Information assurance and forensic readiness

This source preferred by Vasilis Katos

This data was imported from Scopus:

Authors: Pangalos, G. and Katos, V.

Journal: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

Volume: 26 LNICST

Pages: 181-188

ISSN: 1867-8211

DOI: 10.1007/978-3-642-11631-5_17

Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face. © 2010 Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.

The data on this page was last updated at 04:43 on March 22, 2018.