Methods In The Coud Computing Environment

867 words - 4 pages

As ISO/IEC 27037 addresses the process of how the digital evidences are to be handled but all these processes addresses the traditional digital environment. But as with the development of cloud the scenario has changed a lot. Cloud computing brings new challenges in front of investigators. These challenges may include various issues like virtualization of servers to multiple locations, dependence on CSP for access to logs etc.

So in the document “Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing” which has been given by the incident management and forensics working group of Cloud Security Alliance, an organization dedicated to development and improving cloud. This document has tried to address the issues relating to how to handle evidence in cloud environment. Also they have tried to explain how ISO/IEC 27037 can be used effectively in cloud environment. Using this document i have tried to explain how to mitigate the impact that cloud is having on computer forensics. So with reference to that document I have tried to explain the identification, collection, acquisition and preservation of evidence from the cloud environment.

There are four stages as mentioned in the ISO 27037 for the purpose of evidence collection and analysis identification, collection, acquisition and preservation. So here we will be addressing all these methods in the cloud computing environment[21].

5.1.1 Identification
Identification of objects which can be used as potential evidences is the initial stage of investigation. In standard environment it is very much easy to identify any device or object that can be used as an evidence. But in case of cloud this is not so easy. So with reference to this document solution to this problem has been suggested.

Documents or devices that can be identified as potential evidences vary according to the service layers as cloud provides three types of services SaaS, PaaS and IaaS.So for each of these service layers identifying the evidences and the sources which can be used as an evidence will be different.

 In software as a service (SaaS) layer following can be identified as evidences
• Application logs
• Session logs
• IP addresses
• Activity logs
All these mentioned above can be used as potential evidences for investigation purpose. As application logs will store information about what activity has been performed by these applications, who has used that application etc. Session logs will store information relating to sessions time when the session has been created and terminated. IP address of user can be used as an evidence as it will tell us who was the user and from...

Find Another Essay On Methods in the Coud Computing Environment

Security in the Business Environment Essay

1919 words - 8 pages Standards Organization (ISO) 17799:2000 and the IT Infrastructure Library (ITIL) Best Practice in Security Management. Introduction This service management function (SMF) provides information about security management for organizations that have deployed, or are considering deploying, Microsoft or other technologies in a data center or other enterprise-level computing environment. The guide assumes that the reader is familiar with the

Bullying in the Work Environment Essay

908 words - 4 pages world so they introduced what they call; Lean Manufacturing and The Environment (LEAN) in to the workplace. “Lean manufacturing is a business model and collection of tactical methods that emphasize eliminating non-value added activities (waste) while delivering quality products on time at least cost with greater efficiency”(EPA, 2012). LEAN, is being implemented locally as we speak. The definition to LEAN is the 5’s. The five S means: sort, set

Influences in the Teaching Environment

1127 words - 5 pages Influences in the Teaching Environment In this country, many rookie teachers do not succeed in the first two years of teaching due to poor classroom management. They have forgotten the essentials of running a smooth classroom, maintaining appropriate and consistent discipline and the overall pressures of teaching. Worst-case scenario, they never learned the essentials of classroom management. Since behavior management is one of the primary

Change in the Business Environment

1235 words - 5 pages Many people will approach change in a business environment with pre-conceived anxiety and worries. However, this does not always need to be the case – many employers are using new strategies and tactics to promote business change in a positive light – methods such as empowerment, Kaizen production, and bottom-up change are becoming evermore popular with large companies. First though, I want to examine why workplace change is such a worry for

A Case Study on the cyber-attack in cloud computing

2545 words - 10 pages ,Communications of the ACM 53 (4) (2010) 50–58. [p4] N. Fernando, S.W. Loke, W. Rahayu, Mobile cloud computing: a survey, Future Generation Computer Systems 29 (1) (2013) 84–106. [p5] R. Aoun, C.E. Abosi, E.A. Doumith, R. Nejabati, M. Gagnaire, D. Simeonidou,Towards an optimized abstracted topology design in cloud environment,Future Generation Computer Systems 29 (1) (2013) 46–60. [p8] G. Anthes, Security in the cloud, Communications of the ACM 53 (11

