Archive - Central European Conference on Information and Intelligent Systems, CECIIS - 2008

Font Size: 
Computer Forensics in Business Environment
Boris Berecek, Neven Bratranek, Robert Kopal

Last modified: 2008-09-23

Abstract


Over recent years, computers have penetrated almost all areas of business and personal life. IT resources of organizations are available around the clock, enabling electronic business activities with clients, other organizations or state administration during which important data are exchanged. Employees are offered the opportunity to work from home and to access information resources of organizations from various, sometimes less protected environments. A bad consequence of such development in technology and society is the increasing number of mobile devices, portable and desktop computers and servers from which information may leak, or which may even be used for criminal activities - whether done by malicious employees or by other malicious individuals. This is why it's important that all those who manage or administer information systems and networks are familiar with protocols foreseen for cases of security incidents and the principles of computer forensics. This article explains the requirements for implementation of computer forensics in business environment in an efficient and legal way, providing also a review of the basic technical issues and pointing at references for further reading. The purpose of this article is to demonstrate the idea that business implementation of computer forensics in case of security incidents is important for today's business environments and networked organizations, just as it is important to be aware of the legal background of its implementation.

Full Text: PDF