Chapter 13: Investigation of Electronic Data: A Brief Introduction

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/95

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:22 AM on 4/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

96 Terms

1
New cards

_____ is the analysis of electronic data for the purposes of its recovery, legal preservation, authentication, reconstruction, and presentation to solve or aid in solving technology-based crimes.

Computer forensics

2
New cards

While computer forensics is restricted to the investigation of computer data, when forensic investigations go beyond just computers, they are called _____. 

digital forensics

3
New cards

A computer may contain electronic evidence of criminal activity for two reasons.

  1. First, when a computer is the target of a criminal, it contains evidence of the attack. Stealing financial data, such as credit card or pin numbers, on a server is an example of such an attack.

  2. Second, a computer may be a tool or instrument used to commit a crime. Such an example is an employee’s workplace computer being used to carry out a financial fraud.

4
New cards

Currently, auditors have several auditing standards to provide them with guidance in dealing with fraud and illegal acts by their clients. 

  • Evidential Matter (AU 326)

  • SAS No. 80, Amendment to SAS No. 31Evidential Matter (now AU Section 326)

  • in SAS No. 54, Illegal Acts by Clients (AU 317), and SAS No. 99 (AU 316), Consideration of Fraud in a Financial Statement Audit

5
New cards
6
New cards

Evidential Matter (AU 326) provides guidelines for audit engagements encountering electronic documents. It states that-

When an audit relies heavily on electronic evidence, substantive testing alone may not be sufficient to reduce detection risk, because digital data can be complex, incomplete, or unreliable without evaluating the system that produced it. If auditors cannot reduce detection risk through substantive testing, they must test internal controls to ensure the system generating electronic data is reliable enough to support financial statement assertions.

7
New cards

Because large volumes of data are processed electronically, auditors may need to use generalized audit software or continuous auditing tools to test controls and analyze transactions efficiently.

8
New cards

SAS No. 80 defines evidential matter as both ____ and ____ information, e.g., written checks and electronic fund transfers, respectively.

written and electronic

9
New cards

Time Sensitivity of Electronic Evidence

Unlike paper evidence, electronic data may be deleted, overwritten, or become inaccessible over time, so auditors must consider timing when collecting and testing evidence.

10
New cards

The Information Technology Age: Evidential Matter in the Electronic Environment (ITA) recommends-

that auditors need a working understanding of how electronic data is stored and extracted from systems, as well as the risk that data may be intentionally manipulated or altered.

11
New cards

SAS No. 99 (AU 316), Consideration of Fraud in a Financial Statement Audit. SAS No. 99 provides guidelines for testing digital data. It states that:

In IT environments, auditors are expected to use computer-assisted audit techniques (CAATs) such as data extraction tools to identify and test unusual journal entries and adjustments.

12
New cards

Auditors must maintain heightened __________, meaning they actively question data, consider fraud risks, and do not assume management is always truthful.

professional skepticism

13
New cards

Audit teams are required to ______ how fraud could occur within the organization, helping identify potential schemes and areas of risk before testing begins.

brainstorm

14
New cards

Because electronic data can be complex, auditors should involve IT specialists in fraud brainstorming and testing to analyze systems and detect manipulation (e.g., altered journal entries)

15
New cards

In an audit, the auditor’s primary responsibility is to assess whether financial statements are fairly presented, so cybersecurity is only considered if it impacts financial reporting (e.g., causes material misstatements).

16
New cards

If a cyberattack leads to unauthorized access or data issues, it may require financial statement disclosures or recognition of losses/contingent liabilities, making it relevant to the audit.

17
New cards

Management is responsible for broad cyber risk analysis and prevention, while auditors only assess cyber risks to the extent they affect financial reporting.

18
New cards

Cyber risk analysis must be proactive and continuous, and this responsibility lies with management—not auditors—since auditors do not monitor systems on an ongoing basis.

19
New cards

cyber risk analysis is dependent on:

(1) accepting management's sole responsibility in accessing risk;

(2) being aware of the digital data related to identifying potential risk;

(3) having knowledge of the types of cyberattacks that are currently occurring and the company's vulnerability to those attacks; and

(4) having an organized structure to measure cyber risks.

20
New cards

The primary purpose of the Sarbanes-Oxley Act is to help avoid the financial frauds of the past. The approach taken in the legislation is

(1) to make management directly responsible for the integrity of the company’s financial statements, and

(2) to require a strengthening of internal control procedures.

21
New cards

Under Section 404, management must ensure internal controls are effective, and external auditors must validate and test those controls, including how financial data flows through IT systems.

22
New cards

The Securities and Exchange Commission requires companies to use the _______ Framework as the standard for evaluating internal control effectiveness under SOX. This framework emphasizes strong internal controls as the primary method for preventing and detecting financial fraud, especially in digital environments.

Committee of Sponsoring Organizations of the Treadway Commission (COSO)

23
New cards

The general information technology (IT) guidelines under the COSO framework have been established for the following eight areas:

  1. Internal control environment, 

  2. Objective setting, 

  3. Event identification, 

  4. Risk assessment, 

  5. Risk response, 

  6. Control activities, 

  7. Information and communication, and 

  8. Monitoring. 

24
New cards

COSO – Control Environment

means the underlying corporate culture is evaluated for its views on risk including risk-taking, ethical values, and adequate controls.

25
New cards

COSO – Objective-setting

evaluates whether there is a process in place for setting objectives that correspond with the organization’s mission.

26
New cards

COSO – Event identification

tries to determine how internal and external occurrences are separated by the organization into risk and opportunity classifications and then how they correlate with objectives.

27
New cards

COSO – Risk assessment

determines whether there is an effective response for managing IT risks faced by the organization.

28
New cards

COSO –Risk response

deals with avoiding, accepting or reducing such identified risk

29
New cards

COSO –Control activities

evaluate controls to determine whether effective controls are in place to work effectively in controlling IT risk.

30
New cards

COSO – Information and communication

Communication must be established so that it allows information to be broadly shared up and down the organization. It is also important to have assurances that the proper information is identified and captured.

31
New cards

COSO – Monitoring

Correct monitoring is in place if it can be verified that the controls in place are effective enough so that when weaknesses are detected there are corrective actions taken.

32
New cards

Auditors may use network vulnerability analysis tools to assess risks of unauthorized access and system weaknesses during audits.

33
New cards

Auditing Standard No. 2 requires auditors to assess both the design and operating effectiveness of internal controls as part of the financial statement audit.

34
New cards

The PCAOB emphasizes that a company’s use of information technology directly affects internal controls, meaning auditors must understand IT systems to properly evaluate financial reporting reliability.

35
New cards

PCAOB standards outline what auditors must evaluate (e.g., controls, fraud risk) but provide limited detail on how to implement effective IT controls, making frameworks like COBIT more useful in practice.

36
New cards

Auditing Standard No. 12 requires auditors to evaluate risks of unauthorized system access, which could lead to data destruction, manipulation, or incorrect financial reporting.

37
New cards

Key Controls in Electronic Transaction Systems - Effective systems should ensure:

  • Data transfers are complete and accurate (no loss or mismatch)

  • Transactions are reconciled and not duplicated

  • Missing or altered transactions are detectable

  • Timing of transactions is tracked and verifiable

38
New cards

What is COBIT?

COBIT is a framework developed by ISACA that provides detailed IT control guidelines to support audits, especially for evaluating internal controls in technology environments. IT audits should be closely integrated with financial audits, since financial reporting depends on IT systems, and COBIT helps align IT controls with financial reporting requirements.

39
New cards

COBIT supports Sarbanes-Oxley Act compliance by defining IT controls specifically for financial reporting, ensuring systems produce accurate and reliable data. COBIT allows organizations to compare their IT controls against established standards, helping evaluate performance, identify weaknesses, and improve control effectiveness.

40
New cards

ISACA provides additional standards for IT audits, including control evaluation, audit procedures, performance measurement, IT profiling, and benchmarking practices.

41
New cards

Good network security includes:

  1. Restricted access to systems and data

  2. Monitoring access and activity logs

  3. Strong password controls

  4. Detection of security violations

  5. Oversight of system processes and job activity

42
New cards

What is ISO/IEC 17799 (27002)?

ISO/IEC 27002 (formerly ISO 17799) provides global best practices for information security, helping organizations protect digital assets and meet IT control requirements (including SOX).

43
New cards

ISO guidelines aim to protect information assets, reduce cyber risk, and ensure business continuity, since weak security can lead to financial loss and operational disruption.

44
New cards

The sections of the ISO are:

(1) security policy;

(2) organization of information security;

(3) asset management;

(4) human resources security;

(5) physical and environmental security;

(6) communications and operations management;

(7) access control;

(8) information systems acquisition, development, and maintenance;

(9) information security incident management;

(10) business continuity management; and

(11) compliance.

