Avoiding Cyber Fraud in Small Businesses: What Auditors and Owners Need to Know

Overview

INCREASE THE LIFE SPAN OF YOUR SMALL BUSINESS

The average small business has a life span of about five years, and inadequate internal controls are the main cause of failure. Cyber fraud, the leading culprit today in internal criminal activity, occurs when advanced technologies are used to steal money or property. The majority of such crimes occur in-house, and the lack of sufficient capital and technological resources committed to protecting company assets makes small businesses...

See more details below
Hardcover
$54.04
BN.com price
(Save 6%)$57.95 List Price
Other sellers (Hardcover)
  • All (16) from $1.99   
  • New (6) from $15.00   
  • Used (10) from $1.99   
Sending request ...

Overview

INCREASE THE LIFE SPAN OF YOUR SMALL BUSINESS

The average small business has a life span of about five years, and inadequate internal controls are the main cause of failure. Cyber fraud, the leading culprit today in internal criminal activity, occurs when advanced technologies are used to steal money or property. The majority of such crimes occur in-house, and the lack of sufficient capital and technological resources committed to protecting company assets makes small businesses especially vulnerable. Awareness of the dangers of internal theft by computer, illegal access to information systems, credit card fraud, and Internet scams is integral-especially as auditors, business owners, and managers are increasingly held responsible for negligence.

Providing critical guidance on what auditors and businesses can do to better prevent and detect the growing number of occurrences of cyber fraud, the information in this one-of-a-kind manual:
* Protects outside auditors by supplying the knowledge to ensure they meet their responsibilities
* Protects small business owners by providing them with the necessary tools to meet due diligence requirements in cyber fraud prevention
* Focuses on the key areas of vulnerability

Take the first step in protecting your company-and your future-with Avoiding Cyber Fraud in Small Businesses, the only book committed to helping you keep your small business free of computer crime.

Read More Show Less

Editorial Reviews

Booknews
The main danger to small companies, say Bologna and Shaw, are not wild hackers out in the world, but insiders: employees, consultants, contractors, or customers who may have easy access to the computer system. Having written widely about computer security, they here explain the threats and vulnerabilities, and describe cost-effective and comprehensive asset-protection measures such as risk assessments, policies, internal controls, security systems, audits, investigations, and insurance. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780471372974
  • Publisher: Wiley
  • Publication date: 6/5/2000
  • Edition number: 1
  • Pages: 256
  • Product dimensions: 9.00 (w) x 6.00 (h) x 0.75 (d)

Meet the Author

JACK BOLOGNA, BBA, JD, CFE, is President of Computer Protection Systems, Inc. His numerous publications include The Accountant's Handbook of Fraud and Commercial Crime (Wiley).PAUL SHAW is the Editor and Publisher of Computing & Communications: Law and Protection Report and Assets Protection, periodicals that ship to over 4,000 individuals.
Read More Show Less

Read an Excerpt



1

CYBERFRAUD IS
HERE TO STAY







In the old days when computer crimes were being committed by programmers, analysts, data entry clerks, and hackers, the general public showed no great concern or alarm. But even then, data security managers saw a far more serious risk looming as computer technology became cheaper and simpler and as information systems became more accessible to more people.




EARLY COMPUTER-RELATED FRAUDS


The computer frauds discovered in earlier days were sometimes ingenious but rarely expensive from the cash point of view. New buzzwords entered the criminal lexicon to describe these high tech crimes, terms like trap doors, Trojan horses, salami-slicing and superzapping. Still, the public showed no great concern. A few (poorly drafted) computer crime laws were passed and everyone hoped that now the problem of high-technology crime would go away.

But the problem hasn't died down or gone away, nor is it likely to stop anytime soon. Cybercrime is here to stay. Why? Because there is a lot of money to be made in it and the probability of being caught is very low.

Theoretically, there are several layers and types of control that are intended to deter and detect high-tech crimes (i.e., audit controls and organizational controls). They rest on the theory that general managers and accountants are more knowledgeable about defenses to fraud, theft, and embezzlement than designing, corrupt, or incompetent employees are knowledgeable about offensive methods to compromise systems of control. Experience and logic suggest the opposite. Defense follows offense; the criminal mind always has a lead point of time. The critical question is: Has the application of modern technology to accounting systems provided more lead time to the criminal? If so, the social threat today from cybercrime is greater than at any time in the past.

Look at a couple of computer crimes of the past for perspective. The granddaddy of computer-related crimes is the Equity Funding case, a situation in which an insurance company deceived its stockholders for many years by falsely representing its revenues and profits. Both were grossly over-inflated; revenues were over-inflated to the tune of $200,000,000. The technique used to inflate revenues was simple enough. The company merely stated it had sold more insurance policies than it had in fact. The ploy used to deceive company auditors consisted of generating fictitious policies on fictitious people. This went on for five years and involved a total of 200 company employees, including top managers, most of the data processing staff, and even an outside auditor.

Why was the fraud so difficult to detect? With a conspiracy of such large and diverse proportions, how could any mortal auditor discover the fraud? In fact, the fraud was brought to a head only when a disgruntled employee left the firm and blew the whistle to an investment advisor whose clients had a fair-sized stake in the company. The auditor, in turn, advised the Securities Exchange Commission (SEC).

Other reasons for the difficulty in detecting the fraud were:

  • Audit tools then available were inadequate.
  • Auditors were not knowledgeable enough about auditing in a computerized accounting environment.
  • Auditors were inadequately trained by their firms and poorly educated by their colleges.
  • Auditors were not equipped to deal with the fast-changing world of financial services.



