Digital and Cloud Forensics
|
|
- Hester Hopkins
- 8 years ago
- Views:
Transcription
1 Digital and Cloud Forensics Stavros Simou Cultural Informatics Laboratory, Department of Cultural Technology and Communication, University of the Aegean, University Hill, GR Mytilene, Greece
2 Forensics Is the scientific method of gathering and examining information about the past. Finding evidence to establish facts that can be presented in a legal proceeding. Those that collect forensic evidence must follow strict procedures to protect evidence from contamination and destruction and to preserve the chain of custody. Forensics "tells the same story" no matter how many times it is tested, or how many years have passed.
3 Early methods of forensics In the late 18th century, writings on changes that occurred in the structure of the body as the result of disease began to appear by the French physician Francois Immanuele Fodéré. French police officer Alphonse Bertillon was the first to apply the anthropological technique of anthropometry to law enforcement, in the 1870s. Sir William Herschel was one of the first to advocate the use of fingerprinting in the identification of criminal suspects, in The first United Kingdom Fingerprint Bureau was founded in Scotland Yard, the Metropolitan Police headquarters, London, in By 1906, New York City Police Department Deputy Commissioner Joseph A. Faurot, introduced the fingerprinting of criminals to the United States. Scientific and surgical investigation was widely employed by the Metropolitan Police during their pursuit of the mysterious Jack the Ripper, in the 1880s. In the 20th century several British pathologists, pioneered new forensic science methods. Alec Jeffreys pioneered the use of DNA profiling in forensic science in He realized the scope of DNA fingerprinting, which uses variations in the genetic code to identify individuals.
4 Forensics
5 Digital forensics Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information. The first computer crimes were recognized in the 1978 Florida Computer Crimes Act, which included legislation against the unauthorized modification or deletion of data on a computer system. Canada was the first country to pass legislation in The growth in computer crime during the 1980s and 1990s caused law enforcement agencies to begin establishing specialized groups, usually at the national level, to handle the technical aspects of investigations. Since 2000, in response to the need for standardization, various bodies and agencies have published guidelines for digital forensics.
6 Laws dealing with digital evidence are concerned with two issues: Integrity - is ensuring that the act of seizing and acquiring digital media does not modify the evidence (either the original or the copy). Authenticity - refers to the ability to confirm the integrity of information; for example that the imaged media matches the original evidence. The ease with which digital media can be modified means that documenting the chain of custody from the crime scene, through analysis and, ultimately, to the court, is important to establish the authenticity of evidence. Guidelines such as those issued by ACPO are followed to help document the authenticity and integrity of evidence. Digital Evidence
7 Types of Digital Evidence Address books and contact lists Audio files and voice recordings Backups to various programs, including backups to mobile devices Bookmarks and favorites Browser history Calendars Compressed archives (ZIP, RAR, etc.) including encrypted archives Configuration and.ini files (may contain account information, last access dates etc.) Cookies Databases Documents messages, attachments and databases Events Hidden and system files Log files Organizer items Page files, hibernation files and printer spooler files Pictures, images, digital photos Videos Virtual machines System files Temporary files
8 Cloud Adoption - Forecast 3rd Annual Future of Cloud Computing Survey (2013) 75 percent of those surveyed reporting the use of some sort of cloud platform. The growth in the worldwide market for cloud computing it is expected to reach $158.8 billion by International Data Corporation (IDC) IT cloud services will reach $47.4 billion in 2013 and is expected to be more than $107 billion in Over the forecast period, public IT cloud services will have a compound annual growth rate (CAGR) of 23.5%.
9 Cloud Computing What is it? Outsourcing (services and equipment) Providers give the ability to customers to use configurable computing resources that can be rapidly provisioned and released with minimal management effort. Reduction of cost on infrastructure and support. Increase systems scalability. Use of virtualization techniques for providing equipment, software and platform support as remote services. Five essential characteristics. Three service models. Four deployment models.
10 Digital and Cloud Forensics Digital forensics is the field where the investigators use forensic processes to search for digital evidence in order to use them in a court of law. Digital forensics deals with the digital evidence found in the area where the crime committed. Cloud forensic is a subset of digital forensics, to designate the need for digital investigation in cloud environments, based on forensic principles and procedures. Main difference: data is stored on data centers at different geographical areas with different jurisdictions.