Global Trends in the Environment

1006 words - 4 pages The environment of planet Earth is being harmed and the causes of environmental degradation are mostly man made. Natural resources are being exploited to provide energy, food, and technology for an ever-growing global population. In the process, the globe is warming at an unprecedented rate, water and air are being polluted, and forests are being destroyed; however, awareness and education are encouraging the search for environmental

Changes In The Earths Environment

1961 words - 8 pages Changes in the Earth's Environment The 20th century, especially in the second half, has been one of rapid change in the Earth's environment. The impact of humans on the physical form and functioning of the Earth have reached levels that are global in character, and have done so at an increasingly mounting speed. 20 years ago the environment was seen as posing a threat to the future of humanity as death rates from natural hazards had increased

The Sulfur Dioxide in Environment

1269 words - 6 pages The Sulfur Dioxide in Environment The sulfur dioxide was regarded as the acknowledged toxic gas, and is also one of main factors for acid rain. Due to its severe toxicity, the major pollution incidents have even happened in human beings’ history. During 1st December and 15th December 1930, the toxic gases including the sulfur dioxide caused great loss for Meuse Valley in Belgium. The toxic gases led to thousands of people in the industrial zone

Discrimination in the Work Environment

5328 words - 21 pages time consuming process, whether an individual goes through the EEOC or takes the path of civil litigation. Ideally, matter could be resolved through the EEOC process but if that does not work the injured party will have the right to ask the courts for remediation. Although a detailed and cumbersome endeavor, the process is an important part of the workplace environment in the United States.Diversity in the workplaceThe workforce of today is diverse

Safety In The Salon Environment

2038 words - 9 pages technician will continue to use those tools on every client after. That is very unsafe for everyone in the environment. Safety and sanitation is the most important element in any salon. Both clients and cosmetologists are being affected by improper sanitation (Frangie). Salons will always try to keep up with the latest trends. As cosmetologist keep up with the latest trends, the more money the salon will have. Usually teens and young adults

Methods of Characterization in The Hairy Ape

2507 words - 10 pages Methods of Characterization in The Hairy Ape Eugene Gladstone O’Neill was born October 16, 1888, to Irish-American parents in New York City. His mother, Ella O’Neill, reserved and genteel (Sheaffer 15), came from a prosperous Cleveland family. His father, James O’Neill, from a poor family, was an actor who became synonymous with Dumas’ Count of Monte Cristo, a role he performed over 3000 times (Sheaffer 8). Driven by fear of

Similar Essays

Computing In The Peruvian Andes Essay

863 words - 4 pages , and much more. Problems: The most immediate problems that faced the engineers were the regional and environmental ones. While the Andes environment does not exactly present the same level of hostility that some of the PLC's environments we talked about do, it’s still an environment not anywhere near the perfect 75° and breezy. A big problem was the amount of moisture in the atmosphere and how unkind said moisture can be towards electronics. The

Professional Issues In Computing: Ethical Issues In The Computing Industry

962 words - 4 pages Ethics in the computing industry covers aspects not of absolute rights and wrongs, in a legalistic or dispassionate sense, but also the how and where-for of functioning ethically within the real world, where not everything is cut and dried. Ethics attempt to advice how humans should act within society with regards to tings like fairness, openness, honesty, responsibility etc.Examples of Ethical Problems and Solutions1) Problem: You are a

The Use Of Technology In Both The Training Methods And Training Environment Of Elite Athletes In Global Sport

1110 words - 4 pages The Use of Technology in Both the Training Methods and Training Environment of Elite Athletes in Global Sport Technology is used to help advance elite athletes, by achieving the maximum for the individuals needs. Both with the training methods and environments technology is being used more and more, for example simulated competition environments. Although such technology is becoming increasingly popular with elite

Developments In The Cambridge Distributed Computing System

1025 words - 5 pages In recent years a lot of development resulted which have changed the use of computers and now many people are using computers in routine life. Computing systems are now used in many ways. Communications are also done through computers which are giving better results as compared with ordinary methods through telephones and the like devices. Bandwidth and speed of communications by using a computer system is improved which is increasing its demand