Professional Documents
Culture Documents
CPPPPPP PPP PP P PP P P
CPPPPPP PPP PP P PP P P
3 types of fraud
Opportunity- an opening or the gateway that allows an individual to commit the fraud, conceal the
fraud, convert the proceeds.
Fraud occurs when people have perceived non shareable pressures, the opportunity gateway is left
open and they can rationalize their actions to reduce the moral impact in their minds.
Economic espionage- refers to the theft of information and intellectual property and is growing
especially fast.
Computer Fraud- any illegal act for which the knowledge of computer technology is essential for its
perpetration, investigation, or prosecution. 5 types of computer fraud
1. Input fraud- Simplest and most common way to commit computer fraud, alter
computer input, requires little computer skills, perpetrator only needs to understand
how the system operates.
a. Disbursements fraud- the perpetrator causes the company to either pay too
much for ordered goods or pay for goods never ordered.
b. Inventory fraud- the perpetrator enters data into the system to show the stolen
inventory has been scrapped
c. Payroll fraud- the perpetrator enters data to increase his salary, create a
fictitious employee, or retain a terminated employee on the records.
d. Cash receipts fraud- the perpetrator hides the theft of cash by falsifying system
input.
2. Processor fraud- involves computer fraud committed through unauthorized system use,
includes theft of computer time and services. Incidents could involve employees surfing
the internet, using the company computer to conduct personal or competing business.
3. Computer instructions fraud- involves tampering with the software that processes
company data. Modifying software, making illegal copies, using it in an unauthorized
manner. Also might include developing a software program or module to carry out
unauthorized activity.
4. Stored data fraud- altering or damaging a company’s data files or copying, using, or
searching the data files without authorization. Theft of data often occurs so that
perpetrators can sell the data. Most identity thefts occur when insiders in financial
institutions, credit agencies etc., steal and sell financial information about individuals
from their employer’s database.
5. Output fraud- involves stealing or misusing system output. Output is usually displayed
on a screen or printed on paper. Unless properly safeguarded, screen output can easily
be read from a remote location using inexpensive electronic gear. Fraud perpetrators
can use computers and peripheral devices to create counterfeit outputs, such as checks.
Data diddling- changing data before, during, or after it is entered into the system. Can involve adding
deleting, or altering key system data,
Hacking
Phreaking
Packet sniffing
Phishing
Piggybacking
Spamming
Trojan horse
Virus
Worm