Title :
Live forensics analysis: Violations of business security policy
Author :
Tanwar, Govind Singh ; Poonia, Ajeet Singh
Author_Institution :
Dept. of Comput. Sci. & Eng., Gov. Eng. Coll., Bikaner, India
Abstract :
Many more corporate entities today are utilizing ICTs to identify opportunities for innovative and customer-centric, value-added products and services. Indeed, information systems have been key characteristic of any growing and successful businesses, as they utilize ICTs for business value creation. The key motivation for the huge investment in IT infrastructures is to ensure an upsurge in revenue and retention of sizeable market share. Computer Usage policy is a document that provides guidelines that regulates the acceptable usage of these systems by end- users. The provision of these guidelines also serve as benchmark metrics in assessing the abuse or misuse of corporate information systems. These misuse and/or abuse are referred to as violations of computer usage in this study. 10 users, selected randomly from within each unit of a multi-lateral company, were observed for violations. Live computer forensics techniques utilizing EnCase, Microsoft reporting tools, WinHex, etc., were employed to investigate these violations. Notwithstanding the strict corporate policies, the study revealed that end-users virtually violated all computer usage policies. This paper further analyses and addresses the causes, effects and offers measures to mitigate computer usage violations.
Keywords :
business data processing; digital forensics; value engineering; EnCase; ICT; IT infrastructures; Microsoft reporting tools; WinHex; business value creation; computer usage policies; computer usage policy; computer usage violations; corporate entities; corporate information systems; information systems; innovative customer-centric value-added products; live computer forensic analysis; multilateral company; sizeable market share; Computers; Electronic mail; Forensics; Internet; Organizations; Security; Computer Usage Policy; Corporate Policy Violations; Data Sharing; Live Computer Forensics; Live Digital Forensics; Use;
Conference_Titel :
Contemporary Computing and Informatics (IC3I), 2014 International Conference on
Conference_Location :
Mysore
DOI :
10.1109/IC3I.2014.7019695