information technology audit forensic techniques l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Information Technology Audit & Forensic Techniques PowerPoint Presentation
Download Presentation
Information Technology Audit & Forensic Techniques

Loading in 2 Seconds...

play fullscreen
1 / 85

Information Technology Audit & Forensic Techniques - PowerPoint PPT Presentation


  • 424 Views
  • Uploaded on

Information Technology Audit & Forensic Techniques. ACG 6936 Summer 2007. Grover Kearns, PhD, CPA. IT Forensic Techniques for Auditors Presentation Focus. Importance of IT Forensic Techniques to Organizations Importance of IT Forensic Techniques to Auditors

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Information Technology Audit & Forensic Techniques' - emily


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
information technology audit forensic techniques

Information Technology Audit & Forensic Techniques

ACG 6936 Summer 2007

Grover Kearns, PhD, CPA

it forensic techniques for auditors presentation focus
IT Forensic Techniques for AuditorsPresentation Focus
  • Importance of IT Forensic Techniques to Organizations
  • Importance of IT Forensic Techniques to Auditors
  • Audit Goals of Forensic Investigation
  • Digital Crime Scene Investigation
  • Illustration of Forensic Tools
  • A Forensic Protocol
forensic computing defined
Forensic Computing Defined

Forensic Computing is the process of identifying, preserving, analyzing, and presenting digital evidence in a manner that is legally acceptable in a court of law

Our interest is in …

  • Identifying and preserving evidence,
  • “post-mortem” system analysis to determine extent and nature of attack, and
  • the forensic framework
importance of it forensic techniques to organizations
Importance of IT Forensic Techniques to Organizations

Corporate Fraud Losses in 2004

  • Cost companies an average loss of assets over $ 1.7 million
  • A 50% increase over 2003
  • Over one third of these frauds were discovered by accident, making "chance" the most common fraud detection tool.
    • PriceWaterhouseCoopers, Global Economic Crime Survey 2005
importance of it forensic techniques to organizations the new corporate environment
Importance of IT Forensic Techniques to OrganizationsThe New Corporate Environment
  • Sarbanes-Oxley 2002
  • COSO and COBIT
  • SAS 94 and SAS 99
  • ISO 9000 and ISO 17799
  • Gramm-Leach-Bliley Act
  • US Foreign Corrupt Practices Act

…all of these have altered the corporate environment and made forensic techniques a necessity!

importance of it forensic techniques to auditors sas 99
Importance of IT Forensic Techniques to AuditorsSAS 99

SAS No. 99 - Consideration of Fraud in a Financial Statement Audit - requires auditors to …

  • Understand fraud
  • Gather evidence about the existence of fraud
  • Identify and respond to fraud risks
  • Document and communicate findings
  • Incorporate a technology focus
importance of it forensic techniques to organizations intellectual property losses
Importance of IT Forensic Techniques to OrganizationsIntellectual Property Losses
  • Rapid increase in theft of IP – 323% over five year period 1999-2004
  • 75% of estimated annual losses were to an employee, supplier or contractor
  • Digital IP is more susceptible to theft
  • Employees may not view it as theft
importance of it forensic techniques to organizations network fraud
Importance of IT Forensic Techniques to OrganizationsNetwork Fraud
  • Companies now highly reliant on networks
  • Networks increasingly vulnerable to attacks
  • Viruses, Trojans, Rootkits can add backdoors
  • Social Engineering including Phishing and Pharming
  • Confidential and proprietary information can be compromised
  • Can create a corporate liability
importance of it forensic techniques to organizations security challenges

Technology

People

Policies

Processes

Importance of IT Forensic Techniques to OrganizationsSecurity Challenges
  • Technology expanding and becoming more sophisticated
  • Processes evolving and integrating with technologies
  • People under trained
  • Policies outdated
  • Organizations at risk
importance of it forensic techniques to auditors
Importance of IT Forensic Techniques to Auditors
  • Majority of fraud is uncovered by chance
  • Auditors often do not look for fraud
  • Prosecution requires evidence
  • Value of IT assets growing

