ERE Information Security Auditors
Home | Site Map | Contact Us |  Resource Center
This text is replaced by the Flash movie.
list of IT security and compliance audit steps
ERE Differentiators from other vendors

Forensic Audit

The goals of the ERE forensic audit are to:

  • collect digital evidence from documents, computer files, server files, and network devices.
  • preserve evidence.
  • document a recommended process to preserve the chain of evidence.

Evidence of undesirable activity on the enterprise network can be used in order hold accountable individuals who cause harm, financial loss, and liability, due to their misuse of corporate information and corporate network technology.

Undesired Activity

  • Theft.
  • Fraud.
  • Collection of inappropriate or banned information.
  • Disclosure of confidential information or violation of privacy compliance.
  • Dissemination of inappropriate or banned information.

Commonly Identified Perpetrators

  • Previous employees.
  • Employees in the process of terminating employment.
  • Disgruntled employees.
  • Perpetrators of espionage, theft for profit.
  • Collectors or senders of illegal information, such as child pornography.

Recovery of Hidden Data

  • Recovery of data thought to be deleted.
  • Revelation of data hidden or included in temporary or swap files.
  • Gaining access to encrypted or password-protected data.
  • Recover email.
  • Re-image.
  • Re-create fat files file allocation table.
See more

 

 

Contact Us

905 764 3246

 
 
  Budgetary Price Quote
  10 minute scope definition call
  ROI Calculation for your next Audit 
  Sanitized Statement of Work
  Sanitized Audit Report
  Product Literature  
  White Papers and Published Articles
   
  Please see Ron Lepofsky’s book,
The Manager’s Guide to Web Application Security,
published by Apress Media

http://www.apress.com/9781484201497

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.

 
Home | Technology Audits | Compliance Audits | Process Audits | Doc Audit/Authorship| | 7x24 Monitoring | Knowledge Transfer
ERE Differentiators | About Us | Site map | Contact Us | |   | Resource Center
Copyrights © 2007-2008. All rights reserved.  

   AddThis Social Bookmark Button