Trap Doors and Trojan Horses: An Auditing Action Adventure

Trap Doors and Trojan Horses: An Auditing Action Adventure
ISBN-10
159460696X
ISBN-13
9781594606960
Category
Auditing
Pages
214
Language
English
Published
2009
Authors
D. Larry Crumbley, Lawrence Murphy Smith, Laura Davis DeLaune

Description

In this educational novel, the famous forensic accountant, Lenny Cramer, has joined the accounting faculty at Georgia State University. In addition to his professorial duties, he is conducting an operational audit for the international soft drink company, Coca-Cola. Espionage and fraud place Lenny¿s life on the line as he uncovers a scheme to steal Coke¿s secret formula. The story features a variety of settings, from Washington, D.C. to Poland. As an expert in his field, Professor Cramer uses his forensic auditing knowledge to assist the Coca-Cola Company, his students, the U.S. Congress, and the legal system as an expert witness. With his assistant, Slam Duncan, an accounting Ph.D. student, he puts state-of-the-art technology to work to solve audit problems in the real world. Trap Doors and Trojan Horses may be used near the end of an auditing or beginning of a data processing course. It would be ideal for an MBA program that has a light coverage of accounting or used in CPA firms¿ in-house training programs. This educational novel illustrates the differences between a regular audit and the investigation required by forensic accountants to uncover computer fraud. Every business executive should read it, because just as termites never sleep, fraud never sleeps. And just like termites, fraud can destroy the foundation of an entity. The novel mixes fraud, crime, politics, ethics, computer techniques, expert witnessing, and auditing for a better and easier way to learn accounting. If used as a supplement to an auditing, forensic accounting, fraud examination, or a computer course, this exciting novel provides a painless way to learn auditing principles. The suspenseful story combines computer and auditing concepts in a fashion even a novice can understand and enjoy. With computer fraud losses reaching $300 billion per year, accountants must be familiar with electronic auditing.

Other editions

Similar books

  • A Critical Handbook of Children's Literature
    By Rebecca J. Lukens

    A Critical Handbook of Children's Literature, Ninth Edition, gives future teachers, practicing teachers, librarians, and parents many examples of quality children's literature to guide them in choosing the best books for the classroom, ...

  • Objective Question Bank of Computer Awareness for General Competitions
    By Arihant Experts

    Both (a) and (b) 58. A program that performs a useful task while simultaneously allowing destructive acts is a a. worm b. trojan horse c. virus d. macro virus e. None of these 66. What is a trap door in a program? a.

  • Deviant Behavior
    By Frank Schmalleger, John A. Humphrey

    The text discusses what deviant behavior is around the world, including the circumstances, patterns, and sociocultural characteristics of persons involved in deviant acts.

  • Basic Principles of an Operating System
    By Rathee Dr. Priyanka

    Some of the program threats are given as follows: Trojan horse Trojan horse is an application having a legitimate service or ... During the development process of any application, there will be some loopholes called as trap doors.

  • A Practical Guide to Security Engineering and Information Assurance
    By Debra S. Herrmann

    Trap doors and Trojan horses are two examples of intentional malicious vulnerabilities. A trap door is a hidden software or hardware mechanism that permits system protection mechanisms to be circumvented.135 The inventor of the trap ...

  • Operating System (For GTU)
    By Rohit Khurana

    7 Explain the Trojan Horse and Trap doors program threats. 7 Ans: Q.5 For file attributes and file operations, refer Section 11.2.2 and 11.2.3 on Page 183. Both Trojan horse and trap doors are program threats and are discussed below: ...

  • Fundamentals of Computation Theory: 18th International Symposium, FCT 2011, Oslo, Norway, August 22-28, 2011, Proceedings
    By Olaf Owe, Martin Steffen, Jan Arne Telle

    Trojan horse, Spyware, Trap Door and Logic Bomb. Here we group together those malware that do not exhibit an infection behavior. A Trojan horse is a non-replicating program that hides its malicious intent inside host programs that may ...

  • Formal Methods for Trustworthy Computer Systems (FM89): Report from FM89: A Workshop on the Assessment of Formal Methods for Trustworthy...
    By Dan Craigen, Karen Summerskill

    Trap-door exploitations, Trojan Horses, logic bombs, worms, viruses $$SHhf Internet worm attack on BSD-derived Unix systems ... (S 15 2) SH C compiler Trojan horse for UNIX trapdoor (Ken Thompson, “Reflections on Trusting Trust”, ...

  • Perilous Panacea
    By Ronald Klueh

    It was caused by a Trojan horse and a trap door.” Although Saul was familiar with the term, Orman explained that the “Trojan horse” was a program surreptitiously installed on the Kirtland computer sometime before the hijacking.

  • Accounting Information Systems: Controls and Processes
    By Leslie Turner, Andrea B. Weickgenannt, Mary Kay Copeland

    Examples of program manipulation include the salami technique, Trojan horse programs, and trap door alterations. A fraudster may use the salami technique to alter a program to slice a small amount from several accounts and then credit ...