Preview

Computer Fraud - an Analysis on Oracle Corp vs. Sap Ag

Good Essays
Open Document
Open Document
2645 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Fraud - an Analysis on Oracle Corp vs. Sap Ag
Information system has been playing a grave essential role in daily business activities. Over the past decade, the detection rate of computer crimes concerning information system attacks has risen sharply. According to Kunz and Wilson (2004), reported computer crimes have been septupled from 2000 to 2003 and leads to inestimable economic loss. Therefore, themes on information security, especially the prevention of computer fraud, have attracted increasingly attentions (Romney and Steinbart, 2009). However, it seems that perpetrators can always find new techniques to theft invaluable business secrets stored, processed or protected by those information systems. Moreover, some abuse techniques have been used in economic espionage, which causes a yearly loss of $250 billion (ibid). Oracle Corp vs. SAP AG could be one of the relating cases occurred in the recent 2007 and is not yet closed till present. This essay will firstly introduce the Case. Then by using Fraud Triangle, analyze the reason of SAP’s commitment of computer fraud and data theft. Finally, suggestions on how to improve the security of company’s information system will be addressed with some reflections of the Case.

It has been reported that the world’s software giant SAP AG was sued by its largest competitor, Oracle Corporation, for computer fraud and data theft in March 2007 (Anon, 2010). In the Complaint, Oracle Corporation (2007) stated that in November 2006, unusual heavy download activities were spotted on Customer Connection, a website Oracle used to serve its customers. The uncovered access originated from an IP address in one of SAP’s braches with log-in IDs of PeopleSoft and J.D. Edwards customers. It is discovered later that TomorrowNow and SAP TN, two SAP subsidiaries, committed a series of unauthorized access to Oracle’s customer service system and more than 10,000 illegal download activities. Mass of important materials, including copyrighted software codes and confidential documents was

You May Also Find These Documents Helpful

  • Satisfactory Essays

    : ACC 571 - Strayer. Tags: acc 571, acc 571 strayer, acc 571 strayer tutorials, acc571, assignment 1, Assignment 1: Corporate Fraud Schemes, assignment 2, Assignment 2: Cybercrimes and Computer Security Systems, Assignment 3, Assignment 3: Fraud Schemes and Fraud Investigations, Assignment 4, Assignment 4: Asset Misappropriation and Corporate Governance, Forensic Accounting.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    ChoicePoint, A data broker, suffered a data breach in 2005. This breach led to the disclosure of thousands of people’s personal information. We will discuss the type of breach this would fall under, how it occurred, the losses of confidentiality, integrity, and availability (C.I.A.), and the types of improvements ChoicePoint could or did undertake to help prevent this from happening again.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Best Essays

    To begin with, fraudulent activities are the most significant threat to the organization after the accounting information system has been computerized. Both internal personnel and the top management may commit fraud in different ways. For instance, the most common fraudulent activities are unauthorized access of the company accounting information system, theft of resources of the company and…

    • 1788 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Choicepoint Attack

    • 401 Words
    • 2 Pages

    The data theft identified by the various organizations is not uniform. Some of the steps that can be implement by organizations such as:…

    • 401 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The use of information technology in business presents major security challenges, poses serious ethical question, and affects society in significant ways. Especially, the computer crime is a growing threat to society and is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It presents a major challenge to the integrity, safety, and survival of most business systems.…

    • 1690 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Fraud Case Analysis

    • 481 Words
    • 2 Pages

    I) Motive: We believe that one of Thomas’ motives for committing this fraud was greed. He spent part of collected trip fee on personal purchases. The second motivation might be financial pressure. It is…

    • 481 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays
  • Good Essays

    First of all confidentiality in respect to information systems is where information is restricted or limited to only persons authorized to use it. Confidentiality of information is especially important to businesses that thrive on sensitive customer information, example those who receive payments online and banks who store customers financial and personal information. However it is also a great concern to companies such as retailers and manufacturing companies as they may depend on this information to a certain extent (e.g. to decide on effective marketing strategies and to gain a competitive advantage). Confidentiality of a business’s information may be threatened in many ways. Persons may try to gain unauthorized access of a business’s sensitive information for personal gain e.g. identity theft and phishing. They may also attempt to steal secrets such as a business’s trade secrets and processes which give them a competitive advantage and also government agencies top secret information. Some technologies which can be used to increase the level of confidentiality are authentication methods which control the access to certain information such as password logins, single sign on, password updates and specifications.…

    • 654 Words
    • 3 Pages
    Good Essays
  • Better Essays

    As company’s dependence on computers and the internet increase, there are more and more threats that they face from hackers and anarchist alike. For ever solution that companies come up with to defend themselves against cyber attacks, those who wish to do harm find other means to attack, it is a constant cat and mouse struggle. If 2011 has been any indication, it is clear that everyone is vulnerable to cyber attacks. There was wave after wave of hacking, malware, and spear-phishing attacks that succeeded in exploiting many well-known businesses, such as RSA and Sony, which lead to the exposure of millions of records. (Schwartz, 2012) The purpose of this paper is to discuss three of the top information security threats that any business and organization face today: breaches, cyber espionage, and mobile malware.…

    • 1179 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Real World

    • 5094 Words
    • 21 Pages

    This chapter serves as a ready reference guide. First the various scenarios are covered. A detailed discussion on the various cyber crimes, is covered in the ASCL publication titled “Understanding Hackers and Cyber Criminals”. This is provided as official courseware for the ASCL Certified Cyber Crime Investigator course. Then the applicable law and legal liabilities are covered. Then the modus operandi usually followed by the criminals is discussed. The investigation guidelines for cyber crime investigators are not discussed in this book as they are part of the syllabus of the ASCL Certified Cyber Crime Investigator course only. For real world case studies on investigation of cyber crimes, please refer to the ASCL publication titled “Case Studies on Cyber Crime Investigation”. This is provided as official courseware for the ASCL Certified Cyber Crime Investigator course.…

    • 5094 Words
    • 21 Pages
    Satisfactory Essays

Related Topics