Cloud storage forensics / Darren Quick, Ben Martini, Kim-Kwang Raymond Choo ; Brett Shavers, technical editor
Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Amsterdam ; Boston ; Heidelberg : Syngress, an imprint of Elsevier, [2014]Copyright date: © 2014Description: 1 Online-Ressource (xviii, 189 Seiten) : IllustrationenISBN:- 9780124199910
- 1306154391
- 9781306154390
- Computerforensik
- Computer crimes -- Investigation
- Forensic sciences -- Data processing
- Forensic sciences
- Computer crimes
- Information storage and retrieval systems
- Cloud computing
- BUSINESS & ECONOMICS ; Infrastructure
- SOCIAL SCIENCE ; General
- Computer crimes ; Investigation
- Forensic sciences ; Data processing
- 363.250285 363.25028546782
- 363.25968
- 363.250285/46782 23
- 363.25028546782
- HV8079 .C65 Q53 2014
- HV8079.C65
Contents:
Summary: To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner. Learn to use the methodology and tools from the first evidenced-based cloud forensic framework Case studies provide detailed tools for analysis of cloud storage devices using popular cloud storage services Includes coverage of the legal implications of cloud storage forensic investigations Discussion of the future evolution of cloud storage and its impact on digital forensicsPPN: PPN: 773416056Package identifier: Produktsigel: ZDB-30-PAD | ZDB-30-PQE
Front Cover; Cloud Storage Forensics; Copyright Page; Contents; Acknowledgments; About the Authors; Forewords; 1 Introduction; Introduction; Cybercrime and the cloud; Challenges faced by law enforcement and government agencies; Summary; Structure of book and contributions to knowledge; References; 2 Cloud Storage Forensic Framework; Introduction; Cloud (storage) forensic framework; Commence (Scope); Preparation; Evidence source identification and preservation; Collection; Examination and analysis; Presentation; Complete; Framework summary; References
3 Microsoft SkyDrive Cloud Storage Forensic AnalysisIntroduction; SkyDrive forensics: Windows 7 PC; Commence (Scope); Preparation; Evidence source identification and preservation; Collection; Examination and analysis; Control-Base-VMs; SkyDrive client software; SkyDrive account when accessed via a browser; Keyword search terms; Directory listings; Prefetch files; Link files; Thumbcache files; Event log files; Registry files; Recycle.Bin; Data carve; Browser analysis; Metadata; Network analysis; System Volume Information; Memory (RAM) analysis; Eraser, CCleaner, and DBAN; Presentation
Analysis findingsComplete; SkyDrive forensics: Apple iPhone 3G; Commence (Scope); Preparation; Evidence source identification and preservation; Collection; Examination and analysis; Control-Base-XRY; SkyDrive accessed via the iOS Safari browser; SkyDrive application used to access the research account; Presentation; Analysis findings; Complete; Case study; Step 1-Commence (Scope); Step 2-Preparation; Step 3-Evidence source identification and preservation; Step 4-Collection; Step 5-Examination and analysis; Step 6-Presentation; Step 7-Complete; Conclusion; References
4 Dropbox Analysis: Data Remnants on User MachinesIntroduction; Dropbox forensics: Windows 7 PC; Commence (Scope); Preparation; Evidence source identification and preservation; Collection; Examination and analysis; Web browser Dropbox account information; Control-Base-VMs; Dropbox client software; Uninstallation of Dropbox client software; Keyword search terms; Directory listings; Prefetch files; Link files; Registry; Thumbcache; Event logs; Browser analysis; Network traffic (PCAP) analysis; Memory analysis; Results of applying anti-forensic techniques (Eraser, CCleaner); Presentation
Artifacts from windows clientVolatile data capture; Artifacts from browser; Complete; Dropbox forensics: Apple iPhone 3G; Commence (Scope); Preparation; Evidence source identification and preservation; Collection; Examination and analysis; Control-Base-XRY; Dropbox accessed via the iOS Safari browser; Dropbox application used to access the research account; Presentation; Artifacts from iOS browser; Artifacts from Dropbox iOS client software; Complete; Case study; Step 1-Commence (Scope); Step 2-Preparation; Step 3-Evidence source identification and preservation; Step 4-Collection
Step 5-Examination and analysis
No physical items for this record