Nothing Special   »   [go: up one dir, main page]

Individual Task - Chapter Summary - Week 5 - Shafa Haliza R. S.

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

CHAPTER 5

Natural and political disasters may disrupt a system of information and lead many
businesses to collapse. The second form of danger is software bugs, crashing the operating
system, hardware glitches, outages and fluctuations in power, as well as undetected data
transfer errors. The third category of danger, incidents, and unintentional mistakes and
failures, is the greatest risk to ICAs that leads to the greatest loss of the dollar. The fourth
category of danger is deliberate acts, such as a cyber-crime, fraud, or sabotage, which
deliberately damage a device. The one that increasingly susceptible to threats are the
information systems. Fraud is unfairly advantageous to anyone else. Any year, the annual
economic damages caused by fraudulent activities are tremendous.

The majority of those responsible for fraud are expert insiders who have the access,
experience and tools necessary to do so. Due to the understanding of the scheme and its
vulnerabilities by staff, they can conduct and hide theft more effectively. Fraud perpetrators
are sometimes referred to as criminals with white collars. Many different kinds of fraud are
committed. Corruption is a misleading behavior by powerful people that sometimes implies
illegal, unethical and ethical-incompatible acts. Investment fraud is misrepresenting or
putting behind evidence to foster an investment that guarantees great returns without or with
no risk. The misappropriation of assets and fraudulent financial reporting are two examples of
fraud of business importance. To prevent this, auditors have the responsibility to detect fraud
which was written in SAS NO. 99 (AU-C SECTION 240).

For most fraud perpetrators, all the needs of the fraudster are an incentive and the
criminal attitude which permits them to commit fraud. Three requirements apply to most
first-time fraud offenders. It's a pressure, an opportunity and a rationalization. This known as
The Fraud Triangle. Computer fraud is a fraud which must be carried out by computer
technology. The number of accidents, the gross losses of the dollars and the complexity of
criminals and data fraud programs are increasingly growing. There are many kinds of
computer fraud. Input fraud is the most general and straightforward way to commit data fraud
by changing or falsifying computer inputs. Processor fraud involves illegal use of the device,
including electronic time stealing and utilities. Computer instructions fraud involves
manipulation of organization files, unlawful copying of software, improper use of software,
and the development of software to perform unauthorized activities. The illegal use, copy,
navigation, search or damage to company data is data fraud. Output fraud is when output may
be hacked, replicated or misused unless properly guaranteed, displayed or printed. In order to
prevent fraud, companies must build an environment that will lower their likelihood of fraud,
make it harder to commit them, develop mechanisms of identification and lessen the impact
of fraud lost.
CHAPTER 6
The Internet is being attacked by hackers, foreign governments, militant
organizations, disaffected workers, industrial spies and competitors on all computers
associated, particularly with essential business secrets and valuable IT properties. They target
machines that search for useful data or attempt to damage the machine. Hacking means
unauthorized entry, change or use of an electronic device or other computer system feature.
Most hackers break into networks with identified bugs or because of weak access restrictions
on the operating systems or applications. Spamming means sending the same unwanted
message instantly to several users, sometimes in an effort to sell something. Spoofing makes
an electronic message sound like someone else is sending it to the receiver's confidence.

Hackers use a lot of method to attack the internet, especially IT business. One of the
examples is a zero-day attack, which is an intrusion between the discovery of a new security
flaw and the availability of a patch by a software developer. Cross-Site Scripting (XSS), a
flaw in dynamic web pages, helps an attacker to circumvent the safety protocols of a browser
by telling the victim's browser to run code that they believe has been derived from the desired
web site. When data entered in a program is larger than the quantity of stored memory that is
requested, a buffer overflow attack occurs. In a SQL insertion attack, malicious code is
embedded in the input as a SQL query so the application layer can move to and perform it.
A man-in-the-middle (MITM) attack puts a hacker between a customer and a server and
intercepts their network communication.

Social engineering means the process or psychological tricks that individuals are
using to conform with the perpetrator's desires to enter a house, a device, a server or a
network physically or logically. In general, the information required to enter a device and
collect sensitive data that is collected. Also there are various of social engineering issues. For
an example, identity theft, when someone assumes the identity of another through unlawful
obtaining and use of personal records, typically for financial gain. Pretexting is when
someone uses an invented example to maximize the chance that a victim discloses data or
does something. Phishing is sending a message that claims to be a legitimate organization,
normally a financial entity, requests information or verifications and always warns of any
negative consequences if it is not given.

Malware is any program used for harming others. Malware is both a chronic and
increasing threat and a costly one. The majority of malware is caused by a remote intruder
installing or injecting it. It spreads across many approaches, including shared file access, e-
mail connections, and vulnerabilities in remote access. Continue to the fraud method, one of
the examples are adware, which is spyware that can show banner ads on a computer, gather
site surveys, and purchasing preferences from the customer and send them to the adware
developer. Scareware is malicious, low-profit or non-profit malware and marketed with scare
tactics. In other words, it uses anxiety to inspire users.

You might also like