Fraud Detection & Control: Computer Based Frauds
Fraud Detection & Control: Computer Based Frauds
By…
Henry Hardoon
CBF - Intro
• The figures issued by the NFA equate to £621 for every adult in the
UK. The report from the agency set up in October 2008 to take charge
of fighting fraud, is the UK's first comprehensive survey into the crime .
CBF - Intro
• altering or deleting stored data;
•Hackers [Hacking].
•Viruses.
•Fraud.
•Phreakers.
•Data fiddling
•Crackers
•
Crackers cont…
• White hat
• Grey hat
• Black hat
• A black hat hacker, sometimes called "cracker", is
someone who breaks computer security without
authorization or uses technology (usually a computer,
phone system or network) for vandalism, credit card fraud,
identity theft, piracy, or other types of illegal activity.
Crackers cont…
• Script kiddie
• Cash/Accounts Receivable
• A resources problem?
• A people problem?
• A systems problem?
• A culture problem?
• A country problem?
• A global problem?
Auditing around the computer
•No of complaints
•Lots of Journals
– CCTV
– Passwords
– Access rights
Using computer controls to control
CBF
• Spyware gets onto your system through
the manipulation of a technology
called ActiveX
Use software to control to Stop Spyware (which is often
used in computer fraud)
•Configure and blacklists whitelists
http://www.fraudbreaker.com/fraudbreaker-hosted-fraud-detection-software
Using substantive testing to control
CBF
Input/output reconciliations
Installation review
Test packs
Using Embedded audit facilities
Embedded Audit Modules are utilised to monitor ongoing
processes and to discreetly alert internal auditors to possible
irregularities, errors or weak areas.
These include:
• Computer operations
• Systems programming
• Transaction authorization