The main objective of this research is to design a model that extends digital forensics to the
Question:
The main objective of this research is to design a model that extends digital forensics to the information systems audit process in order to ensure confidentiality, integrity, and availability (CIA) of information and ensure compliance with IT activities relevant to Company policies, industry best practices, and government laws and regulations, as well as to validate evidence collected by Information Systems Auditors.
The following are the sub-objectives:
1. Analyze the current designs in the information system audit process to ensure the CIA of Information System and validity of evidence collected.
2. To evaluate the IS Audit process phases and determine which IS Audit process phases will require the integration of digital forensics into Information System Audit.
3. Design a model that integrates digital forensics into IS Audit to ensure the confidentiality, integrity, and availability of information systems, as well as the validity of the evidence collected.
4. Evaluate the proposed digital forensics-infused Information Systems Audit process model.
RESEARCH QUESTIONS
The below questions will be answered:
1. What are the current designs in the information system audit process to ensure CIA of Information System, and validity of evidence collected?
2. What are the phases of the IS Audit process, and which of these phases would require the integration of digital forensic techniques to improve the effectiveness of the Information System Audit?
3. What are the model components and how they can work together to ensure the confidentiality, integrity, and availability of information systems, as well as the validity of the evidence collected?
4. Does the proposed model ensure the CIA of information and the validity of the evidence collected?
Auditing and Assurance Services A Systematic Approach
ISBN: 978-1259162343
9th edition
Authors: William Messier, Steven Glover, Douglas Prawitt