Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago,

Slides:



Advertisements
Similar presentations
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Advertisements

Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Control and Accounting Information Systems
ITAuditing Using GAS & CAATs
Learning Objectives LO1 Describe the conceptual audit risk model and its components. LO2 Explain the usefulness and limitations of the audit risk model.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Evidence Collection & Admissibility Computer Forensics BACS 371.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
MSc in Business Information Technology
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
BACS 371 Computer Forensics
The Islamic University of Gaza
Security Controls – What Works
Forensic and Investigative Accounting
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Accounting Information Systems Chapter Outlines
Chapter 4 Internal Control Bus 319 Accounting Information Systems.
IS Audit Function Knowledge
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Pertemuan 7-8 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Advanced Accounting Information Systems
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
Forensic and Investigative Accounting Chapter 2 Forensic Accounting Education, Institutions, and Specialties © 2007 CCH. All Rights Reserved W. Peterson.
Forensic and Investigative Accounting Chapter 1 Introduction to Forensic and Investigative Accounting © 2007 CCH. All Rights Reserved W. Peterson.
Chapter 4 Internal Controls McGraw-Hill/Irwin
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Chapter Nine Conducting the IT Audit. Audit Standards AICPA — Statements of Auditing Standards (SASs) AICPA — Statements of Auditing Standards (SASs)
Introduction to IT Auditing
An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004.
Evolving IT Framework Standards (Compliance and IT)
Chapter 3 Internal Controls.
The Sarbanes-Oxley Act of PricewaterhouseCoopers Introduction of Panel Members The Sarbanes-Oxley Act of 2002 What Companies Should Be Doing Now.
What is FORENSICS? Why do we need Network Forensics?
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
Chapter Three IT Risks and Controls.
Overview:  Different controls in an organization  Relationship between IT controls & financial controls  The Mega Process Leads  Application of COBIT.
Everyone’s Been Hacked Now What?. OakRidge What happened?
L/O/G/O คลินิก ไอเอ ครั้งที่ 6/2011 The New Auditor Toolkit ตลาดหลักทรัพย์แห่งประเทศไทย ห้องประชุม 1101 ชั้น มิถุนายน 2554.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Everyone’s Been Hacked Now What?. OakRidge What happened?
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
1 Topic# 7 – Auditing with Technology Readings, Chapter 10 A – COMPUTERIZED AUDIT TOOLS –Electronic Spreadsheets –Automated Working Papers –Generalized.
Chapter 9: Introduction to Internal Control Systems
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Chapter 2 Incident Response Management Handbook Spring Incident Response & Computer Forensics.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Getting to Grips with CobiT – Enterprise Architecture, a conseptual approach to IT Covernance or how to understand the difference between IT Governance.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Forensic and Investigative Accounting
Chapter 9 Control, security and audit
IT Audit Capacity Building
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
What is IT audit? An examination of how IT systems where implemented to ensure that they meet the organization’s business needs without compromising.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL

Chapter 13Forensic and Investigative Accounting2 Definition of Computer Forensics Computer forensics is the analysis of electronic data and residual data for the purposes of its recovery, legal preservation, authentication, reconstruction, and presentation to solve or aid in solving technology-based crimes.

Chapter 13Forensic and Investigative Accounting3 SAS No. 99 Guidelines for Testing Digital Data SAS No. 99 states: In an IT environment, it may be necessary for the auditor to employ computer-assisted audit techniques (for example, report writers, software or data extraction tools, or other system-based techniques) to identify the journal entries or other adjustments to be tested.

Chapter 13Forensic and Investigative Accounting4 IT Guidelines under COSO Framework Guidelines have been established for these areas: 1. Internal control environment 2. Objective setting 3. Event identification 4. Risk assessment 5. Risk response 6. Control activities 7. Information and communication 8. Monitoring

Chapter 13Forensic and Investigative Accounting5 COBIT’s Goals COBIT’s goals are to set control objectives for IT compliance using a strategic planning perspective and at the same time to outline, in detail, the proper procedures to be followed for specific compliance measures.

Chapter 13Forensic and Investigative Accounting6 Technical Skills for Digital Evidence Collection Necessary skills are based on the following requirements: 1. Understanding of various operating systems 2. Quickly identifying pertinent digital data 3. Properly preserving data 4. Properly securing data 5. Properly collecting data 6. Maintaining a proper chain of custody

Chapter 13Forensic and Investigative Accounting7 Forensic Investigative Tools Imaging software: EnCase EnCase SafeBack SafeBack Data extraction or data mining software: ACL ACL Data Extraction and Analysis (IDEA) Data Extraction and Analysis (IDEA)