Trap Doors and Trojan Horses: An Auditing Action Adventure

Trap Doors and Trojan Horses: An Auditing Action Adventure
ISBN-10
1531021573
ISBN-13
9781531021573
Category
Auditing
Pages
236
Language
English
Published
2021
Author
D. Larry Crumbley

Description

"In this educational novel, the famous forensic accountant, Lenny Cramer, has joined the accounting faculty at Georgia State University. In addition to his professorial duties, he is conducting an operational audit for the international soft drink company, Coca-Cola. Espionage and fraud place Lenny's life on the line as he uncovers a scheme to steal Coke's secret formula. The story features a variety of settings, from Washington, D.C. to Poland. As an expert in his field, Professor Cramer uses his forensic auditing knowledge to assist the Coca-Cola Company, his students, the U.S. Congress, and the legal system as an expert witness. With his assistant, Slam Duncan, an accounting Ph.D. student, he puts state-of-the-art technology to work to solve audit problems in the real world. Trap Doors and Trojan Horses may be used near the end of an auditing or beginning of a data processing course. It would be ideal for an MBA program that has a light coverage of accounting or used in CPA firms' in-house training programs. This educational novel illustrates the differences between a regular audit and the investigation required by forensic accountants to uncover computer fraud. Every business executive should read it, because just as termites never sleep, fraud never sleeps. And just like termites, fraud can destroy the foundation of an entity. The novel mixes fraud, crime, politics, ethics, computer techniques, expert witnessing, and auditing for a better and easier way to learn accounting. If used as a supplement to an auditing, forensic accounting, fraud examination, or a computer course, this exciting novel provides a painless way to learn auditing principles. The suspenseful story combines computer and auditing concepts in a fashion even a novice can understand and enjoy. With computer fraud losses reaching $300 billion per year, accountants must be familiar with electronic auditing"--

Other editions

Similar books

  • A Critical Handbook of Children's Literature
    By Rebecca J. Lukens

    A Critical Handbook of Children's Literature, Ninth Edition, gives future teachers, practicing teachers, librarians, and parents many examples of quality children's literature to guide them in choosing the best books for the classroom, ...

  • A Practical Guide to Security Engineering and Information Assurance
    By Debra S. Herrmann

    Trap doors and Trojan horses are two examples of intentional malicious vulnerabilities. A trap door is a hidden software or hardware mechanism that permits system protection mechanisms to be circumvented.135 The inventor of the trap ...

  • Objective Question Bank of Computer Awareness for General Competitions
    By Arihant Experts

    Both (a) and (b) 58. A program that performs a useful task while simultaneously allowing destructive acts is a a. worm b. trojan horse c. virus d. macro virus e. None of these 66. What is a trap door in a program? a.

  • Deviant Behavior
    By Frank Schmalleger, John A. Humphrey

    The text discusses what deviant behavior is around the world, including the circumstances, patterns, and sociocultural characteristics of persons involved in deviant acts.

  • Operating System (For GTU)
    By Rohit Khurana

    7 Explain the Trojan Horse and Trap doors program threats. 7 Ans: Q.5 For file attributes and file operations, refer Section 11.2.2 and 11.2.3 on Page 183. Both Trojan horse and trap doors are program threats and are discussed below: ...

  • Fundamentals of Computation Theory: 18th International Symposium, FCT 2011, Oslo, Norway, August 22-28, 2011, Proceedings
    By Olaf Owe, Martin Steffen, Jan Arne Telle

    Trojan horse, Spyware, Trap Door and Logic Bomb. Here we group together those malware that do not exhibit an infection behavior. A Trojan horse is a non-replicating program that hides its malicious intent inside host programs that may ...

  • Scott on Outsourcing: Law and Practice
    By Michael Dennis Scott

    G.W. Murphy Indus., Inc., 491 F.2d 923, 929 (5th Cir. 1973). But see Datascope Corp. v. SMEC, Inc., 879 F.2d 820, 824-25 (Fed. Cir. 1989) (doubts about patent owner's ability to supply demand should be resolved against infringer).

  • Perspectives on Free and Open Source Software
    By Joseph Feller

    Leading Free and Open Source software researchers and analysts consider the status of the open source revolution and its effect on industry and society.

  • Linux System Administration
    By James Dennis, M. Carling, Stephen Degler

    ... Trap Doors and Trojan Horses A number of publicly available software packages were written to raise user consciousness about the possibilities for installing back doors into systems . The best known is rootkit , of which there are many ...

  • Practical UNIX and Internet Security
    By Simson Garfinkel, Gene Spafford, Alan Schwartz

    The definitive book on UNIX security, this volume covers every aspect of computer security on UNIX machines and the Internet.