11 Cloud Forensic Process Based on digital forensics (DFRW model was used with a slight differentiation) Stages Identification stage - Identifying all possible sources of evidence. Preservation and Collection stage Collecting evidence from virtualized environments and preserve the chain of custody and the integrity. Examination and Analysis stage Inspection of data with tools to reveal useful information. Presentation stage Presenting evidence in a way that the jury will understand all the technical details.
12 Challenges Identification Stage Access to evidence in logs Physical inaccessibility Volatile data Distribution collaboration Client side identification Dependence on CSP Trust Service Level Agreement (SLA) Preservation Collection Stage Integrity and stability Privacy and multi-tenancy Time synchronization Internal Staffing Chain of custody Imaging Bandwidth limitation Multi-jurisdiction Examination - Analysis Stage Lack of forensic tools Volume of data Encryption Reconstruction Unification of log formats Identity Presentation Stage Complexity of testimony Documentation Uncategorised Compliance issues
13 Challenges identified in the three service models Cloud Forensic Challenges / Stage Applicable to IaaS PaaS SaaS Identification Access to evidence in logs partly Physical inaccessibility Volatile data X X Client side identification X Dependence on CSP - Trust Service Level Agreement (SLA) Preservation - Collection Integrity and stability Privacy X Time synchronization Internal Staffing Chain of custody Imaging X Bandwidth limitation X X Multi-jurisdiction - collaboration Multi-tenancy Examination Analysis Lack of forensic tools Volume of data X Encryption Reconstruction Unification of log formats Identity Presentation Complexity of testimony Documentation Uncategorised Compliance issues
14 Major open issues Introduction of new methodologies and frameworks. Development of new forensic tools. Trusted relations between CSPs and consumers should be built. International collaborations between law enforcement and CSPs.
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
More informationCloud Forensics: an Overview. Keyun Ruan Center for Cyber Crime Investigation University College Dublin
Cloud Forensics: an Overview Keyun Ruan Center for Cyber Crime Investigation University College Dublin Cloud Futures 2011, Microsoft Research Redmond, June 3, 2011 Co-authors Mark Crosbie, IBM Ireland
More informationRegulating forensic science in the UK. Andrew Rennison M.Sc.
Regulating forensic science in the UK Andrew Rennison M.Sc. Context United Kingdom of Great Britain and Northern Ireland (UK) - 3 criminal justice systems Crime Science England and Wales 43 police forces
More informationOverview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
More informationCloud Computing Architecture and Forensic Investigation Challenges
Cloud Computing Architecture and Forensic Investigation Challenges Ghania Al Sadi Sohar University, Computing Department Sohar, University Rd, 311 Sultanate of Oman ABSTRACT Contrasting to traditional
More informationKEY TERMS FOR SERVICE LEVEL AGREEMENTS TO SUPPORT CLOUD FORENSICS
Chapter 12 KEY TERMS FOR SERVICE LEVEL AGREEMENTS TO SUPPORT CLOUD FORENSICS Keyun Ruan, Joshua James, Joe Carthy and Tahar Kechadi Abstract As the adoption of cloud services increases, the importance
More informationForensic Test 1 Review: Mathieu Orfila (1738 1853) Father of Modern Toxicology 1814 wrote first treatise. (formal scientific work) Alphonse Bertillon
Forensic Test 1 Review: Mathieu Orfila (1738 1853) Father of Modern Toxicology 1814 wrote first treatise. (formal scientific work) Alphonse Bertillon (1853 1914) Father of Criminal Investigation first
More informationCloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
More informationEXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
More informationTechnologies based on Cloud Computing Technology
, pp.1-5 http://dx.doi.org/10.14257/astl.2015.82.01 Technologies based on Cloud Computing Technology Huan Ma 1, Gaofeng Shen 2, Ming Chen 1 and Jianwei Zhang 1 1 Software Engineering College, Zhengzhou
More informationIntroduction. IMF Conference September 2008
Live Forensic Acquisition as Alternative to Traditional Forensic Processes Marthie Lessing* Basie von Solms Introduction The Internet and technology developments introduced a sharp increase in computer
More informationForensic Science. Distance Learning Presentation For King Drew Magnet High School of Medicine and Science March 14, 2007
