Matakuliah : F0184/Audit atas Kecurangan Tahun : 2007 Computer Fraud Pertemuan XV Learning Outcomes • Mahasiswa diharapkan dapat mengidentifikasi metodemetode kecurangan berbasis komputer • Mahasiswa diharapkan mampu mengetahui pengendalian yang diperlukan untuk mengatasi kecurangan berbasis komputer 3 Bina Nusantara Outline Materi • • • • • Computer fraud category Computer Fraud Theory Nature of Computer Fraud Type of Computer Fraud Internal Control for Computer Fraud 4 Bina Nusantara Category of Computer Crime Vandalism (against computers) Information or property theft Financial fraud or property theft Unauthorized use or sale of software or application Bina Nusantara Computer Crime Theory Motivations Method Opportunities Means Bina Nusantara Motivations Motivation is explained about why and the actor (who) Personal Causations: ‡ Economic ‡ Ideological ‡ Egocentric ‡ Psychotic Bina Nusantara Opportunities Opportunities explained about what, when, and where Caused by: Ω Inadequate internal controls Ω Application controls Ω Access controls Ω Inadequacies in management controls Ω Reward system Ω Ethic Ω Interpersonal trust Bina Nusantara Means Means is explaining about “how” they compromise the system: Compromising controls Compromising personnel Compromising technology Bina Nusantara Methods Method is perform by falsifying or destroying: Input scams Throughput scams Output scams Bina Nusantara Common Computer Crime False vendor invoice Bina Nusantara False governmental benefit claim False fringe benefit claim False payroll claim False expense claim False refund or credit claim Critical Issues in Information Security • • • • • • Access Controls Accuracy Auditing Authentication Availability Back up and Recovery • Counterfeiting • Cryptography Bina Nusantara • • • • Data interception Disaster Planning Diversion of Asset Destruction of Records • Electronic Fund Transfers • Embezzlement • Espionage Critical Issues in Information Security (Con’t) • Ethics • False Entries • Fraudulent financial statements • Hacking • Impersonation • Integrity • Piracy • Privacy Bina Nusantara • Proprietary information theft • Social Engineering • Terrorism • Theft of data, time, and supplies • Timeliness of entries • Toll Fraud • Viruses
© Copyright 2026 Paperzz