Chapter 4 Control of Accounting Information Systems Module
Chapter 4 Control of Accounting Information Systems Module
COMPUTER FRAUD
Threats to Accounting Information Systems
THREATS EXAMPLES
Natural and political disasters • Fire or excessive heat
• Floods, earthquakes, landslides, hurricanes, tornadoes,
blizzards, snowstorms, and freezing rain
• War and attacks by terrorists
Software errors and equipment • Hardware or software failure
malfunctions • Software errors or bugs
• Operating system crashes
• Power outages and fluctuations
• Undetected data transmission errors
Unintentional acts • Accidents caused by human carelessness, failure to
follow established procedures, and poorly trained or
supervised personnel
• Innocent errors or omissions
• Lost, erroneous, destroyed, or misplaced data
• Logic errors
• Systems that do not meet company needs or cannot
handle intended tasks
Intentional acts (computer • Sabotage
crimes) • Misrepresentation, false use, or unauthorized disclosure
of data
• Misappropriation of assets
• Financial statement fraud
• Corruption
• Computer fraud – attacks, social engineering, malware,
etc.
Sabotage – an intentional act where the intent is to destroy a system or some of its components
Cookie – a text file created by a Web site and stored on a visitor’s hard drive.
- Store information about who the user is and what the user has done on the site
Introduction to Fraud
- Any and all means a person uses to gain an unfair advantage over another person
- Legally, for an act to be fraudulent there must be:
1. A false statement, representation, or disclosure
2. A material fact, which is something that induces a person to act
3. An intent to deceive
4. A justifiable reliance; that is, the person relies on the misrepresentation to take an
action
5. An injury or loss suffered by a victim
Association of Certified Fraud Examiners (ACFE) – conducts comprehensive fraud studies
▪ Most fraud perpetrators are knowledgeable insiders with the requisite access, skills, and
resources. Because employees understand a company’s system and its weaknesses, they are
better able to commit and conceal a fraud. The controls used to protect corporate assets
make it more difficult for an outsider to steal from a company. Fraud perpetrators are often
referred to as white-collar criminals.
- Usually resort to trickery or cunning, and their crimes usually involve a violation of trust or
confidence.
Corruption – dishonest conduct by those in power and it often involves actions that are illegitimate,
immoral, or incompatible with ethical standards.
Investment fraud – misrepresenting or leaving out facts in order to promote an investment that
promises fantastic profits with little or no risk.
• Many employees did not believe taking company data is equivalent to stealing.
• The most significant contributing factor in most misappropriations is the absence of internal
controls and/or the failure to enforce existing internal controls.
• A typical misappropriation has the following important elements or characteristics. The
perpetrator:
✓ Gains the trust or confidence of the entity being defrauded.
✓ Uses trickery, cunning, or false or misleading information to commit fraud
✓ Conceals the fraud by falsifying records or other information
✓ Rarely terminates the fraud voluntarily
✓ Sees how easy it is to get extra money; need or greed impels the person to continue.
Some frauds are self-perpetuating; if perpetrators stop, their actions are discovered.
✓ Spends the ill-gotten gains. Rarely does the perpetrator save or invest the money.
Some perpetrators come to depend on the “extra” income, and others adopt a
lifestyle that requires even greater amounts of money. For this reason, there are no
small frauds – only large ones that are detected early.
The ACFE found that an asset misappropriation is 17 times more likely than fraudulent financial
reporting but that the amounts involved are much smaller. As a result, auditors and
management are more concerned with fraudulent financial reporting even though they are
more likely to encounter misappropriations.
Fraud Triangle
Pressures That Can Lead to Employee Fraud
FINANCIAL EMOTIONAL LIFESTYLE
• Living beyond one’s • Excessive greed, ego, pride, • Gambling habit
means ambition • Drug or alcohol
• High personal • Performance not recognized addiction
debt/expenses • Job dissatisfaction • Sexual relationships
• “Inadequate” • Fear of losing job • Family/peer pressure
salary/income • Need for power or control
• Poor credit ratings • Overt, deliberate nonconformity
• Heavy financial losses • Inability to abide by or respect rules
• Bad investments • Challenge of beating the system
• Tax avoidance • Envy or resentment against others
• Unreasonable • Need to win financial one-
quotas/goals upmanship competition
• Coercion by bosses/top
management
Opportunity – the condition or situation that allows a person or organization to commit and conceal
a dishonest act and convert it to personal gain
- the condition or situation, including one’s personal abilities, that allows a perpetrator to do
three things:
1. Commit the fraud
2. Conceal the fraud
3. Convert the theft or misrepresentation to personal gain
Rationalization – the excuse that fraud perpetrators use to justify their illegal behavior.
