Forensic Investigation on Cloud Based Virtual Machines
Forensic Investigation on Cloud Based Virtual Machines - Virtual RAM Holds Evidence
The evolution of Cloud technologies and the generalisation of services in many instances and occurrences adds complexity to the acquisition of data and challenges for the assurance of its integrity. Attacks on information systems are on the rise and the compromise of these systems has hosted critical infra-structure collapses, denial of services, identity fraud, and secondary extortion payments. The scope of system investigation has changed significantly as technologies evolve, and the arrangements for use change. Today Cloud technologies have blurred traditional boundary security models and introduced concepts of shared responsibilities. It has meant that the acquisition of data is a complex task across many boundaries and technologies.Raymond Latui and Brian Cusack take an in-depth look at cloud and virtual machine digital forensic investigations.
Find out more - subscribe to DFM today and read the full article. Or if you're a subscriber, login and read the article online.