Chapter 17 PowerPoint - Houston Community College Learning Web

Fraud Examination, 4E
Chapter 17: Fraud
in E-Commerce
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
Learning Objectives
 Understand e-commerce
fraud risk.
 Take measures to prevent
fraud in e-commerce.
 Detect e-business fraud.
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
E-commerce Fraud Risk
Pressures to Commit E-commerce Fraud
 Dramatic growth, which has created tremendous cash
flow needs.
 Merger or acquisition activity, which creates pressures
to “improve the reported financial results.”
 Borrowing or issuing stock, additional pressures to
“cook the books.”
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
E-commerce Fraud Risk
 New products, which
require intensive and
expensive marketing and
for which an existing
market does not yet exist.
 Unproven or flawed
business models, with
tremendous cash flow
pressures.
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
E-commerce Fraud Risk
Opportunities to Commit E-commerce Fraud
 New and innovative technologies for which security
developments often lag transaction developments.
 Complex information systems that make installing
controls difficult.
 The transfer of large amounts of information, a factor
that poses theft and identity risks such as illegal
monitoring and unauthorized access.
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
E-commerce Fraud Risk
 Removal of personal contact, which allows for
easier impersonation or falsified identity.
 Lack of “brick-and-mortar” and other physical
facilities that facilitate falsifying Web sites and
business transactions.
 Inability to distinguish large and/or established
companies from new and/or smaller companies,
making it easy to deceive customers by falsifying
identity and/or business descriptions.
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
E-commerce Fraud Risk
 Electronic transfer of funds, allowing large frauds to be
committed more easily.
 Compromised privacy, which results in easier theft by
using stolen or falsified information.
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
E-commerce Fraud Risk
Rationalization to Commit E-commerce Fraud
 The perceived distance that decreases the personal
contact between customer and supplier.
 Transactions between anonymous or unknown buyers
and sellers—you can’t see who you are hurting.
 New economy thinking contends that traditional
methods of accounting no longer apply.
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
E-commerce Fraud Risk
Risks Inside an Organization
 Data theft
 Social engineering
 Sniffing
 Wartrapping
 Vandalism
 Employee laptops
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
E-commerce Fraud Risk
 Risks Outside an Organization
 Computer viruses
 Spyware
 Phishing
 Spoofing
 Falsified identity
 Database query (SQL) injections
 Bust-out
 E-mail and Web visits
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
 In e-business settings, reducing pressures and eliminating
rationalizations has thus far proved difficult.
 Security Through Obscurity
 Keeping security holes, encryption algorithms, and processes secret in an
effort to confuse attackers.
 Experience shows that obscurity only heightens the challenge to a hacker!
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
 One of the best ways to prevent fraud in an e-business
settings is to focus on reducing opportunities, usually
through the implementation of appropriate internal
controls.
 Internal controls involve five different elements:
(1) The control environment
(2) Risk assessment
(3) Control activities or procedures
(4) Information and communication
(5) Monitoring
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
The following are the most important components
of the control environment:
Integrity and Ethical Values
Board of Directors and Audit Committee
Participation
Management’s Philosophy and Operating Style
Human Resources Policies and Practices
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
Risk Assessment
 Identifies the risks of doing business with e-business
partners
 Focuses on the control environment of business
partners
 Identifies the risks involved in electronic exchange or
information and money
 Intrusion detection
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
Control Activities
 Adequate separation of duties
 Proper authorization of transactions and activities
 Adequate documents and records
 Physical control over assets and records
 Independent checks on performance
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
Adequate Separation of Duties
 Make sure individuals who authorize transactions are
different from those who actually execute them.
 Doing so prevents the most common fraud in
purchasing: kickbacks and bribery.
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
Proper Authorization of Transactions and
Activities
 Passwords
 Firewalls
 Digital signatures and certificates
 Biometrics
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
Adequate Documents and Records
 Electronic Documents:
 sales invoices, purchase orders, subsidiary records,
sales journals, employee time cards, checks, etc.
 In e-commerce, additional controls must be put in
place.
 Encryption
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
Physical Control over Assets and Records
Three categories of controls protect:
 IT equipment
 Programs
 Data Files
Physical controls are used to protect computer
facilities.
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
 Independent Checks on Performance
 Organizations should always conduct checks on their e-business partners
(Dun & Bradstreet reviews, full-fledged investigations)
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Preventing Fraud in
E-commerce
 Understand the management or business partners and
what motivates them.
Three items :
 Backgrounds
 Motivations
 Decision-making influence-must be examined.
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Detecting E-commerce Fraud
Data-driven Fraud Detection
 Endeavor to understand the business or operations of
the organization
 Identify what frauds can occur in the operation
 Determine the symptoms that the most likely frauds
would generate
 Use databases and information systems to search for
those symptoms
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Detecting E-commerce Fraud
 Analyze the results
 Investigate the symptoms to determine if they are being
caused by actual fraud or by other factors
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Detecting E-commerce Fraud
 Technical Knowledge
and Experience
 It is extremely important for
fraud investigators who
specialize in e-commerce to
understand the tools and
methods that perpetrators
use.
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
Detecting E-commerce Fraud
 Web-servers
 E-mail clients and servers
 Intrusion programs (nmap, Airsnort, Wireshark,
etc.)
 Unix
 Perl, Python, Ruby and Bash scripting languages
Albrecht, Albrecht, Albrecht, Zimbelman
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license