Treadway Commission Study …

  • Undetected fraud was a factor in one-half of the 450 lawsuits against independent auditors.
importance of it forensic techniques to auditors auditor s knowledge skills abilities
Importance of IT Forensic Techniques to AuditorsAuditor’s Knowledge, Skills, Abilities
  • Accounting
  • Auditing
  • IT (weak)

Needed …

  • Increased IT knowledge
  • Fraud and forensic accounting knowledge
  • Forensic investigative and analytical skills and abilities
importance of it forensic techniques to auditors knowledge skills abilities needs
Importance of IT Forensic Techniques to AuditorsKnowledge, Skills, Abilities: Needs

Auditor’s need KSAs to …

  • Build a digital audit trail
  • Collect “usable” courtroom electronic evidence
  • Trace an unauthorized system user
  • Recommend or review security policies
  • Understand computer fraud techniques
  • Analyze and valuate incurred losses
importance of it forensic techniques to auditors ksa needs cont
Importance of IT Forensic Techniques to AuditorsKSA Needs (cont.)
  • Understand information collected from various computer logs
  • Be familiar with the Internet, web servers, firewalls, attack methodology, security procedures & penetration testing
  • Understand organizational and legal protocols for incident handling
  • Establish relationships with IT, risk management, security, law enforcement
audit goals of a forensic investigation
Audit Goals of a Forensic Investigation
  • Uncover fraudulent or criminal cyber activity
  • Isolate evidentiary matter (freeze scene)
  • Document the scene
  • Create a chain-of-custody for evidence
  • Analyze digital information
  • Communicate results
audit goals of a forensic investigation immediate concerns
Audit Goals of a Forensic InvestigationImmediate Concerns
  • What is level of certainty that a problem exists?
  • Is this a criminal act?
    • Child porn, money laundering
    • When should law enforcement be involved?
  • Can the system be isolated?
  • Is a subpoena necessary?
  • Is the intrusion internal or external?
  • Are suspects known?
  • Is extent of loss/damage known?
audit goals of a forensic investigation immediate response
Audit Goals of a Forensic InvestigationImmediate Response
  • Shut down computer (pull plug)
  • Bit-stream mirror-image of data
  • Begin a traceback to identify possible log locations
  • Contact system administrators on intermediate sites to request log preservation
  • Contain damage
  • Collect local logs
  • Begin documentation
audit goals of a forensic investigation continuing investigation
Implement measures to stop further loss

Communicate to management and audit committee regularly

Analyze copy of digital files

Ascertain level and nature of loss

Identify perpetrator(s)

Develop theories about motives

Maintain chain-of-custody

Audit Goals of a Forensic Investigation Continuing Investigation
digital crime scene investigation
Digital Crime Scene Investigation

Goal: Determine what fraud events occurred

by using digital evidence

Three Phases:

  • Preserve & Document Scene
  • Analyze/Search & Document Data
  • Reconstruct & Document Fraud Event
digital crime scene investigation scene preservation documentation
Digital Crime Scene InvestigationScene Preservation & Documentation
  • Goal: Preserve the state of as many digital objects as possible and document the crime scene.
  • Methods:
    • Shut system down
    • Unplug (best)
    • Do nothing
  • Bag and tag
treat every incident as if it will end up in a criminal prosecution
Treat every incident as if it will end up in a criminal prosecution.

Digital Crime Scene Investigation

Investigative Axiom

digital crime scene investigation incidents investigations
Digital Crime Scene InvestigationIncidents & Investigations
  • Incident/Crime: An event that violates a policy or law
  • Investigation: A process that develops and tests hypotheses to answer questions about events that occurred
audit goals of a forensic investigation rules of evidence
Audit Goals of a Forensic InvestigationRules of Evidence
  • Complete
  • Authentic
  • Admissible
  • Reliable
  • Believable
audit goals of a forensic investigation requirements for evidence
Audit Goals of a Forensic Investigation Requirements for Evidence

Computer logs …

  • Must not be modifiable
  • Must be complete
  • Appropriate retention rules
digital crime scene investigation problems with digital investigation
Digital Crime Scene InvestigationProblems with Digital Investigation
  • Timing essential – electronic evidence volatile
  • Auditor may violate rules of evidence
  • NEVER work directly on the evidence
  • Skills needed to recover deleted data or encrypted data
digital crime scene investigation extract process interpret
Digital Crime Scene InvestigationExtract, process, interpret
  • Work on the imaged data or “safe copy”
  • Data extracted may be in binary form
  • Process data to convert it to understandable form
    • Reverse-engineer to extract disk partition information, file systems, directories, files, etc
    • Software available for this purpose
  • Interpret the data – search for key words, phrases, etc.
digital crime scene investigation technology
Digital Crime Scene InvestigationTechnology
  • Magnetic disks contain data after deletion
  • Overwritten data may still be salvaged
  • Memory still contains data after switch-off
  • Swap files and temporary files store data
  • Most OS’s perform extensive logging (so do network routers)
disk geometry

Track

Sector

(Clusters are

groups of

Sectors)

Cylinder

Disk Geometry
slack space
Slack Space

End of File

Slack Space

Last Cluster in a File

digital crime scene investigation order of volatility
Digital Crime Scene InvestigationOrder of Volatility
  • Preserve most volatile evidence first
    • Registers, caches, peripheral memory
    • Memory (kernel, physical)
    • Network state
    • Running processes
    • Disk
    • Floppies, backup media
    • CD-ROMs, printouts
digital crime scene investigation digital forensic investigation
Digital Crime Scene InvestigationDigital Forensic Investigation

A process that uses science and technology to examine digital objects and that develops and tests theories, which can be entered into a court of law, to answer questions about events that occurred.

IT Forensic Techniques are used to capture and analyze electronic data and develop theories.

illustration of forensic tools
Illustration of Forensic Tools

Forensic Software Tools are used for …

  • Data imaging
  • Data recovery
  • Data integrity
  • Data extraction
  • Forensic Analysis
  • Monitoring
data imaging encase
Data ImagingEnCase
  • Reduces internal investigation costs
  • Platform independent
  • Automated analysis saves time
  • Supports electronic records audit
  • Creates logical evidence files — eliminating need to capture entire hard drives
data imaging encase37
Data ImagingEnCase
  • Previews computers over the network to determine whether relevant evidence exists:
    • Unallocated/allocated space
    • Deleted files
    • File slack
    • Volume slack
    • File system attributes
    • CD ROMs/DVDs
    • Mounted FireWire and USB devices
    • Mounted encrypted volumes
    • Mounted thumb drives
data integrity md5
Data IntegrityMD5
  • Message Digest – a hashing algorithm used to generate a checksum
  • Available online as freeware
  • Any changes to file will change the checksum

Use:

  • Generate MD5 of system or critical files regularly
  • Keep checksums in a secure place to compare against later if integrity is questioned
audit command language acl
Audit Command Language (ACL)
  • ACL is the market leader in computer-assisted audit technology and is an established forensics tool.

Clientele includes …

  • 70 percent of the Fortune 500 companies
  • over two-thirds of the Global 500
  • the Big Four public accounting firms
forensic tools audit command language
Forensic ToolsAudit Command Language

ACL is a computer data extraction and analytical audit tool with audit capabilities …

  • Statistics
  • Duplicates and Gaps
  • Stratify and Classify
  • Sampling
  • Benford Analysis
forensic tools acl benford analysis
Forensic Tools: ACLBenford Analysis
  • States that the leading digit in some numerical series is follows an exponential rather than normal distribution
  • Applies to a wide variety of figures: financial results, electricity bills, street addresses, stock prices, population numbers, death rates, lengths of rivers
data monitoring employee internet activity
Data MonitoringEmployee Internet Activity

Spector captures employee web activity including keystrokes, email, and snapshots to answer questions like:

  • Which employees are spending the most time surfing web sites?
  • Which employees chat the most?
  • Who is sending the most emails with attachments?
  • Who is arriving to work late and leaving early?
  • What are my employees searching for on the Internet?
data capture key log hardware keykatcher
Data Capture : Key Log HardwareKeyKatcher
  • Records chat, e-mail, internet & more
  • Is easier to use than parental control software
  • Identifies internet addresses
  • Uses no system resources
  • Works on all PC operating systems
  • Undetectable by software

www.lakeshoretechnology.com

developing a forensic protocol

Technology

People

Policies

Processes

Developing a Forensic Protocol
  • The response plan must include a coordinated effort that integrates a number of organizational areas and possibly external areas
  • Response to fraud events must have top priority
  • Key players must exist at all major organizational locations
developing a forensic protocol end to end forensic analysis
Developing a Forensic ProtocolEnd-to-End Forensic Analysis

