A method for acquiring sensitive information by falsely claiming through electronic communication to be from an entity with which the target does business
What is phishing?
Someone on the payroll who does not actually work for the victim company
What is a ghost employee?
A device that scans magnetic strips from cards
What is a skimmer?
The deliberate misrepresentation of the financial condition of an enterprise accomplished through the intentional misstatement or omission of amounts or disclosures in the financial statements to deceive financial statement users
What is Financial Statement Fraud?
Agreements whereby employees agree not to work for competing companies within a certain period of time after leaving their current employer
What is noncompetition agreements?
A type of software that collects and reports information about a computer user without the user's knowledge or consent
What is spyware?
A fictitious entity created for the sole purpose of committing fraud
What is a shell company?
What do fraudsters use to purchase prepaid gift cards to quickly convert illicit card funds?
What is stolen credit or debit cards?
Recording expenses in the wrong period and early revenue recognition are classified as what type of financial fraud scheme?
What is timing differences?
Information in the public domain, that is available for free or at a fee
What is open-source information?
A type of attack in which users are fooled into entering sensitive data (such as a password or credit card number) into a malicious website that imitates a legitimate website.
What is pharming?
What happens when an employee records a fictitious refund of goods at the employee's cash register?
What is the company's inventory is overstated?
Mario, an employee of a person-to-person (P2P) payment company, has been writing down the account numbers and passwords of customer accounts with the intent of fraudulently using them to pay for items he purchases online. Mario is engaging in:
What is electronic funds transfer fraud?
Calculated by dividing total liabilities by total equity
What is debt-to-equity ratio?
Information gathered from subject matter experts and informed individuals
What is human intelligence?
A program or command procedure that gives the appearance that it is useful but actually contains hidden malicious code that causes damage.
What is Trojan Horse?
Sean is responsible for delivering time sheets to the payroll department on behalf of his supervisor. One day he decides to withhold his time sheet from those being sent to his supervisor for approval. He falsely increases the number of hours he has worked and then forges his supervisor’s signature on his time sheet. He adds the time sheet to the stack of authorized sheets and delivers them to payroll. This is an example of:
What is a falsified hours and salary scheme?
What is the most difficult aspect of a card to reproduce?
What is the hologram?
A technique for analyzing the relationships among the items on an income statement, balance sheet or statement of cash flows during a specific accounting period by expressing components as percentages of a specified base value within the statement
What is a vertical analysis?
Cooper is an intelligence professional for Whetstone Intelligence, a competitive intelligence firm. He is tasked with gathering intelligence about Cryptic Global, the major competitor of Whetstone’s biggest client. To gather the intelligence, Cooper infiltrates Cryptic Global’s office by posing as a member of its cleaning crew and collects information left around employees’ computers and desks. Cooper’s approach is an example of:
What is Scavenging?
Matthew receives a voice mail message telling him that his credit card might have been used fraudulently. He is asked to call a phone number. When he calls the number, he hears a menu and a list of choices that closely resembles those used by his credit card company. The phone number even appears to be similar to that of his card issuer. Whattype of scheme has Matthew become the target of?
What is Vishing?
White, an employee of ABC Corporation, intentionally issued two payments for the same invoice. After the checks had been mailed, White called the vendor and explained that a double payment had been made by mistake. She asked the vendor to return one of the checks to her attention. When the vendor returned the check, White took it and cashed it. This is an example of:
What is a pay and return scheme?
What type of payment fraud only requires a scanner printer and personal computer?
What is check fraud rings?
A fraud scheme in which an accountant fails to write down obsolete inventory to its current fair market value has what effect on the company’s current ratio?
What is the current ratio will be artificially inflated?
What is the first step of a program for Safeguarding Proprietary Information (SPI)?
What is identifying what information needs to be protected?