Week 10 Flashcards

(23 cards)

1
Q

What are the two main categories of fraud?

A

Misappropriation of assets (theft) and fraudulent financial reporting (“cooking the books”).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What three elements must exist for fraud (Fraud Triangle)?

A

Pressure (financial/emotional need), Opportunity (weak controls), Rationalization (justifying unethical behavior).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Example of misappropriation in Malaysia?

A

MH370 case - bank officer stole RM110,643 from passengers’ accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example of fraudulent financial reporting?

A

M K Land Holdings - overstated land disposal gains as revenue (RM80.77m tax penalty).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define computer fraud classification types:

A

Input fraud, Processor fraud, Computer instruction fraud, Data fraud, Output fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Most common cybercrime in Malaysia (2015)?

A

Fraud - #1 for 5 consecutive years per CyberSecurity Malaysia.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a botnet?

A

46.2M Malaysian mobile records stolen (2017).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Distinguish virus vs. worm:

A

Virus requires human action to replicate; worm self-replicates independently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ransomware example in Malaysia?

A

WannaCry attack (2017) - encrypted files demanding Bitcoin ransom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Four social engineering techniques:

A

Phishing (fake emails), Pretexting (fabricated scenarios), Shoulder surfing, Dumpster diving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to spot phishing?

A

Check sender address, urgency tactics, attachment requests (e.g., fake Citibank email).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Three functions of internal controls:

A

Preventive (deter), Detective (identify), Corrective (recover).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why segregate accounting duties?

A

Prevent single-person fraud:

Custody (handle assets) ≠ Recording (bookkeeping) ≠ Authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key components of COSO framework:

A

Control environment, Risk assessment, Control activities, Information/communication, Monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Four risk response strategies:

A

Reduce (implement controls), Accept (tolerate risk), Share (insurance), Avoid (stop activity).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

COBIT5 vs. COSO-ERM:

A

COBIT5 focuses on IT governance; COSO-ERM expands to enterprise risk management.

17
Q

Inherent vs. Residual risk:

A

Inherent = pre-control risk; Residual = post-control risk.

18
Q

Auditor’s fraud detection duties (ISA):

A

Assess control risks, understand fraud schemes, document findings, use tech-focused approaches.

19
Q

Three ways to deter fraud:

A

Culture of integrity, strong internal controls, fraud detection software.

20
Q

How to minimize social engineering?

A

ever share passwords, verify unknown requests, restrict tailgating into secure areas

21
Q

Salami technique example:

A

Round-down fraud - stealing fractions of cents from transactions.

22
Q

ARP spoofing vs. IP spoofing:

A

ARP spoofing attacks LANs; IP spoofing hides DoS attack sources.

23
Q

Purpose of change management controls?

A

Ensure system updates don’t create vulnerabilities or disrupt operations.