Modalities for Forensic Review of Computer Related Frauds



Similar documents
Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Computer Forensics Preparation

e-discovery Forensics Incident Response

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET

The Governance of Corporate Forensics using COBIT, NIST and Increased Automated Forensic Approaches

Computer Forensics US-CERT

COMPUTER CRIME INVESTIGATION AND COMPUTER FORENSICS

Case Study: Hiring a licensed Security Provider

Fraud Prevention DEFINITIONS

Cyber Risks and Insurance Solutions Malaysia, November 2013

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Fraud-Related Compliance

From 1984 to 1990, Congress established

In an age where so many businesses and systems are reliant on computer systems,

Enterprise PrivaProtector 9.0

READING SCHOOL DISTRICT

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

Law, Investigations, and Ethics. Ed Crowley 09

MALAYSIAN TECHNOLOGY DEVELOPMENT CORPORATION SDN. BHD.

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Standard: Information Security Incident Management

Forensic Audit Building a World Class Program

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Certified Cyber Security Analyst VS-1160

Forensic Accounting: An Introduction

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

An Overview of Cybersecurity and Cybercrime in Taiwan

Research Topics in the National Cyber Security Research Agenda

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Fraud Policy FEBRUARY 2014

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK

Computer Hacking Forensic Investigator v8

Data Breach and Senior Living Communities May 29, 2015

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

INVESTIGATING AND PROSECUTING MONEY LAUNDERING

ACE Advantage PRIVACY & NETWORK SECURITY

INCREASED PENALTIES FOR CYBER SECURITY OFFENSES

Promoting a cyber security culture and demand compliance with minimum security standards;

The potential legal consequences of a personal data breach

Criminal Justice Courses

Acceptable Use Policy ("AUP")

Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014

The Role of Digital Forensics within a Corporate Organization

DIPLOMA IN FORENSIC ACCOUNTING SYLLABUS. Background information to the modules

COMPUTER AND NETWORK USAGE POLICY

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

LEGISLATION ON CYBERCRIME IN NIGERIA: IMPERATIVES AND CHALLENGES

Information Technologies and Fraud

Fraud Prevention and Deterrence

Managing IT Security with Penetration Testing

FEI Canada. Fraud Prevention. Presented by: Matthew McGuire and Leigh Beijer. Date:

Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy

Information Security Law: Control of Digital Assets.

TechDefender SM. Tech E&O, Network Security, Privacy, Internet Media, and MPL Insurance Application

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

Cyber and Data Security. Proposal form

Fraud Risk Management Procedures

Cyber Insurance Presentation

An Introduction to Cyber Liability Insurance. Catherine Berry Senior Underwriter

OCR LEVEL 3 CAMBRIDGE TECHNICAL

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

Procedure for Managing a Privacy Breach

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

External Supplier Control Requirements

Computer Security Incident Reporting and Response Policy

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Network Security Policy

Brainloop Cloud Security

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Security Incident Management Policy

Transcription:

Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana

Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance of Forensic in Organizations Modalities for Computer Forensic Examination Challenges in Computer Crime Forensics End Results of Forensic Reviews Forensic Reviews & Litigation Support Combating Computer Crimes

Recent Computer Crime Cases

What is Computer Crime Forensics Computer Crime is any illegal act for which knowledge of computer technology is essential for its Perpetration, Investigation, Prosecution. Prevalent due to increased used and dependency on computers and other technological gargets to support business/government/individual processes. Laptops/Computers/Smartphones/Servers/PDAs/Tablets Software/Applications EBS (Oracle/SAP/OS Networks and internet (GSM) Data/Information (Client Data, Financial Data, Cloud)

What is Computer Crime Forensics (cont) Fraudsters exploits/applies these technologically advance tools to commit fraud. Individuals, Governments and Organizations with some of value are targets Computer criminals are becoming more organized and determined Containment analysis and eradication should be accomplished immediately computer crime is reported

Types of Computer Related Crimes Unauthorized access. Exceeding authorized access. Intellectual property theft or misuse of information. Pornography. Theft of services. Forgery. Property theft (e.g., computer hardware and chips). Invasion of privacy. Denial of services. Manipulation of software applications. Viruses. Sabotage (i.e., data alteration or malicious destruction). Extortion. Embezzlement. Espionage. Terrorism.

Relevance of Forensic in Organizations 1. Increased dependency on IT to support business government processes 2. Ineffective IT Governance (PPPs/SODs/DOAs) 3. Regulatory Requirements (Banks etc.) 4. Security/Control/Compliance not at same pace with Technological advancement and development 5. Determination of computer criminals 6. Potential losses or Reputational Damage

Modalities for Computer Forensics (1) Planning the forensic Examination Scoping & Scope Limitation Identify IT resource or systems being reviewed Determine period of relevance Decide specialist help required Identify all person possibly involved Identify standards/policies/framework applicable Objective Recommendation to improve process/strengthen controls Determine loss or damage suffered Evidence Handling and retention Chain of evidence - accountability and protection Evidence life cycle (identify, collect, store, preserve, transport, present in court and return to owner)

Modalities for Computer Forensics (2) Execution Literature review of the incident Interviewing (obtain written statements & also record) Confessions Evidence gathering Involves Data Analysis, Data Mining, Tracing, Simulation, texts, confirmations, extracts, imaging, copying, reconstruction. Could be Direct, real, documentary, and demonstrative Documentation of modus operation Perform root cause analysis to identify control/process weaknesses/absence

Modalities for Computer Forensics (3) Reporting 2 Types of Forensic Reports Preliminary report Long form or detail report Content of Forensic Long Form Report Distribution List Executive summary Introduction and Background Objective and Scope Scope Limitation and Subsequent Events Procedures Performed Detailed findings presentation of interview statement Presentation of evidence obtained Professional opinion from contrasting

Modalities for Computer Forensics (4) Content of Forensic Long Form Report (cont.) Modus operandi Root Causes Recommendations Conclusion Acknowledgement Recommendation Implementation Plan

Challenges in Computer Crime Forensics Lack of traditional paper audit trail Require understanding of the technology used in committing the crime May require use of more than one specialist to assist the forensic examiner Legal developments lags behind technological advancement Lack of experts and specialist

End Results of Forensic Reviews Produce forensic report to management Determination of loss suffered or recoveries made HR disciplinary action Recommendations for Control/Process Improvement Articulate evidence to support criminal prosecution Modus operandi Evidence of compromised IT resources (unauthorized access) Articulate losses/damages suffered Expert witness testimony

Forensic Reviews & Litigation Support Criminal law identifies a crime as being a wrong against society Prosecution aims at punishing the offender to serve as a deterrent against future crime Judge must believe beyond reasonable doubt, that the offender is guilty of the offense under a law Forensic examination must articulate demonstrative evidence to prove guilt of the offender Litigation Support Coaching/prepping by prosecuting legal team Expert witness Simple testimony in laymen's terms Good knowledge of sections of criminal code/relevant laws applicable under the circumstances

Combating Computer Crimes Preventive Approaches Fraud Awareness Training Tone at the top (shared Ethics & Values) Whistleblower/Hotlines Staff background checks SODs Tools & techniques (Encryption, Customer Validation, internal network security, firewalls) Detective Approaches Fraud Risk Assessment to improve controls (show framework) Surprise & Periodic audits

Combating Computer Crimes Recent Development in Ghana to Combat computer crimes Legal framework e.g. AML Act, Data Protection Act) Specialized Units in the Security Agencies Immergence of Anti-Fraud Units in Organization Regulatory Requirements (Basel 3, SOX, King III)