ACC571 Case Response 3-Case 41

ACC571 Case Response 3-Case 41 - Case Response 3 Case...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Case Response 3 1 Case Response 3: Chapter 6 - Case 41 How could Tom Apply Computer Forensics and Other techniques to Determine Whether or Not Betty Beanco Should Be a Suspect? Strayer University Case Response 3: Chapter 6 - Case 41
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Case Response 3 2 How could Tom Apply Computer Forensics and Other techniques to Determine Whether or Not Betty Beanco Should Be a Suspect? “Computer forensic involves applying computer science techniques to assist in investigations relating to a wide range of legal matters” (Hopwood, Leiner, & Young, 2008, p.169). That is, it is a process of investigation where investigators identify, preserve, analyze, and present digital evidence in a manner that is legally acceptable ((Lim, 2006). Digital evidence is “any data stored or transmitted using a computer that support or refute a theory of how an offence occurred or that address critical elements of the offence such as intent or alibi”(Casey, 2004, p.12). Computer forensics focuses on finding digital evidence after a computer security incident has occurred. The goal of computer forensics is to do a structured investigation and find out exactly what happened on a digital system, and who was responsible for it. To understand what happened and who was responsible for the corporate frauds, investigators employed computer forensics and recovered numerous deleted e-mails and other documents from computers used by the involved parties (Anatasi, 2003). In this case, to determine whether or not Betty Beanco should be a suspect and then to solve the financial crime, Tom, a forensic accountant, should take each of the following steps to reach a successful conclusion. 1. Consulting with client. 2. Establishing a chain of custody. 3. Acquiring evidence. 4. Analyzing evidence. 5. Reporting and testimony. Consulting with Client
Background image of page 2
Case Response 3 3 This first step in the computer examination is to understand where data exists, what conduct is at issue, what the aim of the investigation is and what output is sought. The most effective place to begin a computer forensic investigation is to consult with client to create a strategy for collecting, analyzing and processing the data. This strategy may include analysis of where the critical information exists, as well as the identification of protocols that will ensure the admissibility of the data into evidence in a court of law, should it become necessary (Wall & Paroff, 2005). ”The seriousness of the matter and the sophistication of the perpetrator(s) will have the largest impact on the approach taken” (Hopwood, Leiner, & Young, 2008, p.172). In addition, before any investigation begins, the investigator should ensure that he/she has the proper legal authority to seize, copy, and examine the data, and is not invading someone’s privacy without authorization (Hopwood, Leiner, & Young, 2008). Generally, “corporations and business owners can give permission to inspect items under their ownership and control, but some exceptions exist” (Hopwood, Leiner, & Young, 2008, p.171).
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/15/2011 for the course ACCOUNTING ACC571 taught by Professor Naurid.ahmed during the Spring '11 term at Strayer.

Page1 / 11

ACC571 Case Response 3-Case 41 - Case Response 3 Case...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online