Within the realms of digital forensics analysts traditionally performed
analysis on static data, either from a core dump, bit to bit imaging etc.
Recently we have seen an increased focus directed at the live forensics
environment. As users rely more on mobile and other remote devices to access
data on demand; data possibly held in some manner of cloud environment,
investigators will have to adapt their mode of investigations to suit.
I recall reading a marketing pitch a while aback where some vendor claimed
that an advantage of Cloud Computing is, an ability to conduct live forensics
without disrupting mission critical systems. How effective this claim may be,
is subject to examination.
According to Brian Carrier - "The only difference between a live and a dead
analysis is the reliability of the results; a live analysis techniques use
software that existed on the sys... (more)
Proponents of the cloud ecosystem touts its "vastness, flexibility and
scalability as advantages for the implementation of cloud services. However,
from a digital point of view this can be a veritable forensic challenge as we
view the cloud in terms of its scope and diversity.
According to Dr. Stephen Wolthusen "Digital forensics (also referred to at
times as computer forensics) encompasses approaches and techniques for
gathering and analyzing traces of human and computer-generated activity in
such a way that it is suitable in a court of law."
A key challenge to a digital inve... (more)
Last week at the 7th International Cloud Expo in Santa Clara, I sat on a
panel discussing virtualization and the cloud. As a follow on to my
contribution, it is my intention to expand on the position of virtualization
and the cloud ecosystem.
It is generally accepted that the concept of cloud computing or, at least the
amalgamation of services that infer the cloud ecosystem, lends to the premise
of improvements in managing deployed services. This due to an assumed
increase in efficiencies resulting from the sharing of hardware resources at
one end of the spectrum.
According to ... (more)
As stated in Part 1 my focus on this article will be more on the backscatter
technology as this seems to be where traveler scanning is heading and it
involves ionizing radiation. Currently we have varied opinions on this
technology with a major concern for the routine use of ionizing X-rays being
that of health issues.
Also mentioned was the fact that our skin being our largest organ, it may be
affected from backscatter skin surface scans in the long term. Continuing on
as stated earlier, per Wikipedia , there are three companies manufacