Exam 4 Flashcards
Unauthorized activity, theft, or fraud carried out by a 3rd party outside the institution through fraudulent behavior.
External fraud
Threatens any company for one reason: its impossible to conduct business without interacting with outsiders.
External fraud
What are the 3 sources of external fraud?
- customers
- vendors
- unrelated third parties
What do external parties look for in companies to commit fraud?
Data and R&D
Easy to produce, small business does not have time and resources to scrutinize, and may include an individual who is an expert (paperhanger).
Counterfeit checks (Check fraud)
Victim offers something for sale on the internet, typically big ticket item, fraudster contracts victim to buy, sends counterfeit check, changes mind, then asks for refund (check was never real).
E-commerce check scams
True or false.
Most of the world still uses a significant amount of personal checks.
False.
The United States is the only country.
What are 3 ways to prevent and detect check fraud?
- No check policy
- Request ID
- Educate employees
The misuse of a credit card to make purchases without authorization or counterfeiting a credit card. May include stolen card numbers.
Credit card fraud
Cards made using the appropriately sized plastic with embroised account numbers and names.
Counterfeit cards
What are 3 ways to prevent and detect credit card fraud?
- Educate employees
- Check card signatures
- Ask for ID
What are 3 red flags of credit card fraud?
- Card pulled out of pocket
- Expensive items on new card
- Rushed customer
Competitors submit token bids that are too high to be accepted. Helps accomplice’s bid look good.
Complementary bids
Two or more contractors conspire to alternate the business between them on a rotating basis.
Bid rotation (bid-pooling)
Phony bids from shell companies to create the illusion of competition.
Phantom bids
What are two contract performance schemes?
- Product substitution
- Cost mischarging
Contractor charges the procuring entity for costs that are not allowable, unreasonable, or cannot be allocated directly to the contract.
Cost mischarging
What are 3 ways to prevent and detect vendor fraud?
- Vendor audit (right to audit clause)
- Integral contractors
- Look for red flags
When companies choose to interact with customer and vendors, but an unknown chooses to target the companies.
Third party threat
Requires an understanding of the technology used in the crime, lack paper trail, usually requires internet.
Computer fraud
The use of technology to gain unauthorized access to sensitive information on a computer system.
Computer hacking
What are 4 methods used to gain unauthorized access during computer hacking?
- Password cracking
- Social engineering
- Phishing
- Wiretapping
Fraudsters hijack business names to execute attacks which dupe victims to providing sensitive information.
Phishing
Data manipulation and data destruction is a ______.
Crime