Which of the following should be of GREATEST concern for the IS auditor reviewing this process?

Last Updated on December 18, 2021 by Admin 3

An organization that has suffered a cyber attack is performing a forensic analysis of the affected users’ computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?

  • The chain of custody has not been documented.
  • The legal department has not been engaged.
  • An imagining process was used to obtain a copy of the data from each computer.
  • Audit was only involved during extraction of the information.
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments