The green shading denotes the kinds of provisions available on each type of service and stresses what provisions are unavailable for each type. One notices that on a local machine, all services are available and can be sprang into action with ease compared to the cloud’s ones.
Description of table entries for a thorough appreciation.(
Networking
In a local environment, access to the network machines is readily available, two examples of which are switches and routers. Access to all of the traffic passing through the network and analysis can be laboured as a part of gathering as much data as possible. When using the cloud, even the CSP (Cloud Services Provider) does not have that kind of data, because it must not log all the traffic passing through the network, since users’ data is confidential and CSP can’t record, store, and analyse it. The CSP might only apply the IDS (Intrusion Detection System) or PDS (Intrusion Prevention System) solution to the network, which is only analysing traffic for malicious behaviour and alerting the provider of such activity.
Storage
Since there is no ultimate perfect computer crime, storage is the major reason why digital forensics hatched in the first place as data or trail would be left behind after any attack or intrusion. When hardware access to the machine is determined, one knows exactly where the data is located however, when using a cloud service, the data could be anywhere, even in different states, countries, or even continents. Even if the attacker is practically next door, the data’s residence is still nowhere near which mean that data cannot be retrieved or that easily. This presents forensic analysts with another in a series of dead ends.
Since Storage is the core of computer forensic...
... middle of paper ...
...Discovery and Cloud Computing: Control of ESI in the Cloud, 2010
Dan Morrill, Cloud Computing Making Forensics Easier , 2008
Dejan L, Cloud forensics:An overview, 2014
Dykstra J., Damien R, Forensic collection of electronic evidence from Infrastructure as a Service Cloud Computing, 2012
ELSEVIER, Digital Investigation 10, 2013
Gardner Inc, Cyber Forensics in the Cloud, 2010
Gartner Inc., Cloud Computing Will Be As Influential As E-business, June 26, 2008
INFOSEC Institute, overview-cloud-forensics, 2012
International journal of Cyber Security and Digital Forensics (IJCSDF) 2(2) 77-94, 2013
John JB, Cloud Computing: another Digital Forensic Challenge, 2009
Robinson RM, et al, Cyber Security and Information Systems October 2013
Taylor M, et al, forensic investigation of cloud computing systems, 2011
Zawoad S, “Digital Forensics in the Cloud”, Securing the Cloud, 2013
The idea of accessing, storing, and processing data from online server or virtual server instead of local server is called as Cloud computing. When we store data in our hard disk which is very near to computer that is called as local storage and computing but Cloud computing doesn’t access data from our hard disk.
Forensics investigations that require the analyzation and processing of digital evidence can be influenced both positively and negatively by a number of outside sources. In this paper, we will explore how physical security plays a role in forensics investigations activities. We will start by examining how physical and environmental security might impact the forensics investigation process. Next, we will discuss the role that physical and logical security zones play in supporting effective forensics activities. We will illustrate how centralized and decentralized physical and environmental security affects the forensics professional’s approach toward the investigation. Lastly, we will evaluate some potential areas of risk related to the physical security of our case study organization, Widget Factory, identified in Attachment 1.
Maras, M. (2012). Computer Forensics: Cybercriminals, Laws, and Evidence. Sudbury. Jones and Bartlett Learning LLC.
A structured standardized approach to any evidence collection is going to be the best course of action. Any well-training computer forensic technicians should not jump into a search without some kind approved policy procedure which will include a checklist or standard operating procedure that will methodically guide them throughout the examination procedure. The cyber forensics should not be taken lightly and it starts with its collection methods.
“Advance in Forensics Provide Creative Tools for Solving Crimes.” www.ctcase.org. Np. n.d. Web. 17 March 2014.
Britz, Marjie. 2009. Computer forensics and cybercrime: an introduction. Upper Saddle River, N.J.: Pearson Prentice Hall.
Hill, B., & O’Boyle, T. (2000, August). (2000, August). Cyber Detectives employ Intrusion Detection Systems and Forensics. Retrieved from http://www.mitre.org/news/the_edge/february_01/oboyle.html
The use of computers in homes, schools, offices, and other places has increased in the past few years due to technological developments. As computers have become important components of modern communication, their increased use has also led to the emergence of computer crimes. Computer crimes basically involve the use of a computer system to carry out an illegal activity. In attempts to lessen the frequency and impact of computer crimes, law enforcement agencies use computer forensic to investigate these offenses. Actually, computer crimes are governed by specific laws and dealt with through conducting a computer forensic investigation (Easttom & Taylor, 2011, p.337). Notably, a computer forensic investigation is usually carried out through the use of computer forensic tools, which help in collection of evidence based on the specific offense.
The purpose of preserving the data is to ensure that it can be utilized in court. If the evidence is not properly handled and protected, it might be hard for it to be admitted in the legal actions against the criminals. It is at the heart of computer forensics to collect, document, preserve and interpret the computer data. The aim of performing computer forensics is to determine who was responsible for an activity in a digital environment through a procedural investigation. In preserving the digital data, the investigators use different technologies to get access to and analyze the data in the computer systems. Preservation of data also relates to how the official data is, by analysis using various techniques and aspects. This practice needs an advanced expertise that is not conversant with the regular system users and the system support
Live acquisition: The future of data acquisitions is shifting toward live acquisitions because of the use of disk encryption with newer operating systems (OSs). In addition to encryption concerns, collecting any data that’s active in a suspect’s computer RAM is becoming more important to digital investigations. The processes and data integrity requirements for static and live acquisitions are the same. The only shortcoming with live acquisitions is not being able to perform repeatable processes, which are critical for collecting digital evidence.
What did they do ? Before we talk about it any further, we have to know some definitions that we use in digital forensics and digital evidence, not only two of them but the others too. This chapter will explain about it . Before we talk about it any further, we have to know the definition of what we are talking about. In the introduction we already know what digital forensic and digital evidence shortly are. In this chapter, we will more explore what they are, and some state that we found when we search about digital forensic and digital evidence. Computer forensics is a broad field and applied to the handling of crimes related to information technology. The goal of computer forensic is to securing and analyzing digital
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Reilly, Denis, Chris Wren, and Tom Berry. "Cloud Computing: Pros and Cons for Computer Forensic Investigations." School of Computing and Mathematical Sciences (2011): n. pag. Web.
Cloud storage basic terms, is a way to save information to the web that can managed data storage. Cloud computing services are online services, which store this information to a safe and secure location online. It’s offered a quicker, easier and safer backup than conventional methods of file storage such as bookshelves or cardboard files.
When they wanted to save photos online instead of on your personal computer, they are able to use “cloud computing” service. Cloud computing means that the transfer of computing data or information over the internet. Not just to keep data in your personal computer, they are able to save the data on internet server to open their data in any computer. In this report we will walk through about what is cloud computing, what kinds of model did cloud computing have, types of cloud computing, benefits of cloud computing, and security.