CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Network Systems Sales LLC
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Evidence Collection & Admissibility Computer Forensics BACS 371.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
What is the “Cloud”? Eric Moore Computer Users Group of Greeley November 8, 2014.
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Technology for Computer Forensics by Alicia Castro.
Information Technology, the Internet, and You
An expert system is a package that holds a body of knowledge and a set of rules on a subject that has been gained from human experts. An expert system.
SaaS, PaaS & TaaS By: Raza Usmani
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
By Drudeisha Madhub Data Protection Commissioner Date:
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Todd Jorns Illinois Community College Board. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data,
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
SharePoint Services Indiana University Cory P. Retherford May 9 th, 2011.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Health Information Technology Basics January 8, 2011 by Leola McNeill adapted from Information Technology Basics by June 2009, Kayla Calhoun & Dr. Frank.
Company LOGO Computer Security and Forensics By Kim Cassinelli, Eriko Yamaguce and Stefan Schuebel.
Cloud Computing.
In the name of God :).
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Guide to Computer Forensics and Investigations Fourth Edition
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
CONDUCTING CYBERSECURITY RESEARCH LEGALLY AND ETHICALLY By Aaron J. Burstein; Presented by David Muchene.
1 Topic# 7 – Auditing with Technology Readings, Chapter 10 A – COMPUTERIZED AUDIT TOOLS –Electronic Spreadsheets –Automated Working Papers –Generalized.
CJ 317 – Computer Forensics
INTRODUCTION to MIS 12/24/20151 Introduction To MIS Component Overview.
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Cloud Archive By: Kimberly Nolan. What it is?  The goal of a cloud archiving service is to provide a data storage (ex. Google drive and SkyDrive) as.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Cell Phone Forensics Investigator - ICFECI
Cloud Computing ENG. YOUSSEF ABDELHAKIM. Agenda :  The definitions of Cloud Computing.  Examples of Cloud Computing.  Which companies are using Cloud.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
BY S.S.SUDHEER VARMA (13NT1D5816)
  Brand Intelligence   “We liked the existing investigative services, but we prefer having our own (intelligence) capability.” Introduction Our clients.
Unit 3 Virtualization.
11. Looking Ahead.
Information Systems.
Cloud Migration What to Consider When Switching Providers NAME: SYED TARIQ SHAH “WAQIF” REG NO: K1S18MCS0021 SUB: CLUSTER AND CLOUD COMPUTING.
Computer Forensics Discovery and recovery of digital evidence
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Forensics Week 2.
HOW BLOCK CHAIN COULD SHAPE THE FUTURE OF WEB DESIGN Many governments in the world have come up with laws of protecting data. This is meant to ensure the.
An Introduction to Cloud Computing
CLOUD COMPUTING.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Hashing files Searching files for keywords
Presentation transcript:

CLOUD COMPUTING Overview on cloud computing

Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers hosted on the internet to execute different services such as storing info, managing and processing data and applications through the internet. An example of a cloud vendor is the Google Docs which offers spreadsheet, word processor and a presentation package which can be accessed online without having to save the files in the hard disk. Another example is the Dropbox which offers storage of files online in addition to being stored on your hard disk as a way of back up

Basic concepts of computer forensics There are four basic steps which are p preparation, collection, examination and analysis and finally reporting Preparation being one of the most vital step it applies evaluation of the tool and procedures to use and not use, complying to the needs of the users, the amount and type of computers and operation they will have to deal with, customer care help and much more. Collection involves technical matters where it can be categorized into 3 types of collection model which are site acquisition, evidence collecting and lastly live forensic. Examination and analysis on the other hand deals with examination of files data and internet artifacts. Finally reporting is where courts experts have to report according to valid templates.

Legal challenges facing computer forensics. Computers have become part and parcel of our lives and are now a major tool at home and even the workplace. In business it also used to perform various task like accounting and managerial stuff. Similarly digital systems have become a mainstay of criminal activities where. This ranges from international terrorists to embezzlers. Sometimes vital evidence need to convict the defendant and win the case are located in the computers internet and networks. Such kind of evidence most of the time imposes a lot of difficultness to obtain it. It may have been hidden in a large data base, overwritten, encrypted or even deleted. Moreover, the investigators are faced with a lot of legal challenges since they must obtain the incriminating evidence in a lawful manner. If not the evidence will not be admissible in court. Investigators must be well clued up, know what constitutes a legal search, the info required by the court and the legally protected privacy rights imposed by the individuals.

Cloud standards. There are no specific standards in computer cloud due to the differences in legal systems. However organizations tend to to present practices its best output in some ways like forensic examiners must observe the highest ethical standards, forensic examiners must remain objective at all times, computer forensic examiners must meet minimum proficiency standards.. All hardware's and software should be tested to insure they produce accurate and reliable results

Encryption cloud. Cloud encryption is the transformation of a cloud data into cipher text which is the result of encryption performed on plain text using a cipher. Encryption is a critical requirement for securing data files for firms using cloud service providers. Volumetric cloud encryption easily provides the advanced security intelligence to protect sensitive data at rest within public, private or hybrid cloud environments.