ETI Micro Project Sample
ETI Micro Project Sample
ETI Micro Project Sample
Report on
Guided by: -
Prof. V. B. Kale
SUBMITTED BY:
1
Maharashtra State
Board of Technical Education
Certificate
2
Index
1 Rational 04
4 Introduction 05
12 Reference 11
3
Rationale
4
Introduction
5
Digital Forensic Investigation In Fraud Auditing Process
6
Fraud Auditing Principles:
1. Being at the same time an art and a science, fraud auditing is
different from financial auditing.
2. Fraud auditors place emphasis on the exceptions, irregularities,
and oddities of accounting conduct patterns.
3. Essentially, any fraud is an intentional change of financial or
material facts in order to gain some benefits.
4. Despite some fraud theories, fraud auditing is learned primarily
from experience.
5. There are many reasons for committing fraud such as
economic, emotional, egocentric, psychotics etc.
6. Places where fraud could be committed in digital environment
are at input, transition or output of transaction.
7. Some financial gains are the most usual among internal frauds
made by employees.
8. The lack of or poor control is most often the cause of
accounting frauds.
9. Accounting frauds are more often discovered by reactive than
proactive actions.
10. Proactive fraud measures mainly depend on adequate internal
controls, personal honesty and fair business.
7
Fraud Case - Forensic Analysis
In this fraud case, the senior accountant from the inventory team, getting suspicious
about the unusual excess of the subject item, made the first step in the investigation
process. He collected the data from video monitoring system and acquired the suspected
computer as electronic evidence. However, he couldn’t prove his suspicions due to the
lack of digital forensic knowledge. Thereafter, he hired a DFA who took forensic image
of the suspected computer’s hard disk. In order to verify the digital evidence, two
forensic analysts from the Association (AFTWIT) performed an independent analysis
using two different forensic tools (Figure 1).
Forensic analysts produce a forensic report (King, 2009), including their opinions and
recommendations. In this fraud case, somebody under the user name “Kosa” used the
computer with accounting application and financial data of the company between June
24, 2013 at 08:19:45AM and June 24, 2013 at 08:37:13AM. The MS Access data base
“GSD2013.mdb” was changed and accounting application “ rvi2005.exe” was used.
It was proved that there were two versions of the inventory report from the ledger list
– one from Friday and the other one from Sunday. In the re- port from Sunday, there
were 60 pieces of the item No. 1034, which is more than in the previous one It was
necessary to identify who visited the office on Sunday 24, June 2013, and whether
he/she knew the credentials for the access to the computer and accounting application,
and to investigate his/ her motives for such manipulation.
8
Actual Resources Required
The resources used during the completion of project are mentioned in
the below
9
Conclusion
10
Reference
Joon, Veenu; Shahrawat, Renu; Kapahi, Meena (September 2017). "The Emerging
Environmental and Public Health Problem of Electronic Waste in India"
E-waste (Management and Handling) Rules, 2011http://www.ecoraksha.com/index.php?
Pandit, Virendra (3 June 2016). "India likely to generate 5.2 million tonnes of e-waste by 2020:
Study - Business Line". The Hindu Business Line. Archived from the original on 12 July 2018.
Assessment
Thank you…..!
11