Chapter Ten

Computer Fraud and Countermeasures

COMPUTER FRAUD involves the use of the computer in some way to obtain an advantage or cause loss of something of value by dishonest means. With the rapid expansion of information technology into everyday life and business, the opportunities are increasing at an exponential rate.

QUESTIONS: FILL IN THE BLANKS

Refer to Chapter 10 in Corporate Fraud and Internal Control: A Framework for Prevention.

1. ___________ bears primary responsibility for the prevention and detection of all frauds, including information technology frauds.
2. At the heart of the computer, and the target of most fraudulent activities, is the ___________ of the organization.
3. Legitimate users can process ___________ , and legitimate technical users may be able to manipulate the raw data directly without the need to process transactions by direct manipulation of the data contained in databases.
4. Within the mainframe, the organization's ___________ carry out the business functions as programmed. Built into them are the ___________ , such as segregation of duties, reconciliations, user authentication, and the vast array of antifraud controls that organizations have built up over the years. These controls will be dependent on the nature of the business and the types of fraud exposure faced
5. In today's environment, organizations typically operate in an ___________ ...

Get Corporate Fraud and Internal Control Workbook: A Framework for Prevention now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.