Document 14759230

advertisement
Matakuliah : F0184/Audit atas Kecurangan
Tahun
: 2007
Computer Fraud
Pertemuan XVI
Learning Outcomes
• Mahasiswa diharapkan dapat mengidentifikasi metodemetode kecurangan berbasis komputer
• Mahasiswa diharapkan mampu mengetahui
pengendalian yang diperlukan untuk mengatasi
kecurangan berbasis komputer
3
Bina Nusantara
Outline Materi
•
•
•
•
•
Computer fraud category
Computer Fraud Theory
Nature of Computer Fraud
Type of Computer Fraud
Internal Control for Computer Fraud
4
Bina Nusantara
Characteristics of the Computer
Environment
•
•
•
•
•
Data are concentrated in one place
The storage medium is vulnerable
The audit trail may be obscure
Visible records may be nonexistent
Programs and Data can be altered leaving no trace of
the alteration
• Tampering can be carried out almost instantly
• Network increase the risks
Bina Nusantara
Characteristics of the Computer
Environment (Con’t)
•
•
•
•
Computer systems are not widely understood
Security features are not always built in
Internal control features may be inadequate
Trusted Personnel may circumvent controls
Bina Nusantara
Vulnerability in the Computer Crimes
• Almost all corporate data stored in the corporate
database
• Internal and often external parties can access to the
system
• Programs or Applications only need to be changed or
modified without permission once
• Computer system face a number of unique challenges
Bina Nusantara
Categorization of Threats to Computer
Systems
Theft, including theft of assets, data, and programs
Manipulations, including the additions or deletions of
information in data files or program
Theft of computer time
Bina Nusantara
Computer Fraud Classifications
Data
Fraud
Input
Fraud
Processor
fraud
Program
fraud
Bina Nusantara
Output
fraud
Computer Fraud Techniques
•
•
•
•
•
•
•
•
•
Adware
Data diddling
Data leakage
Denial of Service
Dictionary attack
Eavesdropping
Email forgery
Email threats
Hacking
Bina Nusantara
• Hijacking
• Identity theft
• Internet
misinformation
• Internet terrorism
• Key logger
• Logic time bomb
• Masquerading
• Packet Sniffing
Computer Fraud Techniques (Con’t)
•
•
•
•
•
•
•
Password cracking
Phishing
Phreaking
Piggybacking
Round-down
Salami techniques
Scavenging /
dumpster diving
• Shoulder surfing
Bina Nusantara
•
•
•
•
•
•
•
•
•
•
Social Engineering
Software piracy
Spamming
Spyware
Superzapping
Trap door
Trojan horse
Virus
War dialing
Worm
Prevention Method
• Develop a strong internal control system
• Proper segregation duties
• Segregate the accounting functions of authorization,
recording, and custody
• Restrict physical and remote access to authorized
personnel
• Adequate supervisory control
• Use properly designed documents and records to
capture and process transactions
• Safeguard all assets, records and data
Bina Nusantara
Prevention Method (Con’t)
• Require independent checks on performance
• Implement computer based controls over input, process,
storage, transmission, and output
• Encrypt stored and transmitted data and programs to
protect them from unauthorized access and use
• Fix known software vulnerabilities
Bina Nusantara
Download