• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/33

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

33 Cards in this Set

  • Front
  • Back
intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements
fraudulent financial reporting
The three elements necessary for fraud to occur
pressure, opportunity and rationalization
Three types of pressures that contribute to fraud
financial pressure, lifestyle pressure, emotional feelings and problems
Missappropriation of company A/R funds, then use subsequent payments to fill in previous hole
lapping
Overdraft an bank account, before cheque bounces, overdraft another bank account to fill that hole
kiting
theft of information and intellectual property
economic espionage
Five kinds of computer fraud classifications
input, output, processor, computer instructions, data
computer fraud committed through unauthorized system use, including the theft of computer time and services is classified under
processor fraud
Computer fraud that is accomplished by tampering with the software that processes the data is classified under
computer instructions fraud
Changin data before, during, or after it is entered into the system
data diddling
unauthorized copying of company data
data leakage
this occurs when server receives so many e-mail bombs that it overloads and crashs
Denial of service attack
The act which perpetrators observe private communications or transmissions of data
eavesdropping
Creating an email so it looks like somebody else sent it
spoofing
unauthorized access and use of computer systems
hacking
hackers that attack phones systems to access, steal and destroy data through the phonelines
phreakers
watching people as they enter telephone calling card or credit card numbers
shoulder surfing
Ways which identity thieves steal data
shoulder surfing, scavenging, phishing, redirecting email
sending out an email pretending to be a legitimate company to gain access to person identity information
phishing
When hackers use the internet to disrupt regular commerce and communications
internet terrorism
A program that lies idle until some specified circumstance or a particular time triggers it. It sabotages the system by destroying programs and data
logic time bomb
Programs that capture data from information packats
packet sniffers
tapping into a telecommunications line and altching on to a legitimate user before the user logs in the system
piggy backing
"Thin slices of money stolen over a period of time" such that expenses all rise in same proportion to avoid detection
salami technique
Impersonation social agencies to trick employees into providing confidential information
social engineering
Spammers stage _____ _____ designed to uncover valid e-mail addresses
dictionary attacks
a ____ _____ is a particular form of spyware that records computer activities, such as keystokes, emails etc.
key logger
Unauthorized use of system programs to bypass regular system controls and perform illegal acts
Superzapping
Bypassing normal system controls
trap door or back door
Authorized computer instructions in an authorized program. Such program launch denial of service attacks
Trojan horse
searching for idle modems to dial thousands of phones ___ _____, with broadband it is called ___ ______
war dialing, war driving
A segment of executable code that attaches itself to software, it destroys or alter data, programs and files. Contagious and easily spread.
Virus
Stand alone as opposed to parasiting off a regular program, capable of replicating itself. Generally do more damage
Worms