Research Paper on "Digital Forensics"

Research Paper 4 pages (1273 words) Sources: 4

[EXCERPT] . . . .

Cloud Computing Digital Forensics

The pace at which technology develops in today's world makes inventions and discoveries very temporary and short-lived. Digital forensics is an area of technological development that has grown significantly in the past few years. Although this system of analysis has changed over its history, today's world provides this technology with a very important challenge that will widen the interests of many people, complicating and confusing a situation, in which is at the infancy of development.

Cloud computing is a relatively new technology that has brought serious questions to the means in which digital forensics is now being handled. The purpose of this essay is to explain how cloud computing is the most important new technology that has been introduced into digital forensics in the last five years. This essay will explain how the cloud and cloud computing has literally opened up a new world of problems for those wishing to utilize digital forensics to simplify matters or to just explain them.

The Cloud

Over the past several years, cloud computing has begun to expand in the business community. Cloud computing is a style of computing which allows and provides for virtualized computer related resources using the Internet. One of its major advantages is that a user does not need to have any knowledge, expertise, or control of the infrastructure. This can become a huge cost savings for those businesses who utilize the services inherent with cloud computing. For instance, some services include online business applications that are accessible through any browser from any computer. The actual software and dat
Continue scrolling to

download full paper
a resides on servers external to the business itself. As a result, they would not have to invest huge sums of money in software and hardware. Since they do not own the host infrastructure, they only pay the provider for services and resources they consume. There is probably no limit to the types of services that can be obtained via cloud computing.

Regardless of the provider, cloud computing relies on the use of VirtualMachines (VMs) and some combination of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and/or Software as a Service (SaaS). VMs are software implementations of a computer which can execute programs like a real computer and can be spawned on any computer as needed. There are two types of VMs: the system VM which supports the execution of a complete operating system, and the process VM which is designed to run a single program supporting a single process.

Although cloud computing may appear to some as attractive to a business, it is not without its own unique problems and concerns. Accessing a remote server to commence an application on the Internet presents several obvious security risks. Customers also may not be able to distinguish what policies and procedures are in place to recover data should a server crash or become compromised.

Digital Forensics and the Cloud

Storage of this information presents new problems for digital forensics. Keeping sensitive corporate data on a remote server raises concerns regarding the privacy and accessibility of that data by unlawful second parties. In this model the business or customer is not completely aware of the physical location of the data. Legal and regulatory requirements and laws may be lacking in the location where the data is actually stored. The long-term feasibility of the data itself and its availability could become a major issue should the provider no longer offer the services due to some unforeseen event such as bankruptcy, going out of business, or merging with another company.

Birk (2011) explained that on the cloud, data is always in motion which presents these type of problems. He suggested that "especially in the SaaS model, the customer does not obtain any control of the underlying operating infrastructure such as network, servers, operating systems etc.… READ MORE

Quoted Instructions for "Digital Forensics" Assignment:

Paper should answer this question: What is the most important new technology that has been introduced into digital forensics in the last five years, and why?

How to Reference "Digital Forensics" Research Paper in a Bibliography

Digital Forensics.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/cloud-computing-digital-forensics/4158029. Accessed 5 Oct 2024.

Digital Forensics (2013). Retrieved from https://www.a1-termpaper.com/topics/essay/cloud-computing-digital-forensics/4158029
A1-TermPaper.com. (2013). Digital Forensics. [online] Available at: https://www.a1-termpaper.com/topics/essay/cloud-computing-digital-forensics/4158029 [Accessed 5 Oct, 2024].
”Digital Forensics” 2013. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cloud-computing-digital-forensics/4158029.
”Digital Forensics” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/cloud-computing-digital-forensics/4158029.
[1] ”Digital Forensics”, A1-TermPaper.com, 2013. [Online]. Available: https://www.a1-termpaper.com/topics/essay/cloud-computing-digital-forensics/4158029. [Accessed: 5-Oct-2024].
1. Digital Forensics [Internet]. A1-TermPaper.com. 2013 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/cloud-computing-digital-forensics/4158029
1. Digital Forensics. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/cloud-computing-digital-forensics/4158029. Published 2013. Accessed October 5, 2024.

Related Research Papers:

Digital Forensics Thesis

Paper Icon

Digital Forensics Technology:

Why Open Source Forensic Software Is a Significant Development

Of the many new technologies introduced into digital forensics in the last five years, open source forensic software… read more

Thesis 8 pages (2402 words) Sources: 10 Style: APA Topic: Computers / IT / Internet


Digital Forensics: Issues and Developments Case Study

Paper Icon

The regional teams has to work with the U.S. Secret Service and gather evidence to create forensic pictures and to analyze that data with a particular network of computers known… read more

Case Study 4 pages (1284 words) Sources: 4 Topic: Computers / IT / Internet


Digital Evidence Forensics and the Law Research Paper

Paper Icon

Forensics

Digital evidence/forensics and the law.

Digital Forensics

"How does Carrier's (2005) digital forensics process of preservation, isolation, correlation and logging (PICL) compare to the United States Department of Justice's… read more

Research Paper 12 pages (3398 words) Sources: 10 Topic: Crime / Police / Criminal Justice


Computer Forensics Computers Data Analysis Chapter

Paper Icon

Indeed, many people have active disdain for laws regarding national security and state secrets. Some go so far as to say that there should be nothing withheld from the public… read more

Data Analysis Chapter 4 pages (1280 words) Sources: 2 Style: APA Topic: Computers / IT / Internet


Incident Response and Computer Forensic Investigation Research Paper

Paper Icon

Computer Forensic investigation

Making an initial assessment about the case.

Identifying the risks.

Mitigating or minimizing the risks.

Determining a preliminary design or approach to the case.

Creating a detailed… read more

Research Paper 12 pages (3228 words) Sources: 7 Topic: Computers / IT / Internet


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!