FRAUD CONSIDERATIONS

Dimension 2

Consider the risks associated with IT and data related to fraud, forensics, litigation, and associated regulations. For financial audits, the focus would be material misstatement due to fraud. It also includes tools and techniques to react to, or procedures for, fraud suspicions, forensic investigations, and other similar activities. This part of the CITP BOK addresses knowledge requirements to issues such as computer forensics, digital evidence, data mining and analysis, security breaches, and relevant regulations (e.g., e-Discovery).

LEARNING OBJECTIVES

  1. To understand the basics of fraud and forensics; e.g., fraud triangle, fraud tree (schemes and categories of schemes), scope of fraud (i.e., professional skepticism), and profile of fraudsters.

  2. To have a good understanding of regulations and technical literature; especially SAS No. 99 (AU316) and how to apply it.

  3. Generally, to be able to consider the risks of material misstatement due to fraud and determine specific techniques to detect fraud.

  4. To understand how to use IT in fraud investigations.

  5. To understand how to choose and employ the most appropriate digital acquisition tools and procedures in a fraud investigation.

  6. To identify applicable sources of digital evidence in a fraud investigation.

  7. To understand the basics of legal rules and procedures regarding digital evidence.

  8. To understand the importance of state and federal laws regarding digital evidence.

2.0 – INTRODUCTION

Fraud has been ...

Get Complete Guide to the CITP Body of Knowledge now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.