Unformatted text preview:

Slide 1What is Forensic Accounting?Forensic Accounting SpecialistEssential MS SecuritySlide 5Slide 6Passware Kit Forensic 9.5 http://www.lostpassword.com/kit-forensic.htmParaben SticksWhat are Hidden Files?Find Hidden FilesSlide 11Slide 12Remove personal information from file before distribution. Alternatives: *Send as .pdf *Save as .rtf and then reconvert to .docProperties can provide information on file name, final author and company (is this the company that you expected?).Note dates, last saved by, and total editing time.Other Methods to ConcealSteganographySlide 18Digital SteganographyPicture in PictureFile Size ComparisonsQuickCryptoWhat is a Virtual Machine?Slide 24Creating a USB BootSlide 26Slide 27Slide 28What is a Honeypot?Brief E-mail HeaderSlide 31Slide 32Email Servers and ClientsHorizontal & Vertical Analysis of Income StmtSlide 35Extract / FilterSlide 37Grover Kearns, PhD, CPA, CFEClass 101What is Forensic Accounting?Forensic accounting is accounting that is suitable for legal review, offering the highest level of assurance, and including the now generally accepted connotation of having been arrived at in a scientific fashion.Encompasses investigation, dispute resolution and litigation support. 2Forensic Accounting SpecialistA forensic accountant combines accountancy and computer forensics to analyze financial data and find evidence that would be legally valid during a court proceeding. Is engaged in electronic discovery investigating digital evidence from computers and other devices.Can acquire, analyze and report on digital evidence. Conducts special audits aka a review, a due diligence, an investigative audit, or a forensic audit. Each label has its own connotations.3Essential MS SecurityMalicious Software Removal ToolMicrosoft Security Essentials Update Adobe, Flash, JavaUninstall old Java Avira Anti-Virus FreeUpdate Security Patches WeeklyUpdate Anti-Virus at Least Weekly4Trust everyone … but always cut the cards.56Passware Kit Forensic 9.5http://www.lostpassword.com/kit-forensic.htm7Paraben Sticks8What are Hidden Files?A file with a special hidden attribute turned on, so that the file is not normally visible to users.Hidden files mainly serve to hide important operating system-related files and user preferences.9Find Hidden FilesTurn on Windows operating system preference to show hidden files.In Explorer > Tools > Folder options… > View > Select “Show hidden files, folders, and drives” > OKUse software to search for hidden files.10Click the Microsoft Office Button , point to Prepare, and then click Inspect Document.In the Document Inspector dialog box, click Inspect.Review the inspection results. If Document Inspector finds comments and tracked changes, you are prompted to click Remove All next to Comments, Revisions, Versions, and Annotations. Oops! Your comments are showing.The purchasing agent is a boob…12Don’t send the annotations with the document!Remove personal information from file before distribution.Alternatives:*Send as .pdf*Save as .rtf and then reconvert to .docProperties can provide information on file name, final author and company (is this the company that you expected?).Note dates, last saved by, and total editing time.Other Methods to ConcealChange the file extensionData.xls becomes Data.jpgChange font color to backgroundIn a Word document change font color to white, etc.Hide rows and columns in spreadsheetsUse steganography16SteganographySteganography comes from the Greek words Steganós (Covered) and Graptos (Writing).The goal is to hide messages inside other harmless messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden messageHide any type of binary file in any other binary fileSecurity through obscurity17The GoodWatermarks (Copyright Protection)Unique Hash ValueTag NotesConfidentialityEncryptionAnonymityPrivate CommunicationThe BadIndustrial EspionageTerrorismPornographyMalwareSteganography18Digital SteganographyText in media filesAudio filesPicture filesVideo filesPictures in media filesOther picture filesVideo filesFiles archived in other picturesPopular data formats (carriers).bmp .doc .gif.jpeg.mp3 .txt .wavThis image contains hidden text19Picture in PictureCan you see any differences? (the one on the left is meaner)20File Size Comparisons21QuickCrypto Type secret message here.22What is a Virtual Machine?A virtual machine is a tightly isolated software container that can run its own operating systems and applications as if it were a physical computer. A virtual machine behaves exactly like a physical computer and contains it own virtual (ie, software-based) CPU, RAM hard disk and network interface card (NIC). 23What is a Virtual Machine?An operating system can’t tell the difference between a virtual machine and a physical machine, nor can applications or other computers on a network. A virtual machine is composed entirely of software and contains no hardware components whatsoever.24Creating a USB BootThe easiest way to turn a USB flash drive into a bootable Windows 7 installer is by using the tool Microsoft offers25Q. If I already have the hashes (produced by hash.exe) of my operating system, how difficult is it to compare the current hashes of the same files to make certain none have been altered?A. It is a simple 3 line batch file using hash.exe and compare.exe. It should take approximately 10 minutes to complete.26Q. How do I dump the contents of RAM on a Windows machine?A. Use the nifty freeware WinDump!2728Q. What is a packet sniffer?A. It sniffs packets! It actually captures certain packets or headers to ascertain network quality. It can also be used in a nefarious fashion.WireShark aka Ethereal is a popular freeware packet sniffer.Do you know what a packet is?What is a Honeypot?In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.29Brief E-mail Header3031Full Header32Email Servers and Clients33Horizontal & Vertical Analysis of Income


View Full Document

USF ACG 6936 - Class 10 - Forensic Accounting

Download Class 10 - Forensic Accounting
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Class 10 - Forensic Accounting and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Class 10 - Forensic Accounting 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?