Methodology and tools of is audit and computer forensics - The common denominator

Magdalena Szezyńska, Ewa Huebner, Derek Bem, Chun Ruan

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

1 Citation (Scopus)

Abstract

Information system audit and computer forensics each developed its own set of standards based on a separate discipline of knowledge. In this paper we analyse the tools and methodology used by IS auditors and computer forensic experts in the contemporary world, with the focus on emerging similarities between their needs and goals. We demonstrate the benefits which could be derived from the increased convergence of tools and methodology used in both areas, and we discuss possible modifications to existing tools and methodology to fulfill this goal.

Original languageEnglish
Title of host publicationAdvances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings
Pages110-121
Number of pages12
DOIs
Publication statusPublished - 2009
Event3rd International Conference on Information Security and Assurance, ISA 2009 - Seoul, Korea, Republic of
Duration: 25 Jun 200927 Jun 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5576 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Information Security and Assurance, ISA 2009
Country/TerritoryKorea, Republic of
CitySeoul
Period25/06/0927/06/09

Keywords

  • Computer forensics tools
  • IS audit guidelines
  • IS audit tools

Fingerprint

Dive into the research topics of 'Methodology and tools of is audit and computer forensics - The common denominator'. Together they form a unique fingerprint.

Cite this