Skip to document

Flores CIS 2 - Notes for course BSA

Notes for course BSA
Course

Business tax (BSAC 242)

29 Documents
Students shared 29 documents in this course
Academic year: 2023/2024
Uploaded by:
Anonymous Student
This document has been uploaded by a student, just like you, who decided to remain anonymous.
The Philippine Women's University

Comments

Please sign in or register to post comments.

Preview text

Flores, Anthony Gil D.

TOPIC: COMPUTER FRAUD, ETHICS, AND INTERNAL CONTROL

INFORMATION SYSTEMS AUDIT EXER 1: Computer Fraud, Ethics, and Internal Control

Computer Crime Case Title Brief Description of fraud

Computer Fraud Classificati on

Interest Harmed

Estimated Loss

Target Victim

Perpetrator Charged

Geography Other Facts

HackerOne employee stole data from bug bounty reports for financial gain. July 5, 2022. portswigger/daily- swig/hackerone-employee-stole- data-from-bug-bounty-reports- for-financial-gain

-Attempted to disclose sensitive information outside the platform.

-Stored Data Fraud

C Not Determine d

Private -Former Employee

Internation al

Volatile market for stolen credit card data shaken up by sanctions against Russia May 25, 2022. portswigger/daily- swig/volatile-market-for-stolen- credit-card-data-shaken-up-by- sanctions-against-russia

-Stolen credit card details.

-Stored Data Fraud

C Not Determine d

Private -Group Internation al

-May be perpetrat ed by a country

Crunch time for EU web authentication plan as Mozilla launches campaign to protect status quo. July 15, 2022 portswigger/daily- swig/crunch-time-for-eu-web- authentication-plan-as-mozilla- launches-campaign-to-protect- status-quo

-Insufficient Cyber Security

-Input Fraud

A Not Determine d

Private -Group Internation al

A Byte Out of History $10 Million Hack, 1994-Style, January 31, 2014. fbi/news/stories /a-byte-out-of-history-10-million- hack

-Stolen money directly from bank using technology.

Computer Instruction Fraud

C 10 M Public -Group Internation al

Botnet Operation Disabled FBI Seizes Servers to Stop Cyber

-tampering with

Computer Instruction

C Not Determine

Threat to public

Group Internation al

Fraud, April 14, 2011 fbi/news/stories /botnet-operation-disabled

software Fraud. d health and safety.

Cyber Criminal Forum Taken Down Members Arrested in 20 Countries July 15, 2015, fbi/news/stories /cyber-criminal-forum-taken- down

-Online Trafficking -Online shopping forum for cybercrimi nals

-Stored Data Fraud

C Not Determine d

Threat to public health and safety.

Group Internation al

Operation Ghost Click. International Cyber Ring That Infected Millions of Computers Dismantled. November 9, 2011 fbi/news/stories /international-cyber-ring-that- infected-millions-of-computers- dismantled

-Infected computers with malware called DNSchange r

-Input Fraud

I Not Determine d

Threat to public health and safety.

Group Internation al

Melissa Virus. March, 1999 fbi/history/famo us-cases/melissa-virus

-Infected computers with virus called Melissa virus

-Input Fraud

I Not Determine d

Threat to public health and safety.

Group Internation al

Morris Worm. November 2, 1988. fbi/history/famo us-cases/morris-worm

-Cyber- attack using a cyber- worm

-Stored Data Fraud

A 100K~Milli ons

Private Juvenile Internation al

Operation Innocent Images 1993 fbi/history/famo us-cases/operation-innocent- images

-pedophiles transmittin g sexually explicit images of minors via the Internet

-Stored Data Fraud

I Not Determine d

Threat to public health and safety.

Group Internation al

Was this document helpful?

Flores CIS 2 - Notes for course BSA

Course: Business tax (BSAC 242)

29 Documents
Students shared 29 documents in this course
Was this document helpful?
Flores, Anthony Gil D.
TOPIC: COMPUTER FRAUD, ETHICS, AND INTERNAL CONTROL
INFORMATION SYSTEMS AUDIT
EXER 1: Computer Fraud, Ethics, and Internal Control
Computer Crime Case Title Brief
Description
of fraud
Computer
Fraud
Classificati
on
Interest
Harmed
Estimated
Loss
Target
Victim
Perpetrator
Charged
Geography Other
Facts
HackerOne employee stole data
from bug bounty reports for
financial gain.
July 5, 2022.
https://portswigger.net/daily-
swig/hackerone-employee-stole-
data-from-bug-bounty-reports-
for-financial-gain
-Attempted
to disclose
sensitive
information
outside the
platform.
-Stored
Data Fraud
C Not
Determine
d
Private -Former
Employee
Internation
al
Volatile market for stolen credit
card data shaken up by
sanctions against Russia
May 25, 2022.
https://portswigger.net/daily-
swig/volatile-market-for-stolen-
credit-card-data-shaken-up-by-
sanctions-against-russia
-Stolen
credit card
details.
-Stored
Data Fraud
C Not
Determine
d
Private -Group Internation
al
-May be
perpetrat
ed by a
country
Crunch time for EU web
authentication plan as Mozilla
launches campaign to protect
status quo.
July 15, 2022
https://portswigger.net/daily-
swig/crunch-time-for-eu-web-
authentication-plan-as-mozilla-
launches-campaign-to-protect-
status-quo
-Insufficient
Cyber
Security
-Input
Fraud
A Not
Determine
d
Private -Group Internation
al
A Byte Out of History
$10 Million Hack, 1994-Style,
January 31, 2014.
https://www.fbi.gov/news/stories
/a-byte-out-of-history-10-million-
hack
-Stolen
money
directly
from bank
using
technology.
Computer
Instruction
Fraud
C 10 M Public -Group Internation
al
Botnet Operation Disabled
FBI Seizes Servers to Stop Cyber
-tampering
with
Computer
Instruction
C Not
Determine
Threat to
public
Group Internation
al