Computer Fraud Case Study

Decent Essays
Preventing and Responding to Computer Fraud
The 2013 North America Top Technology Initiatives Survey is structured to explore the concerns and priorities that AICPA members may have regarding information management and technology. Preventing and responding to computer fraud has landed itself a spot on the top 10 of the survey. Federal law defines computer fraud as the use of a computer to create a dishonest misrepresentation of fact as an attempt to induce another to do or refrain from doing something which causes loss (Cornell University Law School). The article “Computer Fraud—What Can Be Done About It?” (The CPA Journal, May 1995) presented a taxonomy that identified the following five types of computer fraud: The alteration or copying of
…show more content…
Because majority of businesses face these risks, it is crucial that they take the correct measures to prevent computer fraud and respond to it effectively.
Information Systems Audit and Control Association (ISACA) is an independent, nonprofit, global association that engages in the development, adoption, and use of globally accepted, industry-leading knowledge and practices for information systems. ISACA believes that management’s tone and constant emphasis of ethical behavior serves as an important preventive against fraud. This type of management creates an internal culture where individuals value and protect the organization and its assets. According to ISACA, addressing the following general controls provides continuous prevention against fraud: logical security, change management, database administration, data storage, and data encryption (Martin, 2008). Logical security deals with how easily an individual can gain unauthorized access to an application, database, data warehouse, operating system, utility, or other IT component to manipulate or extract data. Firewalls and software that block spyware
…show more content…
To commit fraud, someone installs unauthorized software or makes unapproved changes to an existing program, utility, operating system or other network component. These installations or changes can compromise or disable automated security settings. Therefore, organizations need to strictly follow change management policies regarding any IT installations or modifications. To follow change management, various file integrity agents detect all changes made to a file and regularly compare those findings to a log of authorized changes. This helps administrators detect improper alterations (Martin, 2008). The third preventative control is database administration. This control defines and enforces individual action, object, and constraint rights. This control is important because databases house crucial information that can lead to immense losses when altered or stolen. An action right includes insert, read, modify or delete responsibilities, which grants authorization for only work-required actions. An object right limits or restricts the types of database records someone can access. And a constraint right assigns limitations for authorized actions. Based on assigned constraints, for example, a sales representative would face monetary restrictions while entering a line of credit total for a new customer (Martin,

Related Documents

  • Superior Essays

    Also, Pratt gradually eliminated the practice of purchasing scrap from peddlers. The paper studies the fraud prevention and detection techniques Pratt can implement to combat fraud, such as automation of system, segregation of duties and scrutiny in vendor accounts. The paper concludes that strong internal controls and effective detection mechanism are critical for the company in reducing fraud risks and preventing future crimes. I. Introduction Pratt Industries is America’s 5th largest corrugated packaging company and the world’s largest privately held 100% recycled paper and packaging company. Its supply chain continues through a series of sheet plants, full-line of corrugated box factories and display facilities through…

    • 1219 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Logical security : Logical security consists of software safeguards for an organization's systems including user identification and password access, authentication, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or access information in a network. Access control mechanism: As part of access control mechanism we are using MAC (mandatory access control mechanism) where users do not enjoy the privileges of deciding who can access their files. Here the operating system is the decision maker overriding the user’s wishes.…

    • 345 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Brilliant Essays

    (2011). Psychological Pathways to Fraud: Understanding and Preventing Fraud in Organizations. Journal Of Business Ethics, 101(4), 601-618. Pincus, W. (2006, March 3).…

    • 316 Words
    • 2 Pages
    Brilliant Essays
  • Improved Essays

    Margolin Vs Novelty Now

    • 1389 Words
    • 6 Pages

    White-collar crime is “a variety of non-violent illegal act against society that most often occur in the business context.” (Kubasek, p.151) One of the white-collar crimes associated with Funny Face and Novelty Now is criminal fraud. Criminal fraud involves several ways in which an individual intentionally uses misrepresentation to gain an advantage over another. Fraud usually has “…the following three elements: (1) a material false representation made with intent to deceive (scienter), (2) a victim’s reasonable reliance on the false representation, and (3) damages.” (Kubasek, p.152) The three elements of fraud are clearly present in this…

    • 1389 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The aim of this paper is to outline the dynamics of Walters Security. Walters Security’s main objective is to ensure a high level of network and information security for reach client. Customer and client information, payment information, personal files, bank account details- all this information cannot be fully restored once it has been lost or breached by criminals. The goal of this firm is developing an interdisciplinary research platform to develop a framework and provide benefits to eliminate breach-related vulnerability of information.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Synovus Fraud Case Study

    • 334 Words
    • 2 Pages

    Fraud is an issue that is increasing in today’s organization at all levels. Kramer (2015) described that individuals are tempted to engage in fraudulent actions for several reason, however, increasing the profitability…

    • 334 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    It would also be important to look into transaction descriptions. It is often the case that a fraudulent transaction will be paired with very little or no description at all. Through pattern and frequency analysis we could single out transactions that prove whether or not this type of entry was in fact fraudulent or not. Understanding industry regularities could also prove to help us in successfully identifying the fraudulent entries in…

    • 1732 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The Office of Personal Management was established by Theodore Roosevelt is considered to be the father of the cutting edge merit-based administration. Merit is a term which means the value of quality of something or someone. Merit selection ensures that selection is based only on a person's ability to perform the work. Merit selection aims to choose the best person for the job, resulting in a quality workforce. OPM's history, which started with the Civil Service Act in 1883 and formally renamed to the Civil Service Commission.…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Healthcare fraud costs the country tens of billions of a dollars a yea, and its an ever increasing issue. To counter insider threats and fraud activity, health care organizations need to reinforce fundamental health care fraud management practices and basic security controls. New telecommunication technologies may offer countless opportunities for small businesses, but they also offer cyber criminals many new ways to victimize your business, sca, your customers and hurt your reputation. Social engineering, also known as "pretexting" is used by many criminals, both online and off, to trick unsuspecting people into giving away their personal information and or installing malicious software into their computers. Online fraud can take on…

    • 314 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Week 6: Fraud Case Study Group Project Vanessa Ryan, Juan Caba, Rustin Prentice, Howard Miranda Champlain College Forensic Accounting ACCT-280-45 Nicole Bocra August 14, 2016 On July 31, 2015, Howard Miranda, CFO of Microstuff Inc., contacted the internal auditor Vanessa Ryan in reference to a suspected purchase and receiving scheme within the information technology department. Based on this initial accusation, an examination was conducted—which included reviews of relevant accounting, purchasing, and receiving records and interviews of appropriate personnel. The investigation uncovered a purchase and receiving scheme that was conducted at Microstuff, Inc.…

    • 1707 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays