1
1
Towards a Secure Digital Future -
Zimbabwe , June 2015
Dr W Ruakanda
wr@mornipac.co.za
This report is solely for the use at CSZ presentation. No part of it may be circulated, quoted, or reproduced for distribution outside the client
organization without prior written approval from MorniPac Consultants This material was used by MorniPac Consultants during an oral presentation; it
is not a complete record of the discussion.
Computer Society of Zimbabwe
Business School
ICT Forensics
A Brief Introduction
(VoWiFi)
please feel free to add your input and comments
Ict forensics and  audit bb
Wednesday, 21 January 2015
Voice over WiFi (VoWiFi) technical details
VoWiFi is certainly a hot topic, thanks to
the support of VoWiFi on iPhone 6. A
presentation from LTE World Summit
2014 by Taqua on this topic has already
crossed 13K views
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
Ict forensics and  audit bb
BLUE COAT SYSTEMS MOBILE MALWARE REPORT:
A NEW LOOK AT OLD THREATS
The explosion of mobile devices means there are now 1.5 billion
new ways to steal data, passwords, or money.
This has replaced pornography as the leading mobile threat.
There are fresh insights into other new tricks cybercriminals have
perpetrated as well as learn more about:
 Today’s most prolific mobile threats
 The stages of a mobile attack
 How user behavior drives mobile threats
 What directs users to mobile malware
 Best practices for avoiding trouble
Copyright ® 2015, Blue Coat Systems, Inc. All Rights Reserved
The cost of cyber crime for the global economy has been estimated at $445 billion
(£266 billion) annually.
Cyber espionage and stealing individuals' personal information is believed to have
affected more than 800 million people during 2013.
Financial losses from cybertheft could cause as many as 150,000 Europeans to
lose their jobs, according to a report conducted by internet security company
McAfee.
Cyber crime damages trade between nations, competitiveness, innovation, and
global economic growth, and slows the pace of global innovation.
McAfee is calling for governments to begin a serious, systematic effort to collect
and publish data on cybercrime to help countries and companies make better
choices about risk and policy.
By Rhiannon Williams : 2:44PM BST 09 Jun 2014
Studies estimate that the internet economy annually generates between $2 trillion and $3 trillion, a
share of the global economy that is expected to grow rapidly. Based on Center for Strategic and
International Studies (CSIS) analysis, cybercrime extracts between 15 per cent and 20 per cent of the
value created by the internet.
Despite one London-based business losing $1.3 billion (£800 million) in a single malicious attack
during 2012, the majority of cyber criminals still have substantial difficulty in monetising their stolen
data.
The total cost of cyber crime to the UK economy alone was $11.4 billion during 2013, the equivalent to
0.16 per cent of the GDP. Retailers lost more than $850 million during the same period as a result of
penalty free financial crime.
The figures do not come as a surprise to security professionals and big businesses, said Mark
Sparshott, EMEA director of security firm Proofpoint.
He said the attraction of cybercrime to many criminals was due to its relatively low level of risk.
"The volumes of attacks are increasing because it is a profitable business model for organised crime,"
he said. " With cyber crime there is no risky getaway because the attack is routed through hundreds or
thousands of PCs in dozens of countries, making it almost impossible to trace. The internet makes
most attacks anonymous and untraceable and that is really attractive to cybercriminals.”
Raj Samani, EMEA Chief Technology Officer for McAfee, agreed. “It is clear that cyber crime has a real
and detrimental impact on the global economy. Over time, cyber crime has become a growth industry;
the returns are great, and the risks are low,” he said.
"As more businesses move online and more consumers connect to the internet, the opportunities for
cybercrime will only grow, making it imperative that countries work together now to proactively tackle
cyber crime.”
Telegraph Technology
Is this what the iPhone 6s or 7 will look like?: in pictures
2:32PM BST 04 Jun 2014
America and China have spent the past few years in a stand-off over Chinese
attitudes to intellectual property, and how the Chinese government goes about
cyber-spying. Virtually all nations engage in cyber-spying to some degree, but
experts suspect China of using the material to give Chinese companies an unfair
advantage over their foreign rivals.
However, Chinese businesses insist they act independently of the government, and
have accused America of having a protectionist agenda. Huawei said it has been
frozen out of US contracts because of “jealousy”.
The US government has issued a number of reports claiming that Chinese
companies posed a security risk. Senators on the cyber security council have also
cautioned American businesses to blacklist Huawei and ZTE, another technology
firm, unless they got the all-clear from a US government agency.
Source: Bloomberg
…….also your biggest liability.
Unfortunately, computer information is often
not adequately protected and computer-
related crime is rapidly growing. The ability to
discover and investigate the misuse or theft of
sensitive information is becoming increasingly
important if the information you store
electronically is to remain intact and, more
importantly, within your control.
Forensic Focus
UK cyber crime costs +£37bn a year
Oxygen Software Focuses on Smart Phone
Forensics with Oxygen Forensic Suite 2011
Digital Forensic Investigations: Just how good are
they?
Nigeria: Expert Canvasses Forensic Protection of
Votes
How to perform a forensic PC investigation (with
OSForensics)
Ict forensics and  audit bb
Cyber Crime Investigation
Ict forensics and  audit bb
Ict forensics and  audit bb
Chapter 1 Forensic and Investigative Accounting 34
Big-Six's Position
• A forensic audit is akin to a police investigation.
• All public companies should have a forensic audit on a
regular basis. Companies would be required to have
such an audit every three or five years or face these
audits on a random basis.
• Forensic auditors scrutinize all records of companies,
including emails, and would be able, if not required, to
question all company employees, and to require
statements under oath.
• Might be necessary for an audit network or a
specialized forensic auditors to complete a forensic
audit with the aid of independent attorneys (not
those who have represented the audit client in the other
engagements).
Source: “Serving Global Markets and the Global Economy: A View from the CEOs of the
International Audit Networks, November 2006, p. 13.
Chapter 1 Forensic and Investigative Accounting 35
More Differences
Two practitioners have suggested these additional procedures
may be used in a forensic audit:
 Extensive use of interviews and leveraging techniques
designed to elicit sufficient information to prove or
disprove a hypothesis.
 Document inspection that may extend to
authentication procedures and handwriting analysis.
 Significant public records search to uncover, for
example, unexpected title or ownership, other known
addresses, and prior records of individuals.
 Legal knowledge regarding rules of evidence
including chain of custody and preservation of
evidence integrity.
Source: Annett Stalker and M.G. Ueltzen, “An Audit Versus A Fraud Examination,”
CPA Expert, Winter 2009, p. 4.
Chapter 1 Forensic and Investigative Accounting 36
Inexperienced Forensic Auditors
• Find out who did it. Do not worry about all the
endless details.
• Be creative, think like the fraudster, and do not be
predictable. Lower the auditing threshold without
notice.
• Take into consideration that fraud often involves
conspiracy.
• Internal control lapses often occur during vacations,
sick outages, days off, and rest breaks, especially
when temporary personnel replace normal
employees.
H. R. Davia, Fraud 101, New York: John Wiley & Sons, 2000, pp. 42-45.
The rising allegations of significant fraud and corruption crimes have
brought upon a new dimension towards the prominent need for application of
auditing expertise to situations that have legal consequences, more widely known
as
FORENSIC AUDITING
Challenged with the responsibility and the trust of stake holders and investors to
detect and investigate fraud and other financial reporting misstatements, auditors
are increasingly being pushed to be more efficient and pro-active.
The increased business complexities in today's litigious environment have
enhanced the need for auditors to be ABSOLUTELY, PERFECTLY and
UNQUESTIONABLY determined whether financial statements are
accurate and incompliance with regulations.
Thus there is need to master and understand the tools to tackle and build a solid
foundation in fraud PREVENTION, DETECTION, and DETERRENCE.
With in-depth understanding on forensic auditing and its impact towards
organizations' value.
Ict forensics and  audit bb
• Examples of Fraud
• Fraudulent educational qualifications
• Pretending that you have the lawful qualifications
• Submission of False claims – insurance, kilometers, medical certificates,
overtime
• Cheque / document fraud
• Credit card fraud – using company credit cards for personal expenses
• Improper transfer of funds or goods to another person not legally entitles
to
• Duplicate payments, payment for services or goods not rendered
• Or delivered of inferior goods, redundant assets & etc
• Falsification of invoices
• Creation of fictitious supplier accounts
• Creation of fictitious employees on the company payroll
• Using the organization resources or contracts to run and
benefit your own private business ( which may be in conflict
with your employer business
• Inflating prices / fees for goods rendered or delivered
• Falsification of leave register or failure to report leave
• Procurement fraud
Digital Forensics
Definition: “Tools and techniques to recover, preserve,
and examine digital evidence on or transmitted by digital
devices.”
Devices include computers, PDAs, cellular phones,
videogame consoles, copy machines, printers, …
Ict forensics and  audit bb
FORENSICS IS A FOUR STEP PROCESS
• Acquisition
• Identification
• Evaluation
• Presentation
Ict forensics and  audit bb

More Related Content

PDF
Global Commision on Internet Governance
PDF
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
PPTX
How secure are you?
PDF
Securing information in the New Digital Economy- Oracle Verizon WP
PDF
The economic impact of cybercrime and cyber espionage
PDF
The digital economy and cybersecurity
PDF
Rp economic-impact-cybercrime2
PDF
State of Cyber Crime Safety and Security in Banking
Global Commision on Internet Governance
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
How secure are you?
Securing information in the New Digital Economy- Oracle Verizon WP
The economic impact of cybercrime and cyber espionage
The digital economy and cybersecurity
Rp economic-impact-cybercrime2
State of Cyber Crime Safety and Security in Banking

What's hot (19)

PPTX
Cyber crimes in india Dr. Neeta Awasthy
PDF
BLURRING BOUNDARIES
PDF
Little book of cyber scams
PDF
Cybercriminality
PDF
Critical Update Needed: Cybersecurity Expertise in the Boardroom
PDF
Red Flag Rules
PPTX
Corporate Espionage in India
PDF
Fraudsters Hackers & Thieves!
PDF
Global Identity Fraud Report 2020
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PDF
Sas wp enterrprise fraud management
PPTX
Forensic Investigations and Staff Dishonesty in Cameroon
PDF
Article global it systems are now even more vulnerable - paul wright
DOCX
Cyber crime paper
PDF
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
PDF
IBM X-Force Threat Intelligence Report 2016
PDF
Detecting fraud in cellular telephone networks
PDF
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
DOC
Cyber-Law and Cyber-Crime
Cyber crimes in india Dr. Neeta Awasthy
BLURRING BOUNDARIES
Little book of cyber scams
Cybercriminality
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Red Flag Rules
Corporate Espionage in India
Fraudsters Hackers & Thieves!
Global Identity Fraud Report 2020
CRI "Lessons From The Front Lines" March 26th Dublin
Sas wp enterrprise fraud management
Forensic Investigations and Staff Dishonesty in Cameroon
Article global it systems are now even more vulnerable - paul wright
Cyber crime paper
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
IBM X-Force Threat Intelligence Report 2016
Detecting fraud in cellular telephone networks
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Cyber-Law and Cyber-Crime
Ad

Similar to Ict forensics and audit bb (20)

PDF
Utilizing Internet for Fraud Examination and Investigation
PDF
LogRhythm Reducing cyber risk in the legal sector Whitepaper
PDF
Reducing-Cyber-Risk-Whitepaper-Email (UK)
PDF
Reducing-Cyber-Risk-Whitepaper-Email (UK)
PPTX
Cyber Threat Overview for Euro IT counsel
PDF
FORUM 2013 Cyber Risks - not just a domain for IT
PDF
Digital Crime & Forensics - Presentation
PDF
Cyber Fraud and Risk Management By Bolaji Bankole
PDF
Cyber crimes trends to watch-full book-l
PPT
Chapter5.ppt
PPT
164199724-Introduction-To-Digital-Forensics-ppt.ppt
PPTX
CRI Retail Cyber Threats
PPTX
Baase_Henry_GoF5e_Ch5.ppt Gift of Fire, Computer Ethics
PDF
Uk Security Breach Investigations Report 2010
PDF
Cyber forensic readiness cybercon2012 adv j fick
PPTX
The Evolution of Cybercrime
PPTX
FINANCIAL CYBERCRIME PPT BY PRIYANSHU 1.pptx
PPTX
Cyber crime financial presentation 4.pptx
PPT
PPTX
CYBER CRIME
Utilizing Internet for Fraud Examination and Investigation
LogRhythm Reducing cyber risk in the legal sector Whitepaper
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Reducing-Cyber-Risk-Whitepaper-Email (UK)
Cyber Threat Overview for Euro IT counsel
FORUM 2013 Cyber Risks - not just a domain for IT
Digital Crime & Forensics - Presentation
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber crimes trends to watch-full book-l
Chapter5.ppt
164199724-Introduction-To-Digital-Forensics-ppt.ppt
CRI Retail Cyber Threats
Baase_Henry_GoF5e_Ch5.ppt Gift of Fire, Computer Ethics
Uk Security Breach Investigations Report 2010
Cyber forensic readiness cybercon2012 adv j fick
The Evolution of Cybercrime
FINANCIAL CYBERCRIME PPT BY PRIYANSHU 1.pptx
Cyber crime financial presentation 4.pptx
CYBER CRIME
Ad

Recently uploaded (20)

PPTX
Configure Apache Mutual Authentication
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
CloudStack 4.21: First Look Webinar slides
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
Configure Apache Mutual Authentication
sbt 2.0: go big (Scala Days 2025 edition)
Abstractive summarization using multilingual text-to-text transfer transforme...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Zenith AI: Advanced Artificial Intelligence
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
CloudStack 4.21: First Look Webinar slides
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
A comparative study of natural language inference in Swahili using monolingua...
Chapter 5: Probability Theory and Statistics
Hindi spoken digit analysis for native and non-native speakers
UiPath Agentic Automation session 1: RPA to Agents
Enhancing emotion recognition model for a student engagement use case through...
Custom Battery Pack Design Considerations for Performance and Safety
Consumable AI The What, Why & How for Small Teams.pdf
Convolutional neural network based encoder-decoder for efficient real-time ob...
