TY - GEN
T1 - Methodologies for detecting covert database
AU - Lee, Keun Gi
AU - Savoldi, Antonio
AU - Gubian, Paolo
AU - Lim, Kyung Soo
AU - Lee, Seokhee
AU - Lee, Sangjin
PY - 2008
Y1 - 2008
N2 - Forensic Accounting has recently gained great attention in the accounting and computer forensic fields since government regulations such as Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), Sarbanes-Oxley Act [1] (SOX) were introduced in the United States. Although these regulations force corporations to provide financial transparency, they still commit accounting frauds such as slush fund or tax evasion. Moreover, companies have substituted paper-work with IT systems such as DBMS (Database Management System), EDMS (Electronic Document Management System), and ERP (Enterprise Resource Planning) system. Since the majority of corporations use DBMS we should focus our attention on discovering financial information in a database server. However, frauds are difficult to observe and detect because the perpetrators did their best to conceal their fraudulent activities. In particular, we need to consider the case of a covert database server. This paper proposes a methodology for detecting covert database server, which would be helpful for forensic investigators. Therefore, we describe an example of covert database server and suggest several detection techniques. Finally, we provide our methodology according to classification of investigation cooperation.
AB - Forensic Accounting has recently gained great attention in the accounting and computer forensic fields since government regulations such as Health Insurance Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), Sarbanes-Oxley Act [1] (SOX) were introduced in the United States. Although these regulations force corporations to provide financial transparency, they still commit accounting frauds such as slush fund or tax evasion. Moreover, companies have substituted paper-work with IT systems such as DBMS (Database Management System), EDMS (Electronic Document Management System), and ERP (Enterprise Resource Planning) system. Since the majority of corporations use DBMS we should focus our attention on discovering financial information in a database server. However, frauds are difficult to observe and detect because the perpetrators did their best to conceal their fraudulent activities. In particular, we need to consider the case of a covert database server. This paper proposes a methodology for detecting covert database server, which would be helpful for forensic investigators. Therefore, we describe an example of covert database server and suggest several detection techniques. Finally, we provide our methodology according to classification of investigation cooperation.
UR - http://www.scopus.com/inward/record.url?scp=54049156520&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=54049156520&partnerID=8YFLogxK
U2 - 10.1109/IIH-MSP.2008.258
DO - 10.1109/IIH-MSP.2008.258
M3 - Conference contribution
AN - SCOPUS:54049156520
SN - 9780769532783
T3 - Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008
SP - 538
EP - 541
BT - Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008
T2 - 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008
Y2 - 15 August 2008 through 17 August 2008
ER -