Forensic accounting and the use of E-discovery and cyber forensics

2021 ◽  
pp. 323-334
Author(s):  
Richard Dippel
2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Dr Esha Jain ◽  
Jonika Lamba

Forensic Accounting is one of the emerging fields for accountancy professionals. Forensic Accounting is the function of bookkeeping, auditing and analytical expertise to combat the financial and white-collar crimes. The scope of forensic accounting has expanded due to cases of corporate scams and financial frauds. Forensic Accounting is the dynamic and strategic tool which helps in combating the corruption, financial crimes and frauds through the application of forensic auditing techniques. There is a huge demand for forensic auditors in the field of insurance, banks, police armed forces and government departments. This paper shows the application of information technology and cyber forensics to curb the malfunctioning done by corporate. In this paper role of the forensic auditor has been explained and the various techniques employed by forensic auditors have also been discussed. The latest cases in the field of forensic accounting have also been included in this paper. Forensic auditors can help the economy to grow and protect the interest of various stakeholders.


2019 ◽  
Author(s):  
Padmashree Cheluvamurthy ◽  
Shashikala S V
Keyword(s):  

Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5300
Author(s):  
Antonia Nisioti ◽  
George Loukas ◽  
Stefan Rass ◽  
Emmanouil Panaousis

The use of anti-forensic techniques is a very common practice that stealthy adversaries may deploy to minimise their traces and make the investigation of an incident harder by evading detection and attribution. In this paper, we study the interaction between a cyber forensic Investigator and a strategic Attacker using a game-theoretic framework. This is based on a Bayesian game of incomplete information played on a multi-host cyber forensics investigation graph of actions traversed by both players. The edges of the graph represent players’ actions across different hosts in a network. In alignment with the concept of Bayesian games, we define two Attacker types to represent their ability of deploying anti-forensic techniques to conceal their activities. In this way, our model allows the Investigator to identify the optimal investigating policy taking into consideration the cost and impact of the available actions, while coping with the uncertainty of the Attacker’s type and strategic decisions. To evaluate our model, we construct a realistic case study based on threat reports and data extracted from the MITRE ATT&CK STIX repository, Common Vulnerability Scoring System (CVSS), and interviews with cyber-security practitioners. We use the case study to compare the performance of the proposed method against two other investigative methods and three different types of Attackers.


Sign in / Sign up

Export Citation Format

Share Document