Content deleted Content added
No edit summary |
move image out of navbox per WP:NAVBOX |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 1:
[[File:Hard disk.jpg|thumb|A computer [[hard drive]]]]
{{ForensicScience|digital
'''Forensic
''[[Unstructured data]]'' in contrast is taken from communication and office applications or from mobile devices. This data has no overarching structure and analysis thereof means applying keywords or mapping communication patterns. Analysis of unstructured data is usually referred to as [[
==Methodology==
Line 10 ⟶ 11:
Due to the nature of the data, the analysis focuses more often on the content of data than on the database it is contained in. If the database itself is of interest then [[Database forensics]] are applied.
In order to analyze large structured data sets with the intention of detecting financial crime it takes at least three types of expertise in the team:
# A data analyst to perform the technical steps and write the queries, # A team member with extensive experience of the processes and internal controls in the relevant area of the investigated company and # A forensic scientist who is familiar with patterns of fraudulent behaviour. After an initial analysis phase using methods of [[explorative data analysis]] the following phase is usually highly iterative. Starting with a hypothesis on how the perpetrator might have created a personal advantage the data is analyzed for supporting evidence. Following that the hypothesis is refined or discarded.
Line 24 ⟶ 28:
==External links==
*[https://cncintel.com/ Cyber Intelligence]
*[https://anuraagsingh.com/tech-talks/cyber-expert-in-india/ Digital Forensics Trainer]
[[Category:Digital forensics]]
[[Category:Financial crime prevention]]▼
[[Category:Tax investigation]]
▲[[Category:Financial crime prevention]]
|