TY - GEN
T1 - Methodology and tools of is audit and computer forensics - The common denominator
AU - Szezyńska, Magdalena
AU - Huebner, Ewa
AU - Bem, Derek
AU - Ruan, Chun
PY - 2009
Y1 - 2009
N2 - Information system audit and computer forensics each developed its own set of standards based on a separate discipline of knowledge. In this paper we analyse the tools and methodology used by IS auditors and computer forensic experts in the contemporary world, with the focus on emerging similarities between their needs and goals. We demonstrate the benefits which could be derived from the increased convergence of tools and methodology used in both areas, and we discuss possible modifications to existing tools and methodology to fulfill this goal.
AB - Information system audit and computer forensics each developed its own set of standards based on a separate discipline of knowledge. In this paper we analyse the tools and methodology used by IS auditors and computer forensic experts in the contemporary world, with the focus on emerging similarities between their needs and goals. We demonstrate the benefits which could be derived from the increased convergence of tools and methodology used in both areas, and we discuss possible modifications to existing tools and methodology to fulfill this goal.
KW - Computer forensics tools
KW - IS audit guidelines
KW - IS audit tools
UR - http://www.scopus.com/inward/record.url?scp=70350655779&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-02617-1_12
DO - 10.1007/978-3-642-02617-1_12
M3 - Conference Paper
AN - SCOPUS:70350655779
SN - 3642026168
SN - 9783642026164
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 110
EP - 121
BT - Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings
T2 - 3rd International Conference on Information Security and Assurance, ISA 2009
Y2 - 25 June 2009 through 27 June 2009
ER -