AIS Exam 3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/138

flashcard set

Earn XP

Description and Tags

Ch 8 - 13

Last updated 6:48 PM on 3/25/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

139 Terms

1
New cards

fraud

any and all means a person uses to gain an unfair advantage over another person

2
New cards

corruption

dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards

3
New cards

misappropriation of assets

theft of company assets by employees

this could be physical assets (ex: cash, inventory) and digital assets (intellectual property)

4
New cards

fraudulent financial reporting

intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statement (ex: booking fictitous revenue)

5
New cards

pressure

a person’s incentive or motivation for committing fraud

(could be employee or financial statement specific)

6
New cards

opportunity

condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to personal gain

7
New cards

rationalization

excuse that fraud perpetrators use to justify their illegal behavior

8
New cards

computer fraud / cybercrime

any fraud that requires technology to penetrate it

9
New cards

Cybersecurity

policies, technologies, and practices designed to protect computer systems, networks, and data from unauthorized access, disruption, or damage

10
New cards

CIA triad

confidentiality - keeping data privacy

integrity - ensuring data is accurate and unaltered

availability - ensuring systems remain operational

11
New cards

defensive - cybersecurity

access controls, firewalls, monitoring, encryption, training

12
New cards

offensive - cybersecurity

social engineering, system attacks, malware, fraud schemes

13
New cards

social engineering

techniques or psychological tricks used to get people to comply with the hacker’s wishes to gain physical or logical access to a building, computer, server, or network

14
New cards

Compassion

desire to help others

15
New cards

Identity theft

Assuming someone else’s identity for economic gain

16
New cards

Pretexting

Using a scenario to trick victims to divulge information or to gain access

17
New cards

Phishing

Sending an e-mail asking the victim to respond to a link that appears legitimate that requests sensitive data

18
New cards

Pharming

Redirects website to a spoofed website (usually to steal information)

19
New cards

Evil twin

Spoofed wireless network to steal internet traffic

A duplicate wireless network with an identical name to a legitimate access point.

20
New cards

Scavenging

Searching trash for confidential information

21
New cards

Eavesdropping

Listening to private communications (e.g., wiretap)

22
New cards

Skimming

Using electronic equipment to steal credit card data

Double swiping credit card

23
New cards

Hijacking

Gaining control of a computer to carry out illicit activities

24
New cards

Cross-site scripting (XSS)

Uses vulnerability of web application that allows the Web site to get injected with malicious code. When a user visits the Website, that malicious code is able to collect data from the user.

25
New cards

Buffer overflow attack

Large amount of data sent to overflow the input memory (buffer) of a program, causing it to crash and replacing it with attacker’s program instructions.

26
New cards

SQL injection (insertion) attack

Malicious code inserted in place of a query to get to the database information

27
New cards

Malware

involves any software used to do harm.

28
New cards

Spyware

Secretly monitors and collects information

Can hijack browser, search requests

29
New cards

Ransomware

Software that encrypts programs and data until a ransom is paid

30
New cards

Keylogger

Software that records user keystrokes

31
New cards

Trojan Horse

Malicious computer instructions in an authorized and properly functioning program

32
New cards

Trap door/back door

Set of instructions that allow the user to bypass normal system controls

33
New cards

Packet sniffer

Captures data as it travels over the Internet

34
New cards

Rootkit

Software used to conceal system components and malware from the system owner

A means of concealing system components and malware from the operating system and other programs; can also modify the operating system.

35
New cards

Virus

A section of self-replicating code that attaches to a program or file requiring a human to do something so it can replicate itself

36
New cards

Worm

Stand-alone self-replicating program

37
New cards

Salami technique

A thin slice at a time

38
New cards

Economic espionage

A theft of information, trade secrets, and intellectual property

39
New cards

Internet pump and dump

Pump up price then sale.

40
New cards

Identity Theft

Assuming someone’s identity

41
New cards

Click Fraud

Manipulating click numbers

42
New cards

What would improve the ability to detect​ fraud?

Implement whistleblower rewards

43
New cards

A woman sent her company fictitious medical bills from doctors who did not exist. The bills were processed in the normal way by her​ employer, and payments went to her​ husband's office address. She bilked her company out of millions of dollars. This is an example of what type of​ fraud?

Input fraud

44
New cards

Fact about fraud​ perpetrators

Researchers found few psychological and demographic differences between​ white-collar criminals and the public.

