This document provides a comprehensive overview of cyber forensics, including the roles of forensic investigators, the process of collecting and analyzing digital evidence, and the importance of an information security management system (ISMS). It outlines essential procedures in forensic investigation, such as evidence acquisition and documentation, as well as challenges specific to network-based digital evidence. Furthermore, it discusses auditing in forensic contexts, emphasizing the need for proactive strategies to combat financial fraud and the role of ISO 27001:2013 in establishing effective information security practices.