y rected toward the acquisition U ormation through clandestine means and proscribed by the laws of the country against which it is committed IEW QUESTIONS REVIEW 13.1 (Learning obic cremal parties tha pions? 13-2 (Learning obi different fraud threa are some of the 13-3 (Learning o zation that a par obiective 13-1) What are the three types of abat present a serious fraud threat to organi- 13-8 (Learning objective 13-11) List some common product substitution schemes. obiective 13-3) Customers can pose many 13-9 (Learning objective 13-12) Why should an organization threats to the organizations they patronize. What conduct a vendor audit? 13-10 (Learning objective 13-13) Identify two major fred of the fraud threats posed by customers? threats posed by unrelated third parties. ning objective 13-5) Describe the type of organic 13-11 (Learning objective 13-13) Why are computer fra at a paperhanger would likely target. cases often more difficult to examine than traditional fraud obiective 13-7) What is credit card fraud? cases? ecribe the three types of credit card fraud presented 13-12 (Learning objective 13-13) How do computer hack- ers gain unauthorized access to a target company's network? warning objective 13-8) List some of the red flags of Describe some of the methods they might use. 13-13 (Learning objective 13-15) Which departments of a company are popular targets of corporate spies? arning objective 13-9) What are some ways vendors (Learning objective 13-7) w Briefly describe in the chapter. 13-5 (Learning of istomer using an unauthorized credito 13-6 (Learning ob collude to commit fraud against clients? Learning objective 13-10) What types of schemes do ors often perpetrate during the performance phase of a 13-7 (Learning contract? DISCUSSION ISSUES 12.1 (Learning objectives 13-6 and 13-8) Companies accept a variety of forms of payment from customers, and sometimes these payment methods are illegitimate. When a customer uses an illegitimate form of payment, it might never receive the cash it is due. What types of policies, procedures, and controls could a company put in place to mitigate the risk of payment fraud by its customers? 13-2 (Learning objective 13-12) What are some analytical tests that can be performed to detect fraudulent activity by vendors, and what are some ways to prevent vendor fraud from occurring in the first place? 13-3 (Learning objective 13-16) Computer security controls are an integral part of any modern organization's defense sys- tem. What are some processes, systems, and controls companies