Next Generation Society. Technological and Legal Issues. Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers

Research Article

Information Assurance and Forensic Readiness

Download
516 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-11631-5_17,
        author={Georgios Pangalos and Vasilios Katos},
        title={Information Assurance and Forensic Readiness},
        proceedings={Next Generation Society. Technological and Legal Issues. Third International Conference, e-Democracy 2009, Athens, Greece, September 23-25, 2009, Revised Selected Papers},
        proceedings_a={E-DEMOCRACY},
        year={2012},
        month={5},
        keywords={Computer forensics e-discovery IS audit compliance},
        doi={10.1007/978-3-642-11631-5_17}
    }
    
  • Georgios Pangalos
    Vasilios Katos
    Year: 2012
    Information Assurance and Forensic Readiness
    E-DEMOCRACY
    Springer
    DOI: 10.1007/978-3-642-11631-5_17
Georgios Pangalos1,*, Vasilios Katos2,*
  • 1: Aristotle University of Thessaloniki
  • 2: Democritus University of Thrace
*Contact email: pangalos@auth.gr, vkatos@ee.duth.gr

Abstract

Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.