First rule of end-to-end forensic digital analysis

  • Primary evidence must always be corroborated by at least one other piece of relevant primary evidence to be considered a valid part of the evidence chain. Evidence that does not fit this description, but does serve to corroborate some other piece of evidence without itself being corroborated, is considered to be secondary evidence.
  • Exception: the first piece of evidence in the chain from the Identification layer
a forensic protocol security exposures
A Forensic ProtocolSecurity Exposures

Organizations may possess critical technology skills but …

  • Skills are locked in towers – IT, Security, Accounting, Auditing
  • Skills are centralized while fraud events can be decentralized
  • Skills are absent – vacations, illnesses, etc
a forensic protocol the role of policies
A Forensic ProtocolThe Role of Policies
  • They define the actions you can take
  • They must be clear and simple to understand
  • The employee must acknowledge that he or she read them, understands them and will comply with them
  • They can’t violate law
a forensic protocol forensic response control
A Forensic ProtocolForensic Response Control

Incident Response Planning …

  • Identify needs and objectives
  • Identify resources
  • Create policies, procedures
  • Create a forensic protocol
  • Acquire needed skills
  • Train
  • Monitor
a forensic protocol documenting the scene
A Forensic ProtocolDocumenting the Scene
  • Note time, date, persons present
  • Photograph and video the scene
  • Draw a layout of the scene
  • Search for notes (passwords) that might be useful
  • If possible freeze the system such that the current memory, swap files, and even CPU registers are saved or documented
a forensic protocol forensic protocol
A Forensic ProtocolForensic Protocol
  • First responder triggers alert
  • Team response
    • Freeze scene
    • Begin documentation
  • Auditors begin analysis
    • Protect chain-of-custody
    • Reconstruct events and develop theories
    • Communicate results of analysis
a forensic protocol protocol summary
A Forensic ProtocolProtocol Summary
  • Ensure appropriate policies
  • Preserve the crime scene (victim computer)
  • Act immediately to identify and preserve logs on intermediate systems
  • Conduct your investigation
  • Obtain subpoenas or contact law enforcement if necessary

Key: Coordination between functional areas

conclusion
Conclusion

IT Forensic Investigative Skills Can …

  • Decrease occurrence of fraud
  • Increase the difficulty of committing fraud
  • Improve fraud detection methods
  • Reduce total fraud losses

Auditors trained in these skills are more valuable to the organization!

questions or comments
Questions or Comments?

Grover Kearns

gkearns@stpt.usf.edu

University of South Florida St. Petersburg

web resources
Web Resources
  • ACL
    • http://www.acl.com/Default.aspx?bhcp=1
  • Eraser
    • http://www.heidi.ie/eraser/
  • Private Disk
    • http://www.private-disk.net/
  • HashCalc
    • http://www.slavasoft.com/hashcalc/index.htm
  • PC Inspector
    • http://www.download.com/3000-2242-10066144.html
  • VeriSign
    • http://www.verisign.com
  • HandyBits Encryption
    • http://www.handybits.com/
  • EnCase
    • http://www.handybits.com/
web resources cont
Web Resources (cont.)
  • Spector

http://www.spectorsoft.com/

  • Stolen ID Search

https://www.stolenidsearch.com/

  • Abika Background Check

http://www.abika.com/

  • Guide to Log Management

http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf

  • ACFE Fraud Prevention Checkup

http://www.acfe.com/documents/Fraud_Prev_Checkup_IA.pdf

  • NetWitness

http://www.netwitness.com/

  • GASP Std V 7.0 Free Software

http://www.bsa.org/usa/antipiracy/Free-Software-Audit-Tools.cfm

  • Federal Guidelines for Searches

http://www.cybercrime.gov/searchmanual.htm