Question

In: Accounting

Forensic accountants and fraud examiners need to understand the difference between computer crime and computer fraud....

Forensic accountants and fraud examiners need to understand the difference between computer crime and computer fraud. They need to articulate whether the computer was the target of the crime or a tool used in committing the crime. Computer fraud is prosecuted under a fraud statute, such as wire fraud; while computer crime is prosecuted under the computer fraud and abuse act.

Discussion topic 2: Cyber Attacks

Define the term hacking.

How might a computer hacker illegally gain access to a computer and manipulate data?

What are computer viruses and how do they enter computer systems? What kind of harm can they do to a company’s computer system?

Give an example of a computer virus.

Solutions

Expert Solution

Solution:-

Define the term hacking:-

Breaking into computer systems, such as telecommunication systems, by determining the vulnerabilities of various hardware and software components and using technology to systematically "guess" the authorized user's access codes for the purpose of gaining unauthorized access to computer systems and the information contained therein.

How might a computer hacker illegally gain access to a computer and manipulate data:-

Hackers generally use various "rogue" software applications to penetrate a system. Sometimes hackers secretly incorporate unsuspecting computer owners into their schemes by installing programs that are downloaded via an e-mail or by visiting a website. These programs operate in the background of the infected computer and can disable security settings and capture information that is then sent back to the hacker.

The most common way is to use someone else's user name and password, or generate without authorization a system-acceptable user name and password. Other ways may include, trojan horse, trap doors, salamic techniques, logic bombs, etc.

What are computer viruses and how do they enter computer systems? What kind of harm can they do to a company’s computer system:-

Viruses are hidden computer programs that use computer resources or other computer activities in such a way as to shut down or slow it down significantly. Computer viruses typically use the infected computer's resources to replicate itself and spread the infection to other systems on networks or through the internet via e-mail, text messages, or other electronic medium.

Give an example of a computer virus

Macro Virus - a macro is an instruction that automatically carries out program commands.

Application Software Viruses - these type of viruses copy their virus code to a program file and modify the program so the virus code gets executed first.

Network Viruses - these generally are developed to attack the file servers. The boot sector and partition table viruses infect the boot operation of the file server.

Worms - a worm is a self-replicating program which resides as a file on a system, executes an autonomous process, and deliberately moves from system to system. It looks fr other nodes on the networks, copies itself to them, and causes the self-copy to execute on other nodes.


Related Solutions

What role do forensic accountants/fraud examiners, leaders play in the development, execution and enforcement of these...
What role do forensic accountants/fraud examiners, leaders play in the development, execution and enforcement of these programs?
Fraud Detection Methods: Describe the various fraud detection methods used by auditors and forensic accountants to...
Fraud Detection Methods: Describe the various fraud detection methods used by auditors and forensic accountants to uncover fraudulent activity.
Describe the various fraud detection methods used by auditors and forensic accountants to uncover fraudulent activity.
Describe the various fraud detection methods used by auditors and forensic accountants to uncover fraudulent activity.
Need assistance in Forensic Accounting 1- What is the difference between an open-ended question and a...
Need assistance in Forensic Accounting 1- What is the difference between an open-ended question and a closed ended question? 2- Provide at least 5 examples of each type of question for your choice of case i.e. procurement. Thanks
I need to write a research paper on the methods used by forensic accountants to discover...
I need to write a research paper on the methods used by forensic accountants to discover corporate fraud. I want to find out how corporate governance uncovered scandals like Enron and WorldCom. Are there any pointers, example outlines, or research suggestions to be able to write a 5-7 paper on the subject?
a. Apart from fraud related investigations, what other investigations are forensic accountants commonly engaged in? b....
a. Apart from fraud related investigations, what other investigations are forensic accountants commonly engaged in? b. What are the three essential characteristics possessed by a forensic accountant?
3. Find a recent article of news that is related to computer crime or Accounting Fraud...
3. Find a recent article of news that is related to computer crime or Accounting Fraud or Identity theft, Summarize it and tell me how it was detected and what was the punishment. 2-3 paragraphs. Use the internal control power points and chapter 11 from the AIS book as well.
In a few paragraphs discuss why accountants need to understand information systems in the work they...
In a few paragraphs discuss why accountants need to understand information systems in the work they do. Use support from the course content and/or online research. Did anything about some of the roles accountants play surprise you?
I need an introduction to computer fraud and how it happens in the accounting environment
I need an introduction to computer fraud and how it happens in the accounting environment
I need a literature review of understanding computer fraud in an accounting environment
I need a literature review of understanding computer fraud in an accounting environment
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT