Page 135 - CFF
P. 135

Conducting computer forensics

         investigations



         • Sizing up the situation


            – Nature of the investigation

            – Fraud theory
            – Whether the fraud is ongoing

            – Possible sources of evidence

            – Sophistication of the suspect

            – Software and hardware involved
            – Structure of the network

            – Applicable security policies and procedures

         • Securing evidence


            – Secure the site
            – Document the site

         11   © 2019 Association of International Certified Professional Accountants. All rights reserved.
   130   131   132   133   134   135   136   137   138   139   140