Upload
oswin-banks
View
215
Download
1
Tags:
Embed Size (px)
Citation preview
What is Forensic Accounting?
Forensic accounting is accounting that is suitable for legal review, offering the highest level of assurance, and including the now generally accepted connotation of having been arrived at in a scientific fashion.
Encompasses investigation, dispute resolution and litigation support.
2
Forensic Accounting Specialist
A forensic accountant combines accountancy and computer forensics to analyze financial data and find evidence that would be legally valid during a court proceeding.
Is engaged in electronic discovery investigating digital evidence from computers and other devices.
Can acquire, analyze and report on digital evidence.
Conducts special audits aka a review, a due diligence, an investigative audit, or a forensic audit. Each label has its own connotations.
3
Essential MS Security
Malicious Software Removal Tool Microsoft Security Essentials Update Adobe, Flash, Java
Uninstall old Java Avira Anti-Virus Free Update Security Patches Weekly Update Anti-Virus at Least Weekly
4
What are Hidden Files?
A file with a special hidden attribute turned on, so that the file is not normally visible to users.
Hidden files mainly serve to hide important operating system-related files and user preferences. 9
Find Hidden Files Turn on Windows
operating system preference to show hidden files. In Explorer > Tools >
Folder options… > View > Select “Show hidden files, folders, and drives” > OK
Use software to search for hidden files.
10
Click the Microsoft Office Button , point to Prepare, and then click Inspect Document.
In the Document Inspector dialog box, click Inspect.
Review the inspection results. If Document Inspector finds comments and tracked changes, you are prompted to click Remove All next to Comments, Revisions, Versions, and Annotations.
Oops! Your comments are showing.The purchasing agent is a boob…
Remove personal information from file before distribution.
Alternatives:*Send as .pdf*Save as .rtf and then reconvert to .doc
Properties can provide information on file name, final author and company (is this the company that you expected?).
Other Methods to Conceal
Change the file extension Data.xls becomes Data.jpg
Change font color to background In a Word document change font color to
white, etc. Hide rows and columns in spreadsheets Use steganography
16
Steganography
Steganography comes from the Greek words Steganós (Covered) and Graptos (Writing).
The goal is to hide messages inside other harmless messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message
Hide any type of binary file in any other binary file
Security through obscurity
17
The Good Watermarks (Copyright Protection) Unique Hash Value Tag Notes Confidentiality Encryption Anonymity Private Communication
The Bad Industrial Espionage Terrorism Pornography Malware
Steganography
18
Digital Steganography Text in media files
Audio files Picture files Video files
Pictures in media files Other picture files Video files
Files archived in other pictures Popular data formats (carriers)
.bmp .doc .gif .jpeg .mp3 .txt .wav
This image contains hidden text
19
What is a Virtual Machine?
A virtual machine is a tightly isolated software container that can run its own operating systems and applications as if it were a physical computer. A virtual machine behaves exactly like a physical computer and contains it own virtual (ie, software-based) CPU, RAM hard disk and network interface card (NIC).
23
What is a Virtual Machine?
An operating system can’t tell the difference between a virtual machine and a physical machine, nor can applications or other computers on a network. A virtual machine is composed entirely of software and contains no hardware components whatsoever.
24
Creating a USB Boot
The easiest way to turn a USB flash drive into a bootable Windows 7 installer is by using the tool Microsoft offers
25
Q. If I already have the hashes (produced by hash.exe) of my operating system, how difficult is it to compare the current hashes of the same files to make certain none have been altered?
A. It is a simple 3 line batch file using hash.exe and compare.exe. It should take approximately 10 minutes to complete.
26
28
Q. What is a packet sniffer?A. It sniffs packets! It actually captures certain
packets or headers to ascertain network quality. It can also be used in a nefarious fashion.
WireShark aka Ethereal is a popular freeware packet sniffer.Do you know what a packet is?
What is a Honeypot?
In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.
29
Horizontal & Vertical Analysis of Income Stmt
34
12/31/2009 12/31/2008
Sales $4,000,000 $3,300,000Cost of Goods Sold 2,200,000 1,650,000
----------------- -----------------Gross Profit $1,800,000 $1,650,000
Operating Expenses: Depreciation $738,000 $576,000 Advertising 45,000 38,000 Other 120,000 140,000
-------------- --------------Total Operating Expense $903,000 $754,000
Operating Income $897,000 $896,000Interest on Long-Term Debt 80,000 80,000
-------------- --------------Income Before Taxes $817,000 $816,000Taxes 326,800 326,400
-------------- --------------Net Income $490,200 $489,600
Dividends Declared on Preferred Stock$220,000 $220,000Dividends on Common Stock 290,200 299,600
-------------- --------------Net Income to Retained Earnings ($20,000) ($30,000)
BUSTER'S COMPUTER STORE COMPARATIVE INCOME STATEMENTS
FYE 12/31/09 and 12/31/08 HORIZONTAL VERTICALANALYSIS ANALYSIS2009/2008 2009
21.2% 100.0%33.3% 55.0%
9.1% 45.0%
28.1% 18.5%18.4% 1.1%
-14.3% 3.0%
19.8% 22.6%
0.1% 22.4%0.0% 2.0%
0.1% 20.4%0.1% 8.2%
0.1% 12.3%
0.0% 5.5%-3.1% 7.3%
-33.3% -0.5%
Horizontal: Pct change from prior periodVertical: Divide each item by Sales
Revenues
35
Horizontal & Vertical Anal. of Balance Sheet
ASSETS: 12/31/2009 12/31/08
Cash $1,200,000 $1,100,000 Accounts Receivable 780,000 550,000 Inventory 1,850,000 1,600,000 Fixed Assets (net) 8,200,000 7,200,000
------------------ ------------------- Total Assets $12,030,000 $10,450,000
LIABILITIES:
Accounts Payable $1,200,000 $900,000 Long Term Debt 1,730,000 430,000
----------------- ----------------- Total Liabilities $2,930,000 $1,330,000
STOCKHOLDERS EQUITY:
Preferred stock, $100 par, 12% cum$1,800,000 $1,800,000 Common stock, $100 par 7,000,000 7,000,000 Retained Earnings 300,000 320,000
----------------- ----------------- Total $9,100,000 $9,120,000
Total Liabilities + $12,030,000 $10,450,000Stockholders Equity
BUSTER'S COMPUTER STORE COMPARATIVE BALANCE SHEETS
12/31/09 and 12/31/08 HORIZONTAL VERTICALANALYSIS ANALYSIS2009/2008 2009
9.1% 10.0%41.8% 6.5%15.6% 15.4%13.9% 68.2%
15.1% 100.0%
33.3% 10.0%302.3% 14.4%
120.3% 24.4%
0.0% 15.0%0.0% 58.2%
-6.3% 2.5%
-0.2% 75.6%
15.1% 100.0%
Horizontal: Pct change from prior periodVertical: Divide each item by Total
Assets