insurance coverage. Bina Nusantara
38
Protection of PCs and Client/Server Networks
Why are PCs more vulnerable to security risks than are mainframes? It is difficult to restrict physical access. PC users are usually less aware of the importance of security and control. Many people are familiar with the operation of PCs. Segregation of duties is very difficult. Bina Nusantara
39
Data Processing and File Maintenance Controls
What are some of the more common controls that help preserve the accuracy and completeness of data processing? data currency checks default values data matching exception reporting Bina Nusantara
40
Data Processing and File Maintenance Controls
external data reconciliation control account reconciliation file security file conversion controls Bina Nusantara
41
Learning Objective 6 Identify and explain the integrity controls that help ensure that system processing is complete, accurate, timely, and authorized. Bina Nusantara
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.