45
New cards

Legally, for an act to be fraudulent there must​ be:

material fact that induces a person to act.

justifiable​ reliance, where a person relies on a misrepresentation to take an action.

false​ statement, representation, or disclosure.

46
New cards

Power outages and fluctuations can result in which type of​ threat?

Software errors and equipment failures

47
New cards

Organizations can make fraud less likely to occur by requiring an annual employee

a vacation

48
New cards

Unauthorized​ theft, use,​ access, modification,​ copying, or destruction of​ software, hardware, or data is called

computer fraud.

49
New cards

Which of the following is an example of how a fraud perpetrator would rationalize his​ actions?

belief that no one is going to be harmed.

50
New cards

Fraud is gaining an unfair advantage over another person.​ Legally, for an act to be fraudulent there must​ be:

An intent to deceive

51
New cards

Misappropriation of assets is an example of what type of accounting information​ threat?

Intentional acts

52
New cards

What is the primary purpose of a cookie in the context of websites?

To store information about the user and their activities on the site.

53
New cards

What is lapping?

Concealing the theft of cash by delaying the posting of collections to accounts receivable.

54
New cards

What are the three types of pressure that lead to misappropriations?

Financial, Emotional, and Lifestyle.

55
New cards

Under what circumstances does fraud detection become significantly more effective?

Data analytics software tools are used to examine an entire data population.

56
New cards

What is identified as the primary contributing factor in most misappropriations?

Absence of internal controls and/or failure to enforce them

57
New cards

Which law is known for detecting fraud by analyzing the distribution for the likelihood of a digit in a large set of naturally occurring numbers?

Benford’s law

58
New cards

Illegally using, copying, browsing, searching, or damaging company data constitutes what type of computer fraud?

data fraud

59
New cards

What is identified as the primary cause of security problems and the greatest risk to information systems, resulting in the highest financial losses?

Unintentional acts like accidents or innocent errors.

60
New cards

In the context of cyber threats exploiting natural and political disasters, what specific critical infrastructure is targeted by clever cybercriminals?

Emergency response, utilities, transportation, and hospitals.

61
New cards

Which of the following captures the essence of fraudulent behavior?

Engaging in deceptive actions to secure an unjust edge.

62
New cards

Which of the following activities is considered as computer instructions fraud?

Copying software without permission.

63
New cards

What is sabotage?

An intentional act where the primary goal is to destroy a system or some of its components.

64
New cards

According to the National Commission on Fraudulent Financial Reporting (the Treadway Commission), how is fraudulent financial reporting defined?

Intentional or reckless conduct resulting in materially misleading financial statements.

65
New cards

What term is commonly used to describe individuals who commit fraud as knowledgeable insiders with access, skills, and resources?

White-collar criminals.

66
New cards

In the context of the fraud triangle, what does rationalization refer to?

The excuse used by fraud perpetrators to justify their illegal behavior.

67
New cards

Which of the following statements is true regarding global computer fraud costs?

The current annual global computer fraud costs are estimated to be over $10 trillion.

68
New cards

What is investment fraud?

Misrepresenting or omitting facts to promote an investment with fantastic profits and little risk.

69
New cards

What is check kiting?

Creating cash by depositing a check and withdrawing the funds before it clears.

70
New cards

An insurance company installed software to detect abnormal system activity and found that employees were using company computers to run an illegal gambling website is an example of what type of computer fraud?

Processor fraud.

71
New cards

Why is detecting and preventing fraud challenging?

Technology advancements provide new opportunities for committing fraud.

72
New cards

In what areas can data analytics be applied for testing purposes?

all kinds of data

(Structured data (like financial records); Unstructured data (like emails or text); Semi-structured data

73
New cards

How does data analytics contribute to fraud detection?

Data analytics software tags items for human examination based on selected criteria.

74
New cards

Power outages and fluctuations.

Software errors and equipment malfunctions.

75
New cards

Logic errors.

Unintentional acts.

76
New cards

War and attacks by terrorists.

Natural and political disasters.

77
New cards

What concept is represented by the three conditions - pressure, opportunity, and rationalization - when discussing fraud among first-time perpetrators?

fraud triangle

78
New cards

According to recent studies on poor quality software, what approximate percentage of U.S. companies incurs significant software errors annually, leading to substantial costs?

More than 60% of companies grappling with significant software errors.

79
New cards

What does opportunity represent in the fraud triangle?

The condition or situation enabling the commission and concealment of a dishonest act for personal gain.

80
New cards

What is the simplest and most common method of committing computer fraud?