Computer Fraud
Computer Fraud – any fraud that requires computer technology to perpetrate it.
Examples:
Unauthorized theft, use, access, modification, copying, or destruction of software, hardware,
or data
Theft of assets covered up by altering computer records
Obtaining information or tangible property illegally using computers
`
Data Fraud
Computer
Instructions
Fraud
COMPUTER ABUSE TECHNIQUES
Hacking – unauthorized access, modification, or use of an electronic device or some element of a
computer system
Hijacking – gaining control of someone else’s computer to carry out illicit activities, such as sending
spam without the computer user’s knowledge
Botnet – a network of powerful and dangerous hijacked computers that are used to attack systems
or spread malware
Zombie – a hijacked computer, typically part of a botnet, that is used to launch a variety of internet
attacks
Bot herder – the person who creates a botnet by installing software on PCs that responds to the bot
herder’s electronic instructions
Denial-of-Service (DoS) attack – a computer attack in which the attacker sends so many e-mail
bombs or web page requests, often from randomly generated false addresses, that the Internet
service provider’s e-mail server or the web server is overloaded and shuts down
Spamming – simultaneously sending the same unsolicited message to many people at the same
time, often in an attempt to sell something
CONTROL FRAMEWORKS
Organizations have not adequately protected data for several reasons:
• Some companies view the loss of crucial information as a distant, unlikely threat.
• The control implications of moving from centralized computer systems to Internet-based
systems are not fully understood.
• Many companies do not realize that information is a strategic resource and that protecting
it must be a strategic requirement.
Example:
One company lost millions because it did not protect data transmissions. A competitor
tapped into its phone lines and obtained faxes of new product designs.
• Productivity and cost pressures motivate management to forgo time-consuming control
measures.
Threat/Event – any potential adverse occurrence or unwanted event that could injure the AIS or the
organization.
Exposure/Impact – the potential dollar loss should a particular threat become a reality.
Any potential adverse occurrence is called a threat or an event. The potential monetary loss
from a threat is called the exposure or impact. The probability that it will happen is called the
likelihood of the threat.
Internal Controls
Internal controls – the processes and procedures implemented to provide reasonable assurance that
the following control objectives are met.
3. Corrective controls – identify and correct problems as well as correct and recover from the
resulting errors.
Example: maintaining back up copies of files, correcting data entry errors, and resubmitting
transactions for subsequent processing.
1. General controls – make sure an organization’s control environment is stable and well
managed.
Examples: security; IT infrastructure; and software acquisition, development, and
maintenance controls
2. Application controls – prevent, detect, and correct transaction errors and fraud in
application programs.
- Concerned with the accuracy, completeness, validity, and authorization of the data
captured, entered, processed, stored, transmitted to other systems, and reported.
1. Security – access (both physical and logical) to the system and its data is controlled and
restricted to legitimate users.
4. Processing integrity – data are processes accurately, completely, in a timely manner, and
only with proper authorization,
5. Availability – the system and its information are available to meet operational and
contractual obligations.
1. Assess threats
and select risk
response
2. Develop and
4. Monitor
communicate
performance
policy
3. Acquire and
implement
solutions
Preserving Confidentiality
Identify and
classify Encryption
information
Preservation of
Confidentiality
and Privacy
Privacy
Data masking – a program that protects privacy by replacing personal information with fake values.
Privacy Concerns
GAAP identified and defines the following 10 internationally recognized best practices for
protecting the privacy of customers’ personal information:
1. Management 6. Access
2. Notice 7. Disclosure to third parties
3. Choice and consent 8. Security
4. Collection 9. Quality
5. Use and retention 10. Monitoring and enforcement
PROCESSING INTEGRITY AND AVAILABILITY OF CONTROLS
Application Controls for Processing Integrity
PROCESS STAGE THREATS/RISKS CONTROLS
Input Data that is: Forms design, cancellation and storage of
• Invalid documents, authorization and segregation
• Unauthorized of duties, controls, visual scanning, data
• Incomplete entry controls
• Inaccurate
Processing Errors in output and stored data Data matching, file labels, batch totals,
cross-footing and zero balance tests, write-
protection mechanisms, database
processing, integrity controls
Output • Use of inaccurate or Reviews and reconciliations, encryption
incomplete reports and access controls, parity checks,
• Unauthorized disclosure message acknowledgement techniques
of sensitive information
• Loss, alteration, or
disclosure of information
in transit