blog




  • Essay / Cloud Forensics - 750

    The green color indicates the types of provisions available on each service type and highlights the provisions that are not available for each type. We notice that on a local machine, all services are available and can be activated easily compared to those in the cloud. Description of table entries for in-depth assessment. (Networking In a local environment, access to network machines is readily available, two examples of which are switches and routers. Access to all traffic passing through the network and analysis can be done in the framework of collecting as much data as possible When using the cloud, even the CSP (cloud service provider) does not have this type of data, because it does not have to record all the traffic. passing through the network, because user data is confidential and the CSP cannot record, store and analyze it. The CSP can only apply the IDS (Intrusion Detection System) or a PDS (Intrusion Prevention System) solution. to the network, which only scans traffic for malicious behavior and alerts the provider of such activity Storage Since there is no such thing as perfect computer crime, storage is the main reason why digital forensics came into being. in the first place. because data or traces would be left after any attack or intrusion. Once hardware access to the machine is determined, it is known exactly where the data is located. However, when using a cloud service, data can be anywhere, even in different states, countries or even continents. Even if the attacker is practically next door, the location of the data is still far away, which means that the data cannot be recovered as easily. This presents forensic analysts with another dead end in a series. Since storage is at the heart of computer forensics...... middle of paper ...... Discovery and Cloud Computing: Controlling ESI in the Cloud, 2010Dan Morrill, Cloud Computing Making Forensics Easier, 2008Dejan L , Cloud forensics:An summary, 2014Dykstra J., Damien R, Forensic collection of electronic proof from Infrastructure as a Service Cloud Computing, 2012ELSEVIER, Digital Investigation 10, 2013Gardner Inc, Cyber ​​​​Forensics in the Cloud, 2010Gartner Inc., Cloud Computing Will Be As Influential As E-business, June 26, 2008INFOSEC Institute, summary-cloud-forensics, 2012International journal of Cyber ​​Security and Digital Forensics (IJCSDF) 2(2) 77-94, 2013John JB, Cloud Computing: another Digital Forensic Challenge, 2009Robinson RM, et al, Cyber ​​Security and Information Systems October 2013Taylor M, et al, forensic investigation of cloud computing systems, 2011Zawoad S, “Digital Forensics in the Cloud”, Securing the Cloud, 2013