download

Matakuliah : F0184/Audit atas Kecurangan
Tahun
: 2007
Computer Fraud
Pertemuan XV
Learning Outcomes
• Mahasiswa diharapkan dapat mengidentifikasi metodemetode kecurangan berbasis komputer
• Mahasiswa diharapkan mampu mengetahui
pengendalian yang diperlukan untuk mengatasi
kecurangan berbasis komputer
3
Bina Nusantara
Outline Materi
•
•
•
•
•
Computer fraud category
Computer Fraud Theory
Nature of Computer Fraud
Type of Computer Fraud
Internal Control for Computer Fraud
4
Bina Nusantara
Category of Computer Crime
Vandalism (against computers)
Information or property theft
Financial fraud or property theft
Unauthorized use or sale of software or application
Bina Nusantara
Computer Crime Theory
Motivations
Method
Opportunities
Means
Bina Nusantara
Motivations
Motivation is explained about why and the actor (who)
Personal Causations:
‡ Economic
‡ Ideological
‡ Egocentric
‡ Psychotic
Bina Nusantara
Opportunities
Opportunities explained about what, when, and where
Caused by:
Ω Inadequate internal controls
Ω Application controls
Ω Access controls
Ω Inadequacies in management controls
Ω Reward system
Ω Ethic
Ω Interpersonal trust
Bina Nusantara
Means
Means is explaining about “how” they compromise the
system:
Compromising controls
Compromising personnel
Compromising technology
Bina Nusantara
Methods
Method is perform by falsifying or destroying:
 Input scams
 Throughput scams
 Output scams
Bina Nusantara
Common Computer Crime
False vendor invoice
Bina Nusantara
False governmental
benefit claim
False fringe benefit
claim
False payroll claim
False expense claim
False refund or
credit claim
Critical Issues in Information Security
•
•
•
•
•
•
Access Controls
Accuracy
Auditing
Authentication
Availability
Back up and
Recovery
• Counterfeiting
• Cryptography
Bina Nusantara
•
•
•
•
Data interception
Disaster Planning
Diversion of Asset
Destruction of
Records
• Electronic Fund
Transfers
• Embezzlement
• Espionage
Critical Issues in Information Security (Con’t)
• Ethics
• False Entries
• Fraudulent financial
statements
• Hacking
• Impersonation
• Integrity
• Piracy
• Privacy
Bina Nusantara
• Proprietary
information theft
• Social Engineering
• Terrorism
• Theft of data, time,
and supplies
• Timeliness of entries
• Toll Fraud
• Viruses