45
New cards

Strong ISO-based security reduces risk across connected businesses, preventing attackers from exploiting weaker partners or systems in a network (weakest link risk).

46
New cards

A key first step in ISO-based security is identifying all digital and intangible assets (e.g., financial data, customer lists, contracts, algorithms), since assets must be known before they can be protected.

47
New cards

Important Digital Assets include not just accounting data, but also emails, intellectual property, databases, models, and cloud-stored information, all of which have business value and must be secured.

48
New cards

Failure to secure digital assets can lead to financial loss, reduced ROI, business disruption, and loss of competitive advantage.

49
New cards

When evaluating IT systems (e.g., outsourced payroll), key concerns include:

  • Strength of encryption methods

  • Vulnerability to hacking

  • Where encryption/decryption occurs

  • Monitoring systems for breaches or malware

50
New cards

Importance of Audit Logs in Security - Effective systems must track who accessed data, when, and what actions were taken, and detect errors or anomalies that could indicate compromised data.

51
New cards

Can Digital Evidence Really Be Destroyed?

Digital evidence is hard to completely destroy but very easy to contaminate, so proper forensic handling is critical in investigations.

52
New cards

When fraud is suspected, auditors must either understand forensic tools or involve specialists, since improper handling can destroy the usefulness of evidence.

53
New cards

Forensic investigations require imaging tools (e.g., EnCase, FTK) that create read-only copies of entire drives, preserving original data integrity for legal use.

54
New cards

What is a Bitstream Image?

A bitstream image is a complete copy of a hard drive, including active files, deleted data, and unused space, allowing investigators to recover hidden or erased information.

55
New cards

Deleting a file does not erase it—it only marks the space as available, so deleted data can often be recovered unless it is fully overwritten.

56
New cards

Opening, copying, or modifying files improperly can change metadata or overwrite data, making digital evidence unreliable or inadmissible in court.

57
New cards

The longer the delay in collecting evidence, the greater the risk that data will be overwritten, lost, or altered, reducing its usefulness in an investigation.

58
New cards

Investigators must always work on ______ (not original data) and act quickly to preserve evidence integrity.

imaged copies

59
New cards

The technical skills needed for working with digital evidence collection are based on the following six requirements.

  1. Understanding Operating Systems - Auditors must understand different OSs and file structures (e.g., Windows, iOS) to locate relevant data quickly.

  2. Identifying Relevant Data Quickly - Investigators must perform read-only searches and prioritize volatile data (e.g., cache, RAM) that can disappear.

  3. Preserving Data (Timestamps) - Evidence must be preserved by maintaining file dates and timestamps, which help determine when and by whom changes were made.

  4. Securing Data (Hashes) - Hash values are used to verify data integrity and detect whether files have been altered.

  5. Collecting Data Properly - Use bitstream/mirror imaging (read-only copies) to collect evidence without modifying the original data.

  6. Maintaining Chain of Custody - Keep detailed records of who handled the data and how, ensuring evidence is not contaminated and is admissible in court.

60
New cards

CAATs vs Forensic Analysis
Traditional audit tools (CAATs) analyze data at the surface/application level, while forensic analysis examines deeper system-level data (e.g., metadata, kernel, databases) that auditors normally don’t see.

61
New cards

Risk of Using Normal Applications Using regular programs (e.g., Excel) can alter hidden data (slack space, swap files) and destroy evidence, so forensic work must avoid modifying original data.

62
New cards

Hidden & Volatile Data (Key Evidence Sources)
Important evidence exists in:

  • Slack space (remnants of deleted files)

  • Swap files (recoverable temporary data)

  • RAM (volatile, lost if power is off)

63
New cards

_______ (e.g., MD5) are used to verify data integrity and detect changes, even if file names or extensions are altered.

Hash values

64
New cards

In many legal jurisdictions, collection of evidence is automatically assumed to mean electronic documents without requiring that “electronic documents” per se be specifically described in the request for information.

65
New cards

Electronic evidence must be collected in a way that is _______, meaning proper procedures must be followed from the start since all data may end up in court.

legally admissible

66
New cards

Electronic devices can be seized if they are:

  • Contraband (illegal items)

  • Fruits of a crime

  • Instrumentalities of a crime (used to commit it)

67
New cards

Evidence may be inadmissible if:

  • It falls outside the scope of a warrant

  • It involves unrelated crimes (requires a new warrant)

  • It violates legal protections (e.g., privacy, First Amendment)

68
New cards

Law enforcement must follow _______, meaning searches must be specific and reasonable—not overly broad.

