Digital Auditing: A Technique to Ensure Security

Authors

  • Nidhi Dandotiya  CSA Department, ITM University, Gwalior, Madhya Pradesh, India
  • Dr. Pallavi Khatri  CSA Department, ITM University, Gwalior, Madhya Pradesh, India
  • Abhinandan Singh Dandotiya  CS&A Department, Shri Krishna University, Chhatarpur, Madhya Pradesh, India

DOI:

https://doi.org/10.32628/CSEIT206391

Keywords:

Forensic Investigation, RAM, Security, Window auditing, website auditing

Abstract

Security is one of the ever-rising provinces in about every field of society and computers are no freak. The system on the network can be attacked if it is easy to break its security or it is vulnerable. Security issues that exist in connection to a machine on network are system security and application security. For ensuring security of personal computer regular security audits of the system needs to be done. One main objective of auditing is to ensure that systems are safe or not. Digital auditing can be manual or automated. Systems audit leads to check that the vulnerability of system to different attacks that can be done on it. Similarly, a website running on the system can also be exploited for any vulnerability in it. This work investigates the methods of system and application auditing to identify the weakness at system and application level.

References

  1. M. Al Fahdi, N.L. Clarke , S.M. Furnell,” Challenges to Digital Forensics: A Survey of Researchers & Practitioners Attitudes and Opinions”, International Conference Information Security for South Africa 2013
  2. Abhijeet Ramani, Somesh Kumar Dewangan ,”Digital Forensic Identification, Collection, Examination and Decoding of Windows Registry Keys for Discovering User Activities Patterns”, International Journal of Computer Trends and Technology (IJCTT) Nov 2014, vol. 17 no. 2
  3. Abhijeet Ramani, Somesh Kumar Dewangan,“Auditing Windows 7 Registry Keys to track the traces left out in copying files from system to external USB Device”, International Journal of Computer Science and Information Technologies(IJCSIT), 2014 vol. 5 no. 2, pp.1045-1052
  4. Teresa Pereira , Henrique Santos,” A Security Audit Framework to Manage Information System Security”, International Conference on Global Security, Safety, and Sustainability ICGS3 2010
  5. Jungwoo Ryoo , Syed Rizvi, William Aiken , John Kissell ”Cloud Security Auditing: Challenges and Emerging Approaches” Digital Object Indentifier 2013 10.1109/MSP.2013.132 1540-7993 IEEE
  6. Marco Vieira, Nuno Antunes, Henrique Madeira,” Using Web Security Scanners to Detect Vulnerabilities in Web Services”, IEEE/IFIP International Conference on Dependable Systems & Networks 2009
  7. Meiko Jensen · Nils Gruschka · Ralph Herkenhoner,” A survey of attacks on web services Classification and countermeasures.”, Springer-Verlag 2009
  8. Nilay R. Mistry , M. S. Dahiya” Signature based volatile memory forensics: a detection based approach for analyzing sophisticated cyber attacks”,An Official Journal of Bharati Vidyapeeth's Institute of Computer Applications and Management 2018
  9. online]Available: thttps://www.beyondtrustcom/resources/glossary/windows- auditing
  10. Online]Available: https://www.petri.com/windows_ auditing

Downloads

Published

2020-06-30

Issue

Section

Research Articles

How to Cite

[1]
Nidhi Dandotiya, Dr. Pallavi Khatri, Abhinandan Singh Dandotiya, " Digital Auditing: A Technique to Ensure Security" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 3, pp.371-379, May-June-2020. Available at doi : https://doi.org/10.32628/CSEIT206391