Forensic Science Distance Learning Presentation For King Drew Magnet High School of Medicine and Science March 14, 2007 Dorothy Harris Forensic Course Developer Science Teacher and Department Chairman
More informationDigital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
More informationSomers Public Schools Somers, Connecticut 06071 Science Curriculum
Survey in Forensics Grades 11 and 12 F.1 Teamwork and deductive reasoning play an important role in forensic science. Core Theme: Understanding forensic science. What is forensic science and why are teamwork
More informationTop 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
More informationResearch on Digital Forensics Based on Private Cloud Computing
Research on Digital Forensics Based on Private Cloud Computing Gang Zeng Police Information Technology Department, Liaoning Police Academy, Liaoning, China ABSTRACT With development of network, massive
More informationCloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
More informationSRG Security Services Technology Report Cloud Computing and Drop Box April 2013
SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing
More informationSecure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the
More informationLEGAL ISSUES IN CLOUD COMPUTING
LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing
More informationCalm before the Storm: The Emerging Challenges of Cloud Computing in. Digital Forensics
Calm before the Storm: The Emerging Challenges of Cloud Computing in Digital Forensics George Grispos William Bradley Glisson Tim Storer University of Glasgow last revision 2413 by tws on 2011-08-09 10:55:05Z
More informationClouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
More informationCloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile
Cloud Risk Management: How to Consolidate your CSP and Corporate Risk Profile Jerry Wertelecky, CPA, Fellow HKIoD & Managing Director INTRODUCTION Jerry Wertelecky Country of Birth: United States Current
More informationIntroduction to Forensic Science. So what is Forensic Science? Major Contributors. Chapter 1: Intro to FS
Introduction to Forensic Science Chapter 1: Intro to FS So what is? In its broadest definition, forensic science is the application of science to criminal and civil laws. We will put emphasize on the applications
More informationTechnische Herausforderungen der Cloud-Forensik
Technische Herausforderungen der Cloud-Forensik Dominik Birk Horst Görtz Institute for IT Security Bochum (Germany) Anwendertag IT-Forensik 2011 April 12 th, 2011, Darmstadt The Speaker Dominik Birk Ph.D.
More informationData In The Cloud: Who Owns It, and How Do You Get it Back?
Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?
More informationINTEGRITY FORENSICS. Where the Evidence Tells the Truth. Charles M. Pruitt 2545 Bellwood Road Richmond, Virginia 23237 chuck@integrity-forensics.
Charles M. Pruitt 2545 Bellwood Road Richmond, Virginia 23237 chuck@integrity-forensics.com My career began in 1975 with the Newport News Police Department; within four years I was promoted to Detective
More informationSecure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net
Secure Enterprise Mobility Management White Paper: Cloud-Based Enterprise Mobility Management soti.net Background Facing a business environment of constant change and increasing complexity, enterprises
More informationCONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationSecurity Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of
More informationTime to Value: Successful Cloud Software Implementation
Time to Value: Successful Cloud Software Implementation Cloud & Data Security 2015 Client Conference About the Presenter Scott Schimberg, CPA, CMA Partner, Consulting, Armanino Scott became a Certified
More informationRegulated Applications in the Cloud
Keith Williams CEO Regulated Applications in the Cloud Aspects of Security and Validation Statement on the Cloud and Pharma s added Complexity Clouds already make sense for many small and mediumsize businesses,
More informationPage 1 of 5 Position Code #P10260. Forensic Identification - Technological Crimes Unit ASSOCIATION: Civilian LOCATION: Headquarters
Page 1 of 5 Position Code #P10260 POSITION TITLE: Computer Forensics DEPT./DIV.: Investigative Services Support Technician REPORTS TO: Sergeant, Technological Crimes Unit BRANCH: Forensic Identification
More informationCloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
More informationWhat is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 warren@cs.pdx.edu What is Digital Forensics?
