L_6.2.1-Explain the concepts of information system auditing in an organization
L_6.2.1-Explain the concepts of information system auditing in an organization
E-mail [email protected]
Institute IFM
Dept: Computer Science and Mathematics
Lecture L_6.2.1: Explain the concepts of information system auditing in an
Number: organization
ii. Cloud storage: Digital evidence can also be found in cloud storage services, such
as Dropbox, Google Drive, and Microsoft OneDrive. This can include data that
has been uploaded to the cloud, as well as data that has been shared with others.
iii. Social media and online platforms: Social media platforms, such as Facebook,
Twitter, and Instagram, can be a rich source of digital evidence. This can include
posts, comments, messages, and other types of data that have been shared online.
iv. Network logs and traffic: Network logs and traffic can provide valuable
information about the activities of users and devices on a network. This can
include information about websites visited, files transferred, and other types of
network activity.
v. Backup and archival data: Digital evidence can also be found in backup and
archival data, such as data that has been stored on tape or in the cloud for long-
term retention. This can include information that has been deleted from the
original device or system.
It is important to note that digital evidence can be found in various forms, like text, image,
audio, and video files. It is also important to understand that digital evidence can be stored in
different places and types of devices, and can be stored in different forms like text, image,
audio, and video files.
ii. Data integrity and authenticity: Digital evidence can be easily tampered with or
altered, making it important to ensure that the integrity of the data is preserved.
Forensic experts must use specialized tools and techniques to create a forensic
image of the original data, which can be used for analysis without altering the
original data.
iii. Data encryption: Data encryption can make it difficult or impossible to access
and analyze data. Forensic experts must use specialized tools and techniques to
decrypt the data, which can be time-consuming and may not always be successful.
iv. Cloud storage and virtual environments: Cloud storage and virtual
environments can make it difficult to identify and extract relevant data. This can
include data that is stored in the cloud or data that is stored in virtual machines or
containers.
v. Legal and ethical considerations: Forensic experts must be aware of the legal
and ethical considerations when collecting and analyzing digital evidence. This
includes understanding the laws and regulations that govern the collection and use
of digital evidence, as well as ensuring that the rights of individuals are protected
during the investigation.
vi. Technical expertise: Forensic experts must have a high level of technical
expertise in order to effectively collect and analyze digital evidence. This includes
understanding the various types of devices and platforms that are used to store and
transmit data, as well as understanding the different types of data that can be
found on those devices and platforms.
ii. Complexity of data: Data can be stored in various forms and formats and on a
wide range of devices, making it difficult to extract, preserve, and analyze the
data. This complexity can also make it hard to identify and extract relevant
evidence.
iii. Data integrity: Digital evidence can be easily tampered with or altered, making it
important to ensure that the integrity of the data is preserved. However, this can be
a challenge, as it can be difficult to ensure that the original data has not been
tampered with.
iv. Data encryption: Data encryption can make it difficult or impossible to access
and analyze data, which can greatly limit the effectiveness of forensic analysis.
vi. Legal and ethical considerations: Forensic experts must be aware of the legal
and ethical considerations when collecting and analyzing digital evidence. This
includes understanding the laws and regulations that govern the collection and use
of digital evidence, as well as ensuring that the rights of individuals are protected
during the investigation.
vii. Technical expertise: Forensic experts must have a high level of technical
expertise in order to effectively collect and analyze digital evidence. This includes
understanding the various types of devices and platforms that are used to store and
transmit data, as well as understanding the different types of data that can be
found on those devices and platforms.
viii. Time constraints: Forensic analysis can be time-consuming, and in some cases, it
can be difficult to complete the analysis within a reasonable timeframe.