Page 135 - CFF
P. 135
Conducting computer forensics
investigations
• Sizing up the situation
– Nature of the investigation
– Fraud theory
– Whether the fraud is ongoing
– Possible sources of evidence
– Sophistication of the suspect
– Software and hardware involved
– Structure of the network
– Applicable security policies and procedures
• Securing evidence
– Secure the site
– Document the site
11 © 2019 Association of International Certified Professional Accountants. All rights reserved.