This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
CHAPTER 5
Natural and political disasters may disrupt a system of information and lead many
businesses to collapse. The second form of danger is software bugs, crashing the operating
system, hardware glitches, outages and fluctuations in power, as well as undetected data
transfer errors. The third category of danger, incidents, and unintentional mistakes and
failures, is the greatest risk to ICAs that leads to the greatest loss of the dollar. The fourth
category of danger is deliberate acts, such as a cyber-crime, fraud, or sabotage, which
deliberately damage a device. The one that increasingly susceptible to threats are the
information systems. Fraud is unfairly advantageous to anyone else. Any year, the annual
economic damages caused by fraudulent activities are tremendous.
The majority of those responsible for fraud are expert insiders who have the access,
experience and tools necessary to do so. Due to the understanding of the scheme and its
vulnerabilities by staff, they can conduct and hide theft more effectively. Fraud perpetrators
are sometimes referred to as criminals with white collars. Many different kinds of fraud are
committed. Corruption is a misleading behavior by powerful people that sometimes implies
illegal, unethical and ethical-incompatible acts. Investment fraud is misrepresenting or
putting behind evidence to foster an investment that guarantees great returns without or with
no risk. The misappropriation of assets and fraudulent financial reporting are two examples of
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.