Fourth Amendment protections

69
New cards

Evidence may exist on third-party or “zombie” computers (e.g., botnets), meaning investigators may need to collect data from systems not owned by the criminal.

70
New cards

Courtroom Evidence & Testimony

  • Evidence can be physical (logs, files) or direct (testimony)

  • Forensic accountants often testify to explain digital evidence

  • Evidence must be clear and understandable to a jury

71
New cards

Maintaining a proper ______ is critical to prove evidence was not altered or contaminated and is admissible in court.

chain of custody

72
New cards

Key Evidence Collection Practices - To preserve evidence:

  • Document the scene

  • Avoid altering systems (no booting or changes)

  • Use read-only imaging + hashing

  • Secure and track all data handling

73
New cards

When a _____ is issued, organizations must stop normal data deletion/overwriting practices and preserve all relevant electronic data.

legal request

74
New cards

Destroying or altering evidence (intentionally or not) is called spoliation and can lead to fines, sanctions, or losing a case.

75
New cards

Electronic evidence includes:

  • Metadata (file history, timestamps)

  • Active, inactive, archival, and residual data
    → All must be preserved for investigations

76
New cards

SSD vs Traditional Drives

  • Traditional drives → data may be recoverable

  • SSDs → data can be permanently deleted faster due to built-in cleanup processes

77
New cards

Data Mining vs Computer Forensics

  • Data mining analyzes large transaction datasets to find patterns and anomalies

  • Computer forensics examines system-level data and metadata
    → Both require imaged data + hashing to preserve integrity

78
New cards

Purpose of Data Mining in Fraud Detection

Data mining uses statistical methods (e.g., clustering, classification, link analysis) to identify unusual patterns that may indicate fraud in large datasets.

79
New cards

Data Mining Preparation Steps (Critical)
Before analysis:

  • Use imaged data (not originals)

  • Verify with hash codes

  • Clean the data (remove errors)
    → Required for reliable and admissible results

80
New cards

Key Data Mining Techniques (Combined)

  • Link analysis → finds relationships between data (e.g., items purchased together)

  • Case-based reasoning → compares current data to past fraud cases

  • Sequence analysis → detects suspicious timing patterns

  • Cluster analysis → groups similar data and flags outliers
    → All aim to identify anomalies for further investigation

81
New cards

Link Analysis

The underlying assumption in link analysis is that there are some fundamental correlations or associations between the items in a database. With link analysis, an algorithm of that relationship is developed and used to identify cases that do not fit what would be expected.

82
New cards

Case Based Reasoning

reasoning uses the closest approximations from the past to adapt a correct past solution to a current situation. Case-based reasoning can be considered memory-based problem solving, which is based on predicting future events as a result of studying previous events.In fraud detection, uncovering similar characteristics in current accounts that are indicative of past fraudulent accounts may be useful.

83
New cards

Sequence Analysis

concerned with evaluating patterns in time series data to uncover fraudulent activity. It is assumed that an ordered set of events (s=a1, a2,…an) will be encountered together. A time delay separates the transaction order.

84
New cards

Cluster Analysis

used to divide data into nonoverlapping groups containing similar characteristics. Each group should have a strong level of “sameness” that separates it from the other data groups. The data in a cluster should be closer to the mean in that cluster than the mean in any of the other clusters formed from the data under analysis. The underlying data forming a cluster can be based on a single characteristic or on multiple characteristics measured in different ways, just as long as they are similar within clusters.

85
New cards

Zipf’s Law & Pattern Detection

frequency is inversely related to rank (most common = X, second = X/2, third = X/3, etc.). In fraud detection, expected frequency patterns are compared to actual data (e.g., invoice attributes), and deviations are identified using regression and z-scores to flag anomalies for further investigation.

86
New cards

Tools like IDEA, ACL, TeamMate Analytics help automate fraud detection by identifying:

  • Duplicate or missing data

  • Unusual transactions (e.g., just below approval limits)

  • Suspicious patterns in payments, vendors, or employees

87
New cards

______ record who did what and when in a system, allowing investigators to trace transactions and identify suspicious activity.

Audit trails

88
New cards

Logs can reveal:

  • Unauthorized access or changes

  • Suspicious transaction timing

  • Repeated edits or anomalies by specific users

89
New cards

Logs can be compromised if:

  • Users have admin/root access

  • Logs are deleted or altered

  • System design allows changes without proper tracking

90
New cards
91
New cards
92
New cards
93
New cards
94
New cards
95
New cards
96
New cards