Exam 1 Flashcards
(124 cards)
an intentional act where the intent is to destroy a system or some of its components
sabotage
a text file created by Web site and stored on a visitor’s hard drive. Store information about who the user is and what the user has done on the site.
Cookie
Any and all means a person uses to gain an unfair advantage over another person
fraud
typically business people who commit fraud. Usually resort to trickery or cunning, and their crimes usually involve a violation of trust or confidence
White-collar criminals
dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards. Examples include bribery and bid rigging.
Corruption
Misrepresenting or leaving out facts in order to promote and investment that promises fantastic profits with little or no risk. Examples include Ponzi schemes and securities fraud
investment fraud
theft of company assets by employees
misappropriation of assets
intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements.
fraudulent financial reporting
pressure, rationalization, and opportunity
fraud triangle
a person’s incentive or motivation for committing fraud; could be financial, lifestyle, or emotional. Also management characteristics, industry conditions, and financial can lead to financial statement fraud
pressure
the condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to personal gain. Commit, conceal, and convert
opportunity
concealing the theft of cash by means of a series of delays in posting collection to accounts receivable
lapping
creating cash using the lag between the time a check is deposited and the time it clears the bank.
check kiting
the excuse that fraud perpetrators use to justify their illegal behaviors. Ex. “I’m only borrowing it,” “The company owes me, I am only taking what is rightfully mine.”
rationalization
any type of fraud that requires computer technology to perpetrate
computer fraud
easiest type of computer fraud, involves falsifying or altering computer input
input fraud
includes unauthorized system use, including the theft of computer time and services
processor fraud
includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity
computer instructions fraud
illegally using, copying, browsing, searching, or harming computer data
data fraud
displayed or printed output that is stolen or copied or misused
output fraud
controls that deter problems before they arise.
preventive controls
controls designed to discover control problems that were not prevented
detective controls
controls that identify and correct problems as well as correct and recover from the resulting errors.
corrective controls
controls designed to make sure tan organization’s information system and control environment is stable and well managed.
general controls