More informationConnecting Your Business to the Cloud. Jeff Coomans Sr. Manager New Product Development Hawaiian Telcom
Connecting Your Business to the Cloud Jeff Coomans Sr. Manager New Product Development Hawaiian Telcom Agenda What is the Cloud? Top Cloud Apps How Do I Get Started? Examples Business Benefits Migration
More informationBreakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements
Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements 9 April 2013 Facilitator: Dr. Sheau-Dong Lang, Coordinator Master of Science in Digital Forensics University
More informationEC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
More informationCLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
More informationEAaaS Cloud Security Best Practices
EAaaS Cloud Security Best Practices A Technical White Paper by Sennovate Inc Jan 2013 EAaaS Cloud Security Best Practices Page 1 Introduction: Cloud security is an ever evolving subject that is difficult
More informationPCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
More informationCloud Computing Security: Public vs. Private Cloud Computing
Cloud Computing Security: Public vs. Private Cloud Computing White paper Parallels Cloud Computing Security Overview Over the last few years, cloud computing has become a buzzword on the Internet. In simple
More informationDigital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
More informationDigital Forensics. General Terms Cyber Crime, forensics models, Investigation, Analysis, digital devices.
Digital Forensics Ravneet Kaur, Amandeep Kaur Assistant Professor in Computer Science SDSPM College for Women, Rayya (Asr) Guru Nanak Dev University, India International Journal of Computer Applications
More informationComputer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
More informationAskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
More informationData Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
More informationDigital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC
Digital Forensics: The aftermath of hacking attacks AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC Topics Digital Forensics: Brief introduction Case Studies Case I:
More informationPiecing Digital Evidence Together. Service Information
Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM
More informationPOLICE SCENE TECHNICIAN I POLICE SCENE TECHNICIAN II
CITY OF ROSEVILLE POLICE SCENE TECHNICIAN I POLICE SCENE TECHNICIAN II DEFINITION To perform a variety of technical and specialized duties related to the investigation of crimes and traffic accidents;
More informationILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION STATE POLICE EVIDENCE TECHNICIAN SERIES CLASS TITLE POSITION CODE STATE POLICE EVIDENCE TECHNICIAN I 41901 STATE POLICE EVIDENCE TECHNICIAN
More informationCloud Computing Secured. Thomas Mitchell CISSP. A Technical Communication
Cloud Computing Secured Thomas Mitchell CISSP A Technical Communication Abstract With the migration to Cloud Computing underway in many organizations IT infrastructure, this will cause a paradigm shift
More informationHitachi Content Platform (HCP)
Copyright 2014 A*STAR Version 1.0 Hitachi Content Platform (HCP) HCP and HCP Anywhere Features Evaluation THIS DOCUMENT AND THE INFORMATION CONTAINED HEREIN IS PROVIDED ON AN "AS IS" BASIS WITHOUT ANY
More informationCloud Computing in the Czech Republic
Cloud Computing in the Czech Republic George Feuerlicht, Lukas Burkon and Nikos Margaris Cloud Computing Research Group Prague University of Economics Cloud Computing Research Group CCRG@KIT http://cloud-computing.vse.cz/wp/
More informationIAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
More informationKeyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie
Chapter 2 CLOUD FORENSICS Keyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie Abstract Cloud computing may well become one of the most transformative technologies in the history of computing. Cloud
More informationOffice of the Chief Information Officer
Office of the Chief Information Officer Online File Storage BACKGROUND Online file storage services offer powerful and convenient methods to share files among collaborators, various computers, and mobile
More informationINFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
More informationComputer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
More informationCyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing
KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting
More informationRefresher on cloud computing
Refresher on cloud computing Cloud computing is a form of outsourcing where the organization outsources data processing to computers owned by the vendor. Outsourcing may also include utilizing the vendor
More informationPublic Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
More informationDigital Forensics for IaaS Cloud Computing
Digital Forensics for IaaS Cloud Computing June 26, 2012 The views expressed in this presentation are mine alone. Reference to any specific products, process, or service do not necessarily constitute or
More informationRemarks. 7th International DNA Users' Conference For Investigative Officers. Ronald K. Noble. INTERPOL Secretary General.
