Exam 4 Flashcards
Unauthorized activity, theft, or fraud carried out by a 3rd party outside the institution through fraudulent behavior.
External fraud
Threatens any company for one reason: its impossible to conduct business without interacting with outsiders.
External fraud
What are the 3 sources of external fraud?
- customers
- vendors
- unrelated third parties
What do external parties look for in companies to commit fraud?
Data and R&D
Easy to produce, small business does not have time and resources to scrutinize, and may include an individual who is an expert (paperhanger).
Counterfeit checks (Check fraud)
Victim offers something for sale on the internet, typically big ticket item, fraudster contracts victim to buy, sends counterfeit check, changes mind, then asks for refund (check was never real).
E-commerce check scams
True or false.
Most of the world still uses a significant amount of personal checks.
False.
The United States is the only country.
What are 3 ways to prevent and detect check fraud?
- No check policy
- Request ID
- Educate employees
The misuse of a credit card to make purchases without authorization or counterfeiting a credit card. May include stolen card numbers.
Credit card fraud
Cards made using the appropriately sized plastic with embroised account numbers and names.
Counterfeit cards
What are 3 ways to prevent and detect credit card fraud?
- Educate employees
- Check card signatures
- Ask for ID
What are 3 red flags of credit card fraud?
- Card pulled out of pocket
- Expensive items on new card
- Rushed customer
Competitors submit token bids that are too high to be accepted. Helps accomplice’s bid look good.
Complementary bids
Two or more contractors conspire to alternate the business between them on a rotating basis.
Bid rotation (bid-pooling)
Phony bids from shell companies to create the illusion of competition.
Phantom bids
What are two contract performance schemes?
- Product substitution
- Cost mischarging
Contractor charges the procuring entity for costs that are not allowable, unreasonable, or cannot be allocated directly to the contract.
Cost mischarging
What are 3 ways to prevent and detect vendor fraud?
- Vendor audit (right to audit clause)
- Integral contractors
- Look for red flags
When companies choose to interact with customer and vendors, but an unknown chooses to target the companies.
Third party threat
Requires an understanding of the technology used in the crime, lack paper trail, usually requires internet.
Computer fraud
The use of technology to gain unauthorized access to sensitive information on a computer system.
Computer hacking
What are 4 methods used to gain unauthorized access during computer hacking?
- Password cracking
- Social engineering
- Phishing
- Wiretapping
Fraudsters hijack business names to execute attacks which dupe victims to providing sensitive information.
Phishing
Data manipulation and data destruction is a ______.
Crime
What are 3 ways to prevent and detect computer fraud?
- Formal security
- Firewalls
- Encryption
What are 3 reasons corporations commit espionage?
- Information and data
- Intelligence that provides actionable decisions
- Valuable structures/products
What are 4 targets of corporate spies?
- R&D
- Marketing
- Manufacturing
- HR
What are 3 ways to prevent and detect corporate espionage regarding documentation or ideas?
- Use locked filing cabinets
- Shred documents
- Locked waste
The vulnerability an organization has to overcome regarding the interrelated elements that enable someone to commit fraud.
Fraud risk
Risks that are present before management action are described as _____ risk.
Inherent
Risks that are present after management action are described as ______ risk.
Residual
What are the 3 reasons to be concerned about fraud risk?
- No immunity
- Awareness is needed to fix
- Can be internal or external
Right balance of preventive and detective controls, can greatly reduce an organizations vulnerability to fraud. (Factor that influences fraud risk)
Effectiveness of internal controls
It is impossible, to have a company made up of individuals whose ethics and values are fully aligned with those of the organization. (Factor that influences fraud risk)
Ethics and values of company
A process aimed at proactively identifying and addressing an organization vulnerabilities to internal and external fraud.
Fraud risk assessment.
The main proponent of the fraud risk assessment process that helps an organization recognize what makes it most vulnerable to fraud so that it can take proactive measures to reduce its exposure.
The Objective
What are 2 reasons organizations should conduct fraud risk assessments?
- Assess internal controls (Improve)
- Comply with regulations and standards (Compliance)
What are 4 things that makes a good fraud risk assessment?
- Collaboration
- Good knowledge
- Access to all levels (Organization)
- Right sponsor (hears good, bad, and ugly)
What are 3 considerations for developing an effective fraud risk assessment?
- Packaging it right
- One size does not fit all
- Keeping it simple
What are 3 inquiry techniques to use for risk assessment?
- Interviews
- Surveys
- Focus groups
What are 4 things a sponsor would agree to be worked on in a risk assessment?
- Participants
- Output
- Methods
- Scope
What are 4 inherent fraud risks?
- Position
- Incentives
- Management override
- Performance pressures
Identifying and mapping existing _____ and _____ controls to the relevant fraud is a portion of executing fraud risk assessment.
- Preventive
- Detective
Addressing the identified fraud risks involves 3 things…
- Set acceptable risk level
- Rank and prioritize risk
- Respond to residual risks
What are the 5 responses to residual fraud risks?
- Transfer (insurance)
- Avoid (eliminate)
- Mitigate (controls)
- Assume (low occurrence)
- Combination approach (transfer part and controls)