These are rather serious charges, but Equity Funding took place in the late 1960s and early 1970s. We've come a long way since then, right? Yes, we have, but so has computer technology. Unfortunately, the gap between computer technology and audit, accounting, and management controls hasn't shrunk at all. If anything, the gap has grown.

Take as another example, the Volkswagen case, where it appears that some person or persons inside Volkswagen and perhaps outside the firm, manipulated its accounting records to cover up trading losses on foreign currencies to the tune of $259 million. The losses occurred in 1984 but went undiscovered until late 1986 or early 1987. How was this possible? Again, how sophisticated was its accounting system? Was it audible? How well-educated and -trained were its auditors? And the critical question, "Did technology inspire the crime?" While the facts indicate that this case involved incompetence or bad luck more than it did an evil intention to steal money from the company, technology provided a method to cover up the fraud.




COMPUTERS AS A TARGET FOR TERRORISTS


Political terrorists, extremists, and protest groups often have common traits, such as tactical use of violence, attempted media manipulation, ideologies, causes, and enemies. But these similarities often can be superficial and misleading.

Most radical groups of the past adopted a revolutionary ideology derived from left-wing socialism or communism. Right-wing groups lean toward fascist or neo-nazi ideas. Today's radical protester is often part of a "social justice movement." He or she may be in an animal rights or an earth-liberation group. Members at the fringe of these groups have earned the moniker "eco-terrorists" by destroying labs that use animals in experiments or burning down a ski resort that might destroy a habitat for endangered species. Free software advocates have their fringe members who may be inclined to attack information systems.

Political or social terrorism is a strategy of intimidation and coercion--through the tactical use of, or threat to use, illegitimate force (such as sabotage)--to influence the political, social, or commercial behavior of an opponent or to provoke fear or respect from the general population. Terrorism is not mindless violence, nor is it irrational, though it often seems so. Terrorists have objectives for their actions.

In the dramaturgy of terror there must be a transgressor/victim, terrorist, and audience. Terrorists distinguish between violent (it used to be called armed) propaganda and regular propaganda. With violent propaganda, the act of terror itself is the vehicle that carries the message to the audience.

Terrorists usually have one or more objectives behind their propaganda:

  • To advertise the existence of a group
  • To publicize the group's cause
  • To create an atmosphere of disorientation, fear, and alarm
  • To portray their acts as the lesser evil (e.g., destroy a specific piece of property vs. allowing the destruction of a habitat)
  • To extort specific concessions from a specific target--stop abortions, get off the land, provide publicity for a manifesto


Many extremists have accepted the premise that violent and unlawful threats and acts are justified if they promote their program to change society--for the better, of course. Extremists and protest groups must propagandize--usually by deed--if they are to gain active or tacit support for their cause. Today's radical has a wealth of past experience and information to draw on, regarding strategy, tactics, or practical advice. As long as there is television and other news media, there will be radicals who will manipulate it to their purposes.





THE DILEMMA OF ELECTRONIC COMMERCE


More and more companies, large and small, are deploying Web-based, electronic commerce applications for competitive advantage and a good return on investment. These systems must be customer-friendly, with service centers providing access for order entry, inventory status, shipping instructions, or delivery schedule. The challenge for a market-driven system is controlling costs/increasing profits vs. protecting proprietary information.




Fifteen Reasons Why Cyberfraud Is Here to Stay

1. Growing use of personal computers and communications devices connected with computers make security measures difficult.

2. Valuable proprietary information has become more vulnerable to theft with the move away from protected mainframes to less secure decentralized networks of personal computers.

3. Current popular software is designed primarily for ease of use; security was not seen as a desired feature.

4. Computer hackers have new tools--data dictionaries and hacking software to uncover computer access passwords stored in a system.

5. Information and communications systems change rapidly, making security upgrades costly and often difficult to implement.

6. New or upgraded computer systems often take a productivity toll and alienate employees.

7. The importance of compliance with information protection policies and measures is often poorly communicated to employees.

8. A business strategy rooted in constant productivity sees security as slowing down the job.

9. As information technology systems get more complex, security also becomes complicated and layered with slower authorization procedures, thus wasting a lot of high-paid time.

10. Practices of open management and teams call for access to and sharing of proprietary information among employees, increasing potential important information losses.

11. Many employees are not willing to follow security procedures, preferring routine and convenience.

12. At a small company, the atmosphere regarding computer crime is often "it can't happen to us."

13. There will always be disaffected people and some will surely find reasons to see a company's computer system as the cause of their problem and take destructive retaliation against the company.

14. New generations of cyberpunks will see the computer system as a complex security labyrinth waiting to be invaded.

15. Business ethics appear to be eroding.



Cyberfraud will continue to grow until we shift from a crisis mode of audit and control to a prevention mode. Prevention means awareness, education, training, early involvement of auditors in design of new systems, and an effort to make these security systems an integral part of the computing infrastructure.

Even doing all of the above won't solve cyberfraud completely. It will, however, minimize the potential for the occurrence of cyberfraud and maximize the potential of the perpetrator being caught.

Read More Show Less

Table of Contents

Cyberfraud is Here to Stay.

Cyberfraud and Cyber Criminals.

Risk and Vulnerability Assessments.

Assessing Fidelity Risks.

Establishing Effective Compliance Programs.

Computers and Ethics: An Oxymoron?

Designing Persuasive Policies.

Communications Systems Policy Guide.

Internal Protection Controls.

Security-From Fence to Firewall and Beyond.

Protection of Proprietary Information.

Setting Up Your Website: Business, Security and Liability Considerations.

Disaster Planning for Information Systems.

Cyberfraud Audits and Investigations.

Insurance for Cyberfraud and Cybertorts.

Appendices.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)