Which of the following is the greatest risk to information systems and causes the greatest dollar losses?
. Question 23.
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as
. Question 24. Most frauds are detected by. Question 25. The most efficient way to conceal asset misappropriation is to. Question 26.
A fraud technique that slices off tiny amounts from many projects is called the ________ technique.
. Question 27.
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using
. Question 28.
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
. Question 29.
Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called