Test 2 Flashcards
Threats to AIS
- Natural and political disasters
- Software errors and equipment malfunctions
- Unintentional acts
- Intentional Acts
An intentional act where the intent is to destroy a system or some of its components
Sabotage
Gaining an unfair advantage over another person
Fraud
Legally, for an act to be fraudulent there must be:
- False statement, representation, disclosure
- Material facts
- An intent to deceive
- Justifiable reliance
- Injury or loss
Typically, business people who commit fraud. Criminals usually resort trickery or cunning, and their crimes usually involve a violation of trust or confidence
white-collar criminals
Dishonest conduct by those in power and it often involves actions that are illegitimate, immoral, or incompatible with ethical standards
Corruption
Misrepresenting or leaving out facts in order to promote and investment that promises fantastic profits with little or no risk
Investment fraud
The theft of company assets by employees
Misappropriation of assets
Fraudulent financial reporting
Intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements
4 actions to reduce fraudulent financial reporting
- Establish an environment that contributes to integrity
- Identify and understand factors that lead to fraudulent financial reporting
- Assess the risk of fraudulent reporting within the company
- Design and implement internal controls
SAS requires auditor’s to:
- Understand fraud
- Discuss the risks of material fraudulent misstatements
- Obtain information
- Identify, assess, and respond to risks
- Evaluate the results of their audit tests
- Document and communicate findings
- Incorporate a technology focus
Fraud Triangle
- Opportunity
- Rationalization
- Pressure
A person’s incentive or motivation for committing fraud
Pressure
The condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to a personal gain
Opportunity
Concealing the theft of cash by means of a series of delays in posting collections to accounts receivable
Lapping
Customer A, B, C…
Cash is created using the lag between the time a check is deposited and the time it clears the bank
Check kiting
Allows perpetrators to justify their illegal behavior
- justification, attitude, lack of personal integrity
Rationalization
Any type of fraud that requires computer technology to perpetrate it
Computer fraud
Computer fraud classifications
- Input fraud
- Processor fraud
- Data fraud
- Output fraud
- Computer instructions fraud
Input fraud
Simplest and most common way to commit a computer fraud is to alter or falsify computer inout
Processor fraud
Includes unauthorized system use, including the theft of computer time and services
Computer instructions fraud
Includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity
Data fraud
illegally using, copying, browsing, searching, or harming company data
Output fraud
Output can be stolen, copied, or misused
- television like signals