CD–206 •

advertisement
4838 Wilkinson Apps pp 203-241 8/9/99 10:04 AM Page 206
CD–206
•
APPENDIX 7.2
A Certified Fraud Examiner (CFE) is often contacted
to conduct a scientific fraud investigation. The CFE’s first
step is to gather and analyze the relevant data to determine whether predication is sufficient to proceed further. Sufficient predication is the basis for creating a
hypothesis of a specific fraud. That is, the CFE, based on
an evaluation of the initial fraud indicators, decides
whether enough evidence exists to proceed further. The
next step is to test the hypothesis by gathering sufficient
evidence through interviews, document examinations,
and observation. At the conclusion of evidence gathering, the CFE prepares a written report that does or does
not support the allegation of fraud or is inconclusive. If
warranted, the case is turned over to an attorney, who
works closely with the CFE to prosecute the case.
Fraud and Computer Crime Prevention Safeguards
With the massive number of cases of insider theft, fraud,
embezzlement, and other crimes reported in the media,
management should take proper action to prevent, detect, and deter these risk exposures. Firms should establish and enforce strong soft controls, including a written
code of professional conduct, ethics, and personnel
policies. Ethical principles should receive increased attention throughout the organization. Sound personnel
policies and controls, such as reference checks on employment applications, should be enforced. The corporate audit committee should be independent of
management and should closely monitor stakeholders’
interests. A properly developed internal audit function,
adequately staffed, can significantly reduce the probability of fraud and other computer crimes. Internal auditors should complete training courses on fraud and
computer crime, such as those offered by the Association of Certified Fraud Examiners of Austin, Texas. In addition, internal auditors and other accountants involved
in the audit function should be encouraged to become
Certified Fraud Examiners. A CFE is trained in criminology, legal elements of fraud, interrogation and investigative matters, and financial fraud.
Respondents to KPMG’s 1998 Fraud Survey have documented policies and procedures they follow for dealing
with fraud. The reported safeguards and controls and the
percentage of responding firms reporting them are as
follows.*
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
A corporate code of conduct (75%)
Reference checks on new employees (65%)
Employment contracts (48%)
Review and improvement of internal controls (47%)
Fraud audit (42%)
Ethics training (41%)
Training courses in fraud prevention and detection
(31%)
Surveillance equipment (30%)
Increased focus of senior management on the problem (29%)
Enhanced surveillance equipment (27%)
Code of sanctions against suppliers/contractors (26%)
Increased role of audit committee (16%)
Surveillance of electronic correspondence (15%)
Increased budget for internal audit (13%)
Staff rotation policy (11%)
Increased budget for security department (9%)
Although such crimes can never be eliminated, organizations that adopt the above safeguards can dramatically reduce their vulnerability.
*http://www.us.KPMG.com, p. 1.
APPENDIX 7.2
COMPUTER VIRUSES AND RELATED RISKS
A potentially significant risk exposure to information
stored on microcomputers and local-area networks
(LANs) is a computer virus. More than 17,000 computer
virus strains have been documented, and new ones appear daily. Most viruses have static or unchanging structures that render them relatively easy to detect and
destroy with the use of anti-virus software. Anti-virus software checks for, finds, and removes most types of viruses.
A computer virus is a computer program that copies
or attaches itself to a program file and causes either the
display of prankish messages or the destruction of data,
such as erasing all the files on a hard disk. Most com-
puter viruses attach themselves to either executable or
document program files.
Currently, macro viruses, which attach to document
files of word processing software packages, such as Microsoft Word, are the fastest growing viruses with thousands of documented strains. These viruses are easy to
write and easy to spread; they usually enter a PC via
e-mail attachments received from the Internet. They,
along with other types of viruses, can also be introduced
into a microcomputer or a LAN when an infected floppy
disk is copied onto a hard disk. Once attached to an executable or document file, a computer virus can remain
4838 Wilkinson Apps pp 203-241 8/9/99 10:04 AM Page 207
APPENDIX 9.1
•
•
•
•
•
Purchase and use anti-virus software
Test all software before copying onto the hard disk
Write-protect floppy disks, hard disks
Prepare backups on read-only disks of all programs and data files
Only use well-respected national bulletin board
services that screen all programs for viruses
FIGURE A7.2-1
•
•
•
•
•
•
CD–207
Do not download software from unknown public
bulletin boards
Be leery of demo programs received in the mail
from unknown sources
Shut down computers when not in use
Do not copy pirated software
Exercise common sense
Security and control measures to safeguard against computer viruses.
dormant and undetected for long periods. Usually, the
virus will carry out its intended function when it is activated by the computer’s internal clock. If the microcomputer is part of a LAN, the virus can rapidly spread to all
microcomputers in the network. For example, the Melissa
macro virus infected computer networks worldwide in
early 1999. When a computer user opened an infected Microsoft Word e-mail attachment, the virus quickly spread
to other computers by reading the user’s e-mail address
book and sending the infected attachment to the first 50
addresses. However, no real damage was done by the
Melissa virus, compared to other viruses, such as the
Chernobyl virus. This dangerous virus destroyed both the
data on a computer’s hard disk and also the computer’s
BIOS chip, making the computer unbootable.
More recent viruses with dynamic structures, called
polymorphic viruses, are much more difficult to detect
and destroy. Every time a polymorphic virus copies itself
onto another program file, it randomly scrambles its
program code, creating a new virus strain that is often
invisible to the version of the anti-virus software loaded
on the desktop or LAN. However, once the new strain
has been identified and documented, the anti-virus software will be updated by its developer and made available on its Web page for downloading.
A second category of maliciously written program code
has virus-like characteristics, but they are not true viruses.
This program code is usually written to perform one or
more destructive operations; they go by names such
as Trojan Horses, logic bombs, and worms. These nonvirus programs are usually illegally patched into a particular software package. The malicious code may be written
by dishonest programmers who want to get even with
their employers or to commit a computer crime. A Trojan
Horse is an unauthorized program code hidden inside
an application program that performs a valid function,
such as the payroll program. For example, the unauthorized code may activate each pay period to produce a
check for the programmer’s mother-in-law. This hidden
code enables the programmer to conceal an ongoing computer fraud. Like a virus, a logic bomb is a small program
inserted into another program to cause some type of destructive operation. For instance, a programmer threatened with dismissal from his job might plant a logic bomb
into accounting application software to destroy the data
files maintained on a hard disk. The programmer could set
the logic bomb to automatically go off (“explode”) shortly
after his or her termination date. A logic bomb is designed
to perform only one function. A worm is similar to a logic
bomb, except that when activated, it replicates itself by
generating random digits that fill up the entire hard disk,
thereby crashing the computer system.
Security and control measures to safeguard against
computer viruses and related virus-like programs include anti-virus software. A suggested list of safeguards
is presented in Figure A7.2-1.
APPENDIX 9.1
EXAMPLES OF DELIVERABLES TO INCLUDE IN EMERGENCY, BACKUP, AND
RECOVERY DISASTER CONTINGENCY PLANS
Emergency Plan
Important deliverables to include in this plan are the following:
1. An organization chart, showing the chain of command involved in Disaster Contingency and Re-
covery Planning (DCRP). Senior management
should appoint a DCRP manager and a second in
command to lead the DCRP.
2. A risk analysis to rank relevant risks.
3. Emergency responsibilities to be assigned to specific personnel; for example, who is to contact fire,
police, and other agencies?
Download