Input fraud

81
New cards

Anomaly detection using trends and patterns

Anything unexpected, out of the ordinary, or not in line with expected trends or patterns can indicate fraud.

82
New cards

Semantic modeling

Investigators can analyze both structured and unstructured text for hidden clues to fraudulent activity.

83
New cards

Regression analysis

Statistical method helps evaluate how strong the connection is between two or more data items.

84
New cards

Outlier detection

Items outside the range of similar data can indicate fraud.

85
New cards

Using computers to forge a company paycheck is an example of which type of computer fraud?

output fraud

86
New cards

What is corruption?

Corruption is dishonest conduct by those in power and involves actions that are illegitimate, immoral, or incompatible with ethical standards.

87
New cards

Unauthorized​ access, modification, or use of an electronic device or some element of a computer system is called

hacking

88
New cards

A hijacker placing himself between a client and a host to intercept network traffic is called​ _______.

man-in-the-middle

89
New cards

Jake Malone is running an online business that specialized in buying and reselling stolen credit card information. Jake is engaging in​ _______.

carding

90
New cards

Communications that request recipients to disclose confidential information by responding to an​ e-mail or visiting a website is​ called:

phishing

91
New cards

The word zombie is related to which type of computer​ attack?

botnet

92
New cards

Which of the following activities characterizes spyware?

Secretly monitoring computer usage and collecting personal information.

93
New cards

Phreaking

Attacking phone systems to obtain free phone line access; use of phone lines to transmit malware and to access, steal, and destroy data.

94
New cards

Zombies

Hijacked computers, typically part of a botnet, that are used to launch a variety of Internet attacks.

95
New cards

Botnet

A network of powerful and dangerous hijacked computers that are used to attack systems or spread malware.

96
New cards

Hijacking

Gaining control of someone else’s computer to carry out illicit activities, such as sending spam without the computer user’s knowledge.

97
New cards

What best describes a brute force attack?

A systematic approach to trial-and-error for gaining unauthorized access.

98
New cards

What is skimming?

Illegally and covertly swiping credit cards to record data for fraudulent purposes.

99
New cards

Which of the following best describes a trap door?

A set of computer instructions that allows a user to bypass the system’s normal controls.

100
New cards

What is e-skimming?

Using malware to infect online checkout pages and steal customer data.

E-skimming involves stealing personal and payment information through hacking into online checkout pages using malware.

Explore top notes

note
English 2 Vocab 1
Updated 1198d ago
0.0(0)
note
Ch 2: Ecosystems and Ecology
Updated 1064d ago
0.0(0)
note
Factors and Multiples
Updated 1189d ago
0.0(0)
note
2.8: acids
Updated 1257d ago
0.0(0)
note
2. New and Emerging Technologies
Updated 1121d ago
0.0(0)
note
In Sickness and in Health
Updated 1064d ago
0.0(0)
note
concussion infographics
Updated 467d ago
0.0(0)
note
English 2 Vocab 1
Updated 1198d ago
0.0(0)
note
Ch 2: Ecosystems and Ecology
Updated 1064d ago
0.0(0)
note
Factors and Multiples
Updated 1189d ago
0.0(0)
note
2.8: acids
Updated 1257d ago
0.0(0)
note
2. New and Emerging Technologies
Updated 1121d ago
0.0(0)
note
In Sickness and in Health
Updated 1064d ago
0.0(0)
note
concussion infographics
Updated 467d ago
0.0(0)

Explore top flashcards

flashcards
3. Fallacies
30
Updated 831d ago
0.0(0)
flashcards
Spanish capitals
20
Updated 1210d ago
0.0(0)
flashcards
honors english exam terms
40
Updated 1197d ago
0.0(0)
flashcards
17 - TỪ VỰNG | Quizlet
23
Updated 560d ago
0.0(0)
flashcards
vocab 4
42
Updated 539d ago
0.0(0)
flashcards
Wetter
47
Updated 1062d ago
0.0(0)
flashcards
3. Fallacies
30
Updated 831d ago
0.0(0)
flashcards
Spanish capitals
20
Updated 1210d ago
0.0(0)
flashcards
honors english exam terms
40
Updated 1197d ago
0.0(0)
flashcards
17 - TỪ VỰNG | Quizlet
23
Updated 560d ago
0.0(0)
flashcards
vocab 4
42
Updated 539d ago
0.0(0)
flashcards
Wetter
47
Updated 1062d ago
0.0(0)