Microsoft Excel 365/2024 Beginner's training
Credit Without Borders: AI and Financial Inclusion in Bangladesh
NewMind AI Weekly Chronicles – August ’25 Week III

Ict forensics and audit bb

  • 1. 1 1 Towards a Secure Digital Future - Zimbabwe , June 2015 Dr W Ruakanda wr@mornipac.co.za This report is solely for the use at CSZ presentation. No part of it may be circulated, quoted, or reproduced for distribution outside the client organization without prior written approval from MorniPac Consultants This material was used by MorniPac Consultants during an oral presentation; it is not a complete record of the discussion. Computer Society of Zimbabwe Business School ICT Forensics A Brief Introduction (VoWiFi) please feel free to add your input and comments
  • 3. Wednesday, 21 January 2015 Voice over WiFi (VoWiFi) technical details VoWiFi is certainly a hot topic, thanks to the support of VoWiFi on iPhone 6. A presentation from LTE World Summit 2014 by Taqua on this topic has already crossed 13K views
  • 24. BLUE COAT SYSTEMS MOBILE MALWARE REPORT: A NEW LOOK AT OLD THREATS The explosion of mobile devices means there are now 1.5 billion new ways to steal data, passwords, or money. This has replaced pornography as the leading mobile threat. There are fresh insights into other new tricks cybercriminals have perpetrated as well as learn more about:  Today’s most prolific mobile threats  The stages of a mobile attack  How user behavior drives mobile threats  What directs users to mobile malware  Best practices for avoiding trouble Copyright ® 2015, Blue Coat Systems, Inc. All Rights Reserved
  • 25. The cost of cyber crime for the global economy has been estimated at $445 billion (£266 billion) annually. Cyber espionage and stealing individuals' personal information is believed to have affected more than 800 million people during 2013. Financial losses from cybertheft could cause as many as 150,000 Europeans to lose their jobs, according to a report conducted by internet security company McAfee. Cyber crime damages trade between nations, competitiveness, innovation, and global economic growth, and slows the pace of global innovation. McAfee is calling for governments to begin a serious, systematic effort to collect and publish data on cybercrime to help countries and companies make better choices about risk and policy. By Rhiannon Williams : 2:44PM BST 09 Jun 2014
  • 26. Studies estimate that the internet economy annually generates between $2 trillion and $3 trillion, a share of the global economy that is expected to grow rapidly. Based on Center for Strategic and International Studies (CSIS) analysis, cybercrime extracts between 15 per cent and 20 per cent of the value created by the internet. Despite one London-based business losing $1.3 billion (£800 million) in a single malicious attack during 2012, the majority of cyber criminals still have substantial difficulty in monetising their stolen data. The total cost of cyber crime to the UK economy alone was $11.4 billion during 2013, the equivalent to 0.16 per cent of the GDP. Retailers lost more than $850 million during the same period as a result of penalty free financial crime. The figures do not come as a surprise to security professionals and big businesses, said Mark Sparshott, EMEA director of security firm Proofpoint. He said the attraction of cybercrime to many criminals was due to its relatively low level of risk. "The volumes of attacks are increasing because it is a profitable business model for organised crime," he said. " With cyber crime there is no risky getaway because the attack is routed through hundreds or thousands of PCs in dozens of countries, making it almost impossible to trace. The internet makes most attacks anonymous and untraceable and that is really attractive to cybercriminals.” Raj Samani, EMEA Chief Technology Officer for McAfee, agreed. “It is clear that cyber crime has a real and detrimental impact on the global economy. Over time, cyber crime has become a growth industry; the returns are great, and the risks are low,” he said. "As more businesses move online and more consumers connect to the internet, the opportunities for cybercrime will only grow, making it imperative that countries work together now to proactively tackle cyber crime.”
  • 27. Telegraph Technology Is this what the iPhone 6s or 7 will look like?: in pictures 2:32PM BST 04 Jun 2014 America and China have spent the past few years in a stand-off over Chinese attitudes to intellectual property, and how the Chinese government goes about cyber-spying. Virtually all nations engage in cyber-spying to some degree, but experts suspect China of using the material to give Chinese companies an unfair advantage over their foreign rivals. However, Chinese businesses insist they act independently of the government, and have accused America of having a protectionist agenda. Huawei said it has been frozen out of US contracts because of “jealousy”. The US government has issued a number of reports claiming that Chinese companies posed a security risk. Senators on the cyber security council have also cautioned American businesses to blacklist Huawei and ZTE, another technology firm, unless they got the all-clear from a US government agency. Source: Bloomberg
  • 28. …….also your biggest liability. Unfortunately, computer information is often not adequately protected and computer- related crime is rapidly growing. The ability to discover and investigate the misuse or theft of sensitive information is becoming increasingly important if the information you store electronically is to remain intact and, more importantly, within your control.
