1. Trang chủ
  2. » Giáo án - Bài giảng

Accounting information systems 12th SIMKIN and norman chapter 11

43 481 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 43
Dung lượng 0,91 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Chapter 11: Computer Crime, Fraud, Ethics, and Privacy Introduction Computer Crime, Abuse, and Fraud Three Examples of Computer Crimes Preventing Computer Crime and Fraud... Computer Cri

Trang 1

Chapter 11: Computer Crime, Fraud,

Ethics, and Privacy

Introduction

Computer Crime, Abuse, and Fraud

Three Examples of Computer Crimes

Preventing Computer Crime and Fraud

Trang 2

Computer Crime, Abuse, and Fraud

High level of public interest

Data on incidents is limited

Sources of information

Computer Security Institute (CSI) annual survey

KPMG surveys

Trang 3

Computer Crime, Abuse, and Fraud

Computer Crime

Manipulation of a computer or computer data

Dishonestly obtain money, acquire property, or

something of value, or cause a loss

Computer Abuse

Trang 4

Computer Crime Examples

Trang 5

Computer Crime, Abuse, and Fraud

Fraudulent Financial Reporting

Intentional falsification of accounting records

Intend to mislead analysts, creditors, investors

Misappropriation of Assets

Misuse of company assets

Trang 6

Asset Misappropriation

Examples

Trang 8

CFAA Fraudulent Acts

Unauthorized theft, use, access, modification,

copying, or destruction of software or data

Theft of money by altering computer records or the theft of computer time

Intent to illegally obtain information or tangible

Trang 9

CFAA Fraudulent Acts

Use, or the conspiracy to use, computer

resources to commit a felony

Theft, vandalism, destruction of computer

hardware

Trafficking in passwords or other login

information for accessing a computer

Trang 10

Federal Legislation Affecting

the Use of Computers

Trang 11

Federal Legislation Affecting

the Use of Computers

Trang 12

State Legislation

Every state has a computer crime law

State law provisions

Define computer terms

Define some acts as misdemeanors

Declare other acts as felonies

Trang 13

Study Break #1

Which of the following pieces of computer legislation is

probably the most important?

A Cyber Security Enhancement Act of 2002

B Computer Security Act of 1987

C The Computer Fraud and Abuse Act of 1986

D Federal Privacy Act of 1974

Trang 14

Study Break #1 - Answer

Which of the following pieces of computer legislation is

probably the most important?

A Cyber Security Enhancement Act of 2002

B Computer Security Act of 1987

C The Computer Fraud and Abuse Act of 1986

D Federal Privacy Act of 1974

Trang 15

Study Break #2

Which legislation might help discourage computer hacking?

A Federal Privacy Act of 1974

B Computer Fraud and Abuse Act of 1986

C USA Patriot act of 2001

D CAN-SPAM Act of 2003

Trang 16

Study Break #2 - Answer

Which legislation might help discourage computer hacking?

A Federal Privacy Act of 1974

B Computer Fraud and Abuse Act of 1986

C USA Patriot act of 2001

D CAN-SPAM Act of 2003

Trang 17

Computer-Crime Statistics

Limited availability of data

Private companies handle abuse internally

Most computer abuse is probably not discovered

Growth of computer crime

Exponential growth in use of computer resources

Trang 18

Importance of Computer Crime and Abuse to AISs

Impact on AISs

Favored target due to control of financial resources

Prized target for disgruntled employees

Responsible for designing, selecting, and implementing

controls that protect AISs

Reliance on auditors to verify financial statement

Additional Items

Trang 19

Compromising Valuable Information:

The TRW Credit Data Case

Summary

Credit rating company

Altered company credit ratings for a fee

Clients relied on inaccurate information

Analysis

Trang 20

Wire Fraud and Computer Hacking:

Edwin Pena and Robert Moore

Summary

Voice over Internet Protocol (VoIP)

Hacked into other provider’s network

Billed those companies

Analysis

Trang 22

Protecting Systems

Preventing Viruses

Firewalls

Antivirus software

Antivirus control procedures

Organizational Control Procedures

Discourage free exchange of computer disks or external

programs

Trang 23

Common Types of Computer

Crime and Abuse

Trang 24

Preventing Computer Crime

and Fraud

Enlist Top-Management Support

Increase Employee Awareness and Education

Assess Security Policies and Protect Passwords

Strong passwords

Social engineering

Trang 25

10 Simple Steps to Safer PCs

Trang 26

10 Simple Steps to Safer PCs

Trang 27

Preventing Computer Crime

Education, Gender, and Age

Don’t Forget Physical Security

Trang 28

Occupations of Computer

Abuse Offenders

Trang 29

Fraud Losses and Education

Level of Perpetrator

Trang 31

Study Break #3

Which of these is not helpful in attempting to thwart

computer crime and abuse?

A Enlist the support of top management

B Keep employees in the dark so that they cannot perpetrate them

C Use strong passwords

Trang 32

Study Break #3 - Answer

Which of these is not helpful in attempting to thwart

computer crime and abuse?

A Enlist the support of top management

B Keep employees in the dark so that they cannot perpetrate them

C Use strong passwords

Trang 33

Study Break #4

Most computer criminals:

A Have nontechnical backgrounds

B Have noncriminal backgrounds

C Have little college education

D Are young and bright

E Have probably not been caught, so we don’t know much

Trang 34

Study Break #4 - Answer

Most computer criminals:

A Have nontechnical backgrounds

B Have noncriminal backgrounds

C Have little college education

D Are young and bright

E Have probably not been caught, so we don’t know much

Trang 35

Ethical Issues, Privacy, and

Identity Theft

Ethics

A set of moral principles or values

Governs organizations and individuals

Ethical behavior

Making choices and judgments that are morally

Trang 36

Ethical Issues, Privacy, and

Identity Theft

Ethical Issues and Professional Associations

Codes of Ethics/Professional Conduct

Certification programs and Ethics committees

Meeting the Ethical Challenges

Inform employees of importance of ethics

Ethics training

Trang 37

Ethical Issues in Computer

Usage

Trang 38

Ethical Issues, Privacy, and

Identity Theft

Company Policies with Respect to Privacy

Who owns the computer and data stored on it?

What purposes the computer may be used?

What uses are authorized or prohibited?

Identity Theft

Dumpster diving

Trang 39

Identity Theft Methods

Trang 41

Study Break #5 - Answer

Smishing is a form of:

A Dial-back system

B Local area network

C Computer worm

D Identity theft

Trang 42

Copyright 2012 John Wiley & Sons, Inc All rights reserved

Reproduction or translation of this work beyond that permitted in

Section 117 of the 1976 United States Copyright Act without the

express written permission of the copyright owner is unlawful

Request for further information should be addressed to the

Permissions Department, John Wiley & Sons, Inc The purchaser

may make backup copies for his/her own use only and not for

distribution or resale The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the

Trang 43

Chapter 11

Ngày đăng: 13/05/2017, 09:02

TỪ KHÓA LIÊN QUAN