Week 6 And 7 - Fraud Flashcards

1
Q

What is the definition of ‘fraud’?

A

‘An intentional act by one or more individuals among management, those charged with governance employees or third parties, involving the use of deception to obtain an unjust or illegal advantage’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the element that differentiates Fraud from theft?

A

The element of deception used to obtain the illegal advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the definition of computer fraud?

A

‘Manipulation of a computer or computer data to dishonestly obtain money, property or some other advantage of value or cause a loss’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two main categories of fraud?

A
  1. Misappropriation of assets

2. Fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by the ‘misappropriation’ of assets?

A

By fraudulent means, we partake in the theft of company assets which can include physical assets (cash/Inventory) and digital assets (intellectual property/customer data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is meant by ‘Fraudulent financial reporting’?

A

‘Cooking the books’/Creative accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the average characteristics of a fraudster?

A

Man ages 40-50
University educated
Worked for an organisation for a long time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 6 reasons fraud is committed?

A
  1. Envious of wealth
  2. Corrupt corporate culture
  3. Ethic of capitalism
  4. Believe that fraud is victimless
  5. Rationalise abnormal situation (just borrowing the money)
  6. Moral justification (employer owed it to me)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The three elements that make put the fraud triangle are:

A
  1. Opportunity - There needs to be an opportunity or a sense of opportunity otherwise a fraud will not take place.
  2. Rationalisation - The person committing the fraud must be able to rationalise.
  3. Pressure - There must be an element of pressure on the individual committing the fraud.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

On the extended fraud triangle, the opportunity triangle contains what elements?

A

Commit - Can somebody commit the crime? How easy is it to commit the crime?
Conceal - How easy is it for your o avoid being caught?
Convert - How easy is it to convert the fraud into something that provides me value?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

On the extended fraud triangle, rationalisation has what three elements?

A

Attitude - What is the attitude of the employee? Corporate culture?
Justification - Can the employee justify their actions?
Lack of personal integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On the extended fraud triangle, pressure is split into between two subjects, who are they?

A

pressure can either be placed on the:

Employee
Firm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pressure on employees can come in 3 forms or a combination, what are the three forms?

A

Financial - I cant afford basic necessities.
Lifestyle - I can afford basic necessities but i cant afford ‘the finer things in life’
Emotional - My partner is pressuring me because she wants a bigger house

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pressure on a firm can occur because of three main reasons, what are they?

A

Financial - If the firm is making a loss, you’re more likely to commit a fraud.
Industrial conditions - Are other firms doing better?
Management characteristics - A culture of managerial corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

As per the fraud triangle, when looking for fraud, what three things should be looked for?

A

Pressures
Opportunities
Rationalisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the auditors responsibilities in regards to fraud?

A
  • Understand fraud
  • Discuss the risks of material fraudulent misstatements
  • Obtain information about the firm
  • Identify, assess and respond to risks
  • Evaluate the results of their audit tests - do we think fraud has occurred?
  • Document and communicate findings
  • Incorporate a technology focus
17
Q

What must be remembered when considering an auditors duty in relation to fraud?

A

They don’t have a duty to actively search for fraud

18
Q

When trying to make fraud less likely to occur in an organisation ,what sort of things can be done?

A
  • Create a culture of integrity
  • Adopt structure that minimises fraud (create governance)
  • Assign authority for the completion of business objectives.
  • Communicate business policies
19
Q

When trying to make fraud more difficult to commit within an organisation, what sort of things can be done?

A
  • Develop strong internal controls
  • Segregate accounting functions
  • Use properly designed forms
  • Require independent checks
20
Q

When trying to improve detection of fraud within an organisation, what sort of things can be done?

A
  • Assess fraud risk
  • External and internal audits
  • Open a fraud hotline
21
Q

When trying to reduce the losses from fraud within an organisation, what sort of things can be done?

A
  • Insurance

- Business continuity and disaster recovery plan

22
Q

What are the 3 types of computer attacks?

A
  1. Hacking
  2. Social engineering
  3. Malware
23
Q

In relation to hacking, what two forms can it take? And what do they mean?

A
  1. Hijacking - gaining control of a computer/system to carry out illicit activities.
  2. Botnets (Robot networks)
    Denial of service attack (DoS) - The bot herder sends lots of data into a system, too much for the system to cope with.
24
Q

What is meant by the term ‘Spoofing’?

A
  • Email spoofing
  • Caller ID spoofing (hacker changes the ID for saved numbers on your phone).
  • SMS spoofing
  • Web-page spoofing
25
Q

What are three main types of hacking with computer code?

A

Cross-site scripting (XSS) - Injects malicious code into a web application.
Buffer overflow attack - Large amount of data is sent to the input memory causing the programme to crash.
SQL injection attack - Malicious code is inserted in place of a query to get the database information.

26
Q

What is ‘man-in-the middle’ hacking?

A

The hacker is placed between a client and a host to read, modify and steal data sent between two parties.

27
Q

What is ‘piggyback’ hacking?

A

The hacker piggybacks on the communications being sent between parties to gain access into he system.

28
Q

‘Social engineering fraud’ is…

A

A type of fraud that doesn’t use technological techniques such as hacking to steal data. Instead it often relies on praying on peoples compassion in situations.

29
Q

Name 4 social engineering fraud techniques and explain what they are.

A

Identity theft - Assuming someone’s identity.
Pretext it - using a situation to divulge information or to gain access.
Posing - Creating a fake business to get sensitive information.
Phishing - Sending emails asking for victims to respond to a link that appears legitimate.
Pharming - You get redirected to a spoofed website
Shoulder surfing - Snooping or using technology to gain confidential information

30
Q

Why do people fall victim to fraud?

A

Compassion - Desire to help others.
Greed - Want a good deal or something for free.
Sex appeal - More cooperative with those who are flirting.
Sloth - Lazy habits.
Trust - will cooperate if trust is gained.
Urgency - Cooperation occurs when there is a sense of immediate need.
Vanity - More likely to cooperate when a fraudster appeals to your vanity.

31
Q

What are 5 ways in which the risk of social engineering can be mitigated?

A
  1. Never let someone into a restricted area.
  2. Never log in for someone else on a computer.
  3. never give out sensitive information over the phone or through email.
  4. Never share passwords or user ID’s.
  5. be cautious of someone you don’t know who is trying to gain access through you.
32
Q

What is ‘malware’? And name 3 different forms it can take.

A

malware is the implementation of illicit or illegal software in order to gain information or monetary gain.

  1. Spyware - Secretly monitors an collects info.
  2. keylogger - software that records users keystrokes.
  3. Trojan horse - malicious software code in an authorised program.
  4. Trap door - A set of instructions that allow users to bypass normal systems control.
  5. Virus - A section of self replicating code that attaches to a program or file.