Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data.

Similar presentations


Presentation on theme: "Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data."— Presentation transcript:

1 Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data

2 White Collar Crimes Fraud—the art of deliberate deception for unlawful gain—is as old as history; the term "white-collar crime" was reportedly coined in 1939 by Professor Edwin Sutherland. Violations of the criminal law committed by a person of respectability and high social status in the course of his or her occupation. White Collar Crimes range from Financial Statement Fraud to Anti Money Laundering, Corruption and Computer Fraud. In US white collar crimes cost approx. 6% of the corporate revenue which is equal to $650 Billion annually.

3 Difference between Internal Auditor and Fraud Investigator Auditors work with a general focus on implementation. Auditors approach the audit with professional skeptism. However, a suspicion of fraud may not be present at that the time of audit. In various situations auditors may discover fraud. Fraud Investigators find themselves in a situation where a fraud is being commited by someone who has successfully beaten the system. Fraud Investigators are hired when a suspicion of fraud is present. Fraud Investigators concentrates on finding solid evidence of fraud

4 Challenges Faced by Fraud Investigators With more reliance on digital media, evidence is now available in digital format. Investigations now involve terabytes of data. Most Hard Drives now contains in excess of 1 million. Digital evidence can be found in various sources like USB Drives, PDAs, Smart Phones etc... Digital evidences can be encrypted and you need specialized tools to decrypt them. Digital evidence can be hidden in other files which are encrypted. In Turkey most of the large enterprises do not have investigation department instead they rely on internal audit department to conduct investigation. In Turkey most of the large enterprises do not have digital media usage policy. Fatih the Fraud Investigator

5 What is Computer Forensics Computer Forensics is… The examination of hardware or software in the pursuit of evidence to disprove or prove an allegation.

6 4 Area of Forensics 1. Evidence Collection 2. Evidence Preservation 3. Analysis 4. Reporting

7 KRYS Advantage KRYS is among the few, if not the only, company in Turkey to offer tools, trainings and investigative solutions in: 1.Hard Disk and Windows Forensics 2.HandHeld Forensics 3.Wireless Forensics 4.Stegnography We provide these solutions in associations with Access Data, Paraben Corporation, AirCapture and Backbone Security.

8 AccessData Advantage AccessData, a pioneer in the digital forensic industry, provides investigators with intuitive tools that seamlessly integrate for the reading, acquisition, decryption, analysis and reporting of digital evidence. AccessData has been the choice of leading law enforcement agencies and those in the corporate industry since its inception in 1987.

9 Clients of AccessData Federal Investigation Bureau (FBI) US Secret Service Security Exchange Commission (SEC) Drugs Enforcement Agency (DEA) Major Banks of USA Microsoft Corporation Law Enforcement Agencies in Europe, Asia, South America and Middle East Federal Police in Turkey Turkish Airforce etc.


Download ppt "Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data."

Similar presentations


Ads by Google