OBJECTIVES 7-11 Flashcards
means that the controls achieve a sensible balance of reducing risk when compared with the cost of the control.
REASONABLE ASSURANCE
involves the ongoing review and evaluation of the system.
MONITORING
To assess, manage, and control the efficiency and effectiveness of operations of an organization, management must have access to feedback information and reports.
INFORMATION AND COMMUNICATION
is an independent check to assure the accuracy and completeness of transactions processed in a batch.
Review Of Batch Totals
Is the examination of a report to assess the accuracy and reliability of the data in that report.
Analysis Of Reports
The theft of proprietary company information, by digging through the trash of the intended target company.
INDUSTRIAL ESPIONAGE
The unlawful copying of software programs.
SOFTWARE PIRACY
When an employee of an organization attempts to conduct fraud through the misuse of a computer-based system, it is called
INTERNAL COMPUTER FRAUD
usually involves altering data that is input into the computer.
INPUT MANIPULATION
Occurs when a program is altered in some fashion to commit a fraud. Examples of program manipulation include the salami technique, Trojan horse programs, and trap door alterations.
PROGRAM MANIPULATION
A fraudster uses the _______ to alter a program to slice a small amount from several accounts and then credit those small amounts to the perpetrator’s benefit.
SALAMI TECHNIQUE
is a small, unauthorized program within a larger, legitimate program, used to manipulate the computer system to conduct a fraud
TROJAN HORSE PROGRAM
is a valid programming tool that is misused to commit fraud. These entrance ways can be thought of as hidden entrances, or trap doors.
TRAP DOOR ALTERATION
If a person alters the system’s checks or reports to commit fraud. This kind of fraud is often successful simply because humans tend to trust the output of a computer and do not question its validity or accuracy as much as they might if the output were manually produced.
OUTPUT MANIPULATION
are conducted by someone outside the company who has gained unauthorized access to the computer.
EXTERNAL COMPUTER FRAUDS
is the term commonly used for computer network break-ins
HACKING
A particular kind of hacking that has increased dramatically in recent years is
denial of service (DoS) attacks
is intended to overwhelm an intended target computer system with so much bogus network traffic that the system is unable to respond to valid network traffic.
denial of service attack
Occurs when a person, through a computer system, pretends to be someone else.
SPOOFING
is the most dangerous to the accounting and control systems, because a spoofer fools a computer into thinking that the network traffic arriving is from a trusted source
Internet spoofing