• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
Natural and political disaster threat
Fire or excessive heat. Floods, earthquakes, landslides, hurricanes, tornadoes, blizzards, snowstorms, and freezing rain. War and attacks by terrorists.
Software errors and equipment malfunctions
Hardware or software failure. Software errors or bugs. Operating system crashes. Power outages and fluctuations. Undetected data transmission errors.
Unintentional acts
Accidents caused by human carelessness, failure to follow established procedures, and poorly trained or supervised personnel. Innocent errors or omissions. Lost, erroneous, destroyed, or misplaced data. Logic errors. Systems that do not meet company needs or cannot handle intended tasks.
Intentional acts (computer crimes)
Sabotage. Misrepresentation, false use, or unauthorized disclosure of data. Misappropriation of assets, Financial statement fraud. Corruption. Computer fraud - attacks, social engineering, malware, etc.
Misappropriation of assets
The theft of company assets
Fraudulent financial reporting
Intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements. Financial statements are falsified to deceive investors and creditors, increase a company's stock price, meet cash flow needs, or hide company losses and problems.
Who commits fraud?
Anyone can commit fraud, studies find little differences between those who commit fraud and the public. Every perpetrator has their own reason to commit fraud.
The Fraud Triangle.
The Fraud Triangle consists of Pressure, Opportunity, and Rationalization. Common pressures are Financial (Not being able to pay debts), Emotional (Fear of loss of status), and Lifestyle (Gambling). Opportunity may present itself with the ability to commit the fraud, conceal the fraud, and convert the proceeds (This is due in part to poor internal controls). Rationalization occurs when the perpetrator can justify their illegal behavior through gross rationalizations.
Lapping
Concealing theft by a series of delays in posting collections to accounts. For example, steal A/R from customer A, then pay off with funds received later from customer B, then use funds from customer C to pay off customer B's balance, etc.
Kiting
Continually making deposits of money from one bank account to another while withdrawing the funds before they're processed and truly deposited in order to "create" money.
Expensing
Offsetting an item of normal expenditure as an expense against taxable income, even though it shouldn't be classified as such.
Processor Fraud
Involves unauthorized system use. Includes theft of computer time and services.
Computer Instructions Fraud
Involves tampering with software that processes company data. May Include: Modifying the software. Making illegal copies. Using it in an unauthorized manner.
Data Fraud
Involves altering or damaging a company's data files; or copying, using, or searching the data files without authorization. Sale of stolen data.
Output Fraud
Stealing or misusing system output. Use computers and peripheral devices to create counterfeit outputs.