dfm covers

Forensic Investigation on Cloud Based Virtual Machines

Written by DFM Team

Forensic Investigation on Cloud Based Virtual Machines - Virtual RAM Holds Evidence

The evolution of Cloud technologies and the generalisation of services in many instances and occurrences adds complexity to the acquisition of data and challenges for the assurance of its integrity. Attacks on information systems are on the rise and the compromise of these systems has hosted critical infra-structure collapses, denial of services, identity fraud, and secondary extortion payments. The scope of system investigation has changed significantly as technologies evolve, and the arrangements for use change. Today Cloud technologies have blurred traditional boundary security models and introduced concepts of shared responsibilities. It has meant that the acquisition of data is a complex task across many boundaries and technologies.Raymond Latui and Brian Cusack take an in-depth look at cloud and virtual machine digital forensic investigations.

Find out more -  subscribe to DFM today   and read the full article. Or if you're a subscriber, login and  read the article online.


Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Andrew Harbison

Andrew Harbison is a Director and IT Forensics Lead at Grant Thornton


Coming up in the Next issue of Digital Forensics Magazine

Solving the Security Challenges with a Human Firewall

The Next Generation Human Firewall, fully trained and ready to act on security threats with the right tools at their disposal needs to meet the needs of a securely distributed, flexible, integrated modern workforce.

Fraudulent Use of Digital Images and Detection Survey

This article looks at the basic concepts related to image forgery; the types, detection procedure algorithms and all possible techniques to detect malicious signatures including a comparative analysis.

Subscribe today

Discovery in the Cloud: An Investigator’s Close Look at Unexpected Risks and Challenges

Documents residing in cloud storage accounts are increasingly coming into scope in digital forensic investigations such as IP theft, regulatory, corruption, merger clearance and civil matters. Organisations may be obligated to place preservation holds on data residing in cloud storage, collect documents from cloud accounts and produce this data to regulators or courts.

Every Issue

News, 360, IRQ, Legal