  • 29. Forensic Focus UK cyber crime costs +£37bn a year Oxygen Software Focuses on Smart Phone Forensics with Oxygen Forensic Suite 2011 Digital Forensic Investigations: Just how good are they? Nigeria: Expert Canvasses Forensic Protection of Votes How to perform a forensic PC investigation (with OSForensics)
  • 34. Chapter 1 Forensic and Investigative Accounting 34 Big-Six's Position • A forensic audit is akin to a police investigation. • All public companies should have a forensic audit on a regular basis. Companies would be required to have such an audit every three or five years or face these audits on a random basis. • Forensic auditors scrutinize all records of companies, including emails, and would be able, if not required, to question all company employees, and to require statements under oath. • Might be necessary for an audit network or a specialized forensic auditors to complete a forensic audit with the aid of independent attorneys (not those who have represented the audit client in the other engagements). Source: “Serving Global Markets and the Global Economy: A View from the CEOs of the International Audit Networks, November 2006, p. 13.
  • 35. Chapter 1 Forensic and Investigative Accounting 35 More Differences Two practitioners have suggested these additional procedures may be used in a forensic audit:  Extensive use of interviews and leveraging techniques designed to elicit sufficient information to prove or disprove a hypothesis.  Document inspection that may extend to authentication procedures and handwriting analysis.  Significant public records search to uncover, for example, unexpected title or ownership, other known addresses, and prior records of individuals.  Legal knowledge regarding rules of evidence including chain of custody and preservation of evidence integrity. Source: Annett Stalker and M.G. Ueltzen, “An Audit Versus A Fraud Examination,” CPA Expert, Winter 2009, p. 4.
  • 36. Chapter 1 Forensic and Investigative Accounting 36 Inexperienced Forensic Auditors • Find out who did it. Do not worry about all the endless details. • Be creative, think like the fraudster, and do not be predictable. Lower the auditing threshold without notice. • Take into consideration that fraud often involves conspiracy. • Internal control lapses often occur during vacations, sick outages, days off, and rest breaks, especially when temporary personnel replace normal employees. H. R. Davia, Fraud 101, New York: John Wiley & Sons, 2000, pp. 42-45.
  • 37. The rising allegations of significant fraud and corruption crimes have brought upon a new dimension towards the prominent need for application of auditing expertise to situations that have legal consequences, more widely known as FORENSIC AUDITING Challenged with the responsibility and the trust of stake holders and investors to detect and investigate fraud and other financial reporting misstatements, auditors are increasingly being pushed to be more efficient and pro-active. The increased business complexities in today's litigious environment have enhanced the need for auditors to be ABSOLUTELY, PERFECTLY and UNQUESTIONABLY determined whether financial statements are accurate and incompliance with regulations. Thus there is need to master and understand the tools to tackle and build a solid foundation in fraud PREVENTION, DETECTION, and DETERRENCE. With in-depth understanding on forensic auditing and its impact towards organizations' value.
  • 39. • Examples of Fraud • Fraudulent educational qualifications • Pretending that you have the lawful qualifications • Submission of False claims – insurance, kilometers, medical certificates, overtime • Cheque / document fraud • Credit card fraud – using company credit cards for personal expenses • Improper transfer of funds or goods to another person not legally entitles to • Duplicate payments, payment for services or goods not rendered • Or delivered of inferior goods, redundant assets & etc
  • 40. • Falsification of invoices • Creation of fictitious supplier accounts • Creation of fictitious employees on the company payroll • Using the organization resources or contracts to run and benefit your own private business ( which may be in conflict with your employer business • Inflating prices / fees for goods rendered or delivered • Falsification of leave register or failure to report leave • Procurement fraud
  • 41. Digital Forensics Definition: “Tools and techniques to recover, preserve, and examine digital evidence on or transmitted by digital devices.” Devices include computers, PDAs, cellular phones, videogame consoles, copy machines, printers, …
  • 43. FORENSICS IS A FOUR STEP PROCESS • Acquisition • Identification • Evaluation • Presentation