FORENSIC ACCOUNTING - BA124 - 2010Slide 17-1 Today’s Topics n E-Commerce Fraud n E-Commerce Fraud Risks n E-Commerce Fraud Prevention.

Slides:



Advertisements
Similar presentations
Internal Control–Integrated Framework
Advertisements

Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Control and Accounting Information Systems
Introduction to the Investigative Audit Services Group.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
FORENSIC ACCOUNTING - BA124 – Spring 2015 Today’s Topics n Why Fraud? n Who commits fraud n The fraud triangle n Pressures n Opportunity and control issues.
Managing Fraud Risk in Government 2015 IIA District Conference March 10, 2015 David A. King, CPA, CFE – Director, Special Investigations North Carolina.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
FORENSIC ACCOUNTING - BA124 – Fall 2008Slide 2-1 Today’s Topics n Why Fraud? n Who commits fraud n The fraud triangle n Pressures n Opportunity and control.
FORENSIC ACCOUNTING - BA124 – Fall 2010Slide 3-1 Today’s Topics n Fighting Fraud n Fraud prevention n Early detection n Fraud investigations n Legal intervention.
1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
FORENSIC ACCOUNTING - BA124 - Fall 2007Slide 17-1 Today’s Topics n E-Commerce Fraud n E-Commerce Fraud Risks n E-Commerce Fraud Prevention n Shenanigan.
FORENSIC ACCOUNTING - BA124 – Spring 2008Slide 2-1 Today’s Topics n Why Fraud? n Who commits fraud n The fraud triangle n Pressures n Opportunity and control.
FORENSIC ACCOUNTING - BA124 - Spring 2005Slide 4-1 Today’s Topics n Preventing Fraud-Part II n Eliminating opportunities for fraud n Dealing with Fraud.
Managing Fraud Risk in Higher Education 2014 UNC Fall Controller's Workshop November 10, 2014 David A. King, CPA, CFE – Director, Special Investigations.
FORENSIC ACCOUNTING - BA124 – Fall 2010Slide 5-1 Today’s Topics n Preventing Fraud-Part II n Eliminating opportunities for fraud n Dealing with Fraud.
FORENSIC ACCOUNTING - BA124 – Fall 2011Slide 2-1 Today’s Topics n Why Fraud? n Who commits fraud n The fraud triangle n Pressures n Opportunity and control.
Chapter 19 Security.
The University of California Strengthening Business Practices: The Language of Our Control Environment Dan Sampson Assistant Vice President Financial Services.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Chapter 4 Internal Controls McGraw-Hill/Irwin
Who Watches the Watchers Tyler Hamilton Marissa Kaprow Jeff Reifeiss.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Fraud Examination, 3E Chapter 4: Preventing Fraud
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Chapter 9: Introduction to Internal Control Systems
Preventing Fraud: What are the central securities depositories doing to mitigate this risk? Cancún, May 21, 2015.
Risk Management Reconstructed Implementing fraud risk intelligence practices July 2011 KPMG FORENSIC SM.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Where’s the Money Going? 10 Things You Should Know about Internal Controls and Fraud Donna S. Brown, CPA Bob Powell, CPA November 12, 2010.
FORENSIC ACCOUNTING - BA Today’s Topics n E-Commerce Fraud n Cash Flow Shenanigans n Metrics Shenanigans.
Chapter Three IT Risks and Controls.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Internal Audit Department Mission The mission of the Internal Audit Department is to promote economy, efficiency, effectiveness and accountability through.
Fraud Examination, 3E Chapter 17: Fraud in E-Commerce COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
OFFICE OF AUDIT SERVICES RANSOM MCCLUNG 1. General Information "Internal auditing is an independent, objective assurance and consulting activity designed.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
N Preventing Fraud-Part II n Eliminating opportunities for fraud n Comprehensive Fraud Fighting Model n Not the simplified “Club” diagram n Symptoms of.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Other Types of Fraud FRAUD EXAMINATION ALBRECHT & ALBRECHT Fraud in E-Commerce Chapter 15.
Unit 9: Electronic Fraud Professor Thomas Genovese.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Internal Control Systems
Operations 104 Class 6—Fraud.
Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.
Chapter 8 Auditing in an E-commerce Environment
Internal Controls For Municipalities Vermont State Auditor’s Office – August 2008.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Information Management System Ali Saeed Khan 29 th April, 2016.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud in E-Commerce Chapter 17.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Information Systems Security
Incentives / Pressure GREED Personal financial trouble
Network Security (the Internet Security)
Chapter 4 Internal Controls McGraw-Hill/Irwin
Chapter 17 Risks, Security and Disaster Recovery
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
CCP 420: FRAUD DETECTION AND MANAGEMENT
Accounting Information Systems & Computer Fraud
Presentation transcript:

FORENSIC ACCOUNTING - BA Slide 17-1 Today’s Topics n E-Commerce Fraud n E-Commerce Fraud Risks n E-Commerce Fraud Prevention

FORENSIC ACCOUNTING - BA Slide 17-2 E-Commerce The Good, The Bad & The Ugly n The Good n Faster, cheaper and less prone to error n Customer centric n The Bad n Hardware issues…spotted owl disease n False sense of organization n Initial cost and implementation issues n Emerging economy issues…haves and have-nots n The Ugly n The bad guys and hackers…our focus today

FORENSIC ACCOUNTING - BA Slide 17-3 Consider This… n The race to 60 million users n Radio—30 years n TV—15 years n The Internet—3 years to 90 million users

FORENSIC ACCOUNTING - BA Slide 17-4 E-Commerce Fraud Risks n P – O – R…see text

FORENSIC ACCOUNTING - BA Slide 17-5 E-Commerce Fraud Prevention n Difficult to impact pressure and rationalization at this time n Lack of personal contact with fraudsters n Avoid “iffy” situations and “sketchy” firms n Focus on reducing opportunities

FORENSIC ACCOUNTING - BA Slide 17-6 Prevention in the Opportunity Sector n The control environment n Integrity and ethics n Board and Audit Committee involvement n Tone at the Top n Human resource policies and practices (training) n Risk assessment efforts n Implementation of control activities

FORENSIC ACCOUNTING - BA Slide 17-7 Risk Assessment n Data theft is the big issue…not cash n Sniffing for passwords n Unauthorized password access n False identification of users n Spoofing for headers and “IP” (protocol models) n Impersonation of customers n False or misleading websites n Hijacking to copy-cat websites

FORENSIC ACCOUNTING - BA Slide 17-8 Prevention Through Control Activities n Separation of duties n Authorization techniques n Firewalls n Passwords n Digital signatures n Biometrics n Documentation and encryption n Physical control n Independent assessment (operational auditing) n On-going not spot-checking

FORENSIC ACCOUNTING - BA Slide 17-9 E-Commerce Fraud Detection n Proactive posture n On-going analysis and effort n Defending the Digital Frontier, Mark Doll, Sajay Rai and Jose Granado. Ernst & Young, LLP.