CHAPTER 4 - Fraud and Computer Attacks
CHAPTER 4 - Fraud and Computer Attacks
CHAPTER 4 - Fraud and Computer Attacks
INFORMATION SYSTEMS II
Chapter 4: Fraud and Computer
Attacks
PART 1
Fraud
Learning Objectives
• Explain the threats faced by modern information
systems.
• Define fraud and the auditor’s responsibility to detect
fraud.
• Discuss why fraud occurs
• Define computer fraud.
• Explain how to prevent computer fraud
Threats
1. Natural and Political disasters
- fire, floods, earthquakes, tornadoes, war, terrorist attack
2. Software errors and equipment malfunctions
- OS crash, undetected data transmission errors
3. Unintentional acts
- Human careless mistake, system not compatible
4. Intentional acts
- sabotage, corruption
Fraud
• Any means a person uses to gain an unfair
advantage over another person.
• Fraud is white-collar crime
• Example:
- Corruption: bribery
- Investment fraud: promote investment that
promise fantastic profits
Auditor’s Responsibility to Detect Fraud
1. Understand fraud
2. Discuss the risks of material fraudulent
misstatements
3. Obtain information
4. Identify, assess, and respond to risks
5. Evaluate the results of their audit tests
6. Document and Communicate findings
7. Incorporate a technology focus
Conditions for Fraud (Fraud Triangle)
These three conditions must be present for fraud to occur:
1. Pressure 2. Opportunity to:
• Employee • Commit
• Financial • Conceal
• Lifestyle • Convert to personal gain
• Emotional
• Financial Statement 3. Rationalize
• Financial • Justify behavior
• Attitude that rules don’t apply
• Management
• Lack personal integrity
• Industry conditions
Fraud Triangle