Remarks by Ronald K. Noble INTERPOL Secretary General 7th International DNA Users' Conference For Investigative Officers 06 November 2013 Lyon, France Dr Simon Walsh, Chairman of the INTERPOL DNA Monitoring
More informationUtilizing Cloud Storage for Mainframes
Utilizing Cloud Storage for Mainframes Art Tolsma Luminex Software, Inc. March 3, 2015 Vendor Session #17166 What? Why? and How? of Cloud Storage Cloud Storage and Cloud Computing are changing how IT operates
More informationMeeting the Challenges of Remote Data Protection: Requirements and Best Practices
Meeting the Challenges of Remote Data Protection: Requirements and Best Practices A Whitepaper by Stefan Utzinger, NovaStor CEO (March 2011) Table of Contents EXECUTIVE SUMMARY... 2 INTRODUCTION: THE CHALLENGE
More informationSecurity, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32
Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization
More informationImplications for Cloud Computing & Data Privacy
Implications for Cloud Computing & Data Privacy Diane Mueller Cloud Evangelist, ActiveState dianem@activestate.com http://www.activestate.com/stackato Founded 1997 2 million developers, 97% of Fortune
More informationCloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works
Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered
More informationIntroduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
More informationA COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
More informationPhoenix backs up servers using Windows and Linux operating systems. Here is a list of Windows servers that Phoenix supports:
Druva About Phoenix What is Phoenix? Druva Phoenix is a cloud based backup and archival solution aimed primarily at remote office servers. Since Phoenix is cloud-targeted backup, there is no elaborate
More informationCloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013
Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud
More informationSecuring The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
More informationGuidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
More informationCloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
More informationNancy W. Peterson Forensic Biology Consultants, LLC July 7, 2011
Nancy W. Peterson Forensic Biology Consultants, LLC July 7, 2011 My Qualifications 20 years : Forensic Serology and DNA cases at the FDLE 30+ years: Training Forensic DNA Technologists & DNA Analysts 30+
More informationCloud Computing. Cloud Computing An insight in the Governance & Security aspects
Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010
More informationModule 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
More informationCloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
More informationHow To Understand Cloud Computing
Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 Introduction to Cloud Computing CSCI319 Chapter 1 Page: 1 of 10 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to how
More informationUNIVERSITY OF MANITOBA PROCEDURE
UNIVERSITY OF MANITOBA PROCEDURE Procedure: Parent Policy: Effective Date: June 23, 2015 Revised Date: Review Date: June 23, 2025 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
More informationCloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the Inspector General, Sabrina.segal@usitc.gov Reference
More informationInvestigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
More informationArchival Approach to IaaS Cloud Services
Central Page 216 of 344 Archival Approach to IaaS Cloud Services Hrvoje Stančić, Adam Al-Hariri Faculty of Humanities and Social Sciences University of Zagreb Ivana Lučića 3, 10000 Zagreb, Croatia {hstancic,
More informationOverview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
More informationVideo Storage Solutions for Police Departments in Large Cities: What Works, What It Costs
Executive Summary Police departments nationwide are turning to video recording and storage solutions for interviews conducted by police officers. The typical Video Interview System (VIS) offers several
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationEnterprise Cloud-to-Cloud Backup and Recovery:
White Paper Enterprise Cloud-to-Cloud Backup and Recovery: Data Protection for Cloud-Based Applications/Platforms Gartner predicts that more than 50% of enterprises will have some form of SaaS based application
More informationplantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
More informationILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10
More informationA CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing
A CommVault Business-Value White Paper Understanding and Mitigating the Legal Risks of Cloud Computing Shannon Smith, Esq., ediscovery and Archiving Specialist for CommVault Systems Bennett B. Borden,
More informationDigital Forensics G-Cloud Service Definition
Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology
More informationWhat Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
More informationEnterprise Cloud Backup of Cloud-Based Applications/Platforms
EXECUTIVE SUMMARY Enterprise Cloud Backup of Cloud-Based Applications/Platforms Gartner predicts that more than 50% of enterprises will have some form of SaaS-based application strategy by 2015. As enterprises
More informationCloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
More information