An organization that has suffered a cyberattack is performing a forensic analysis of the affected users' computers. Which of the following should be of GREATEST concern for the IS auditor reviewing this process?
- The chain of custody has not been documented.
- An imaging process was used to obtain a copy of the data from each computer.
- Audit was only involved during extraction of the information.
- The legal department has not been engaged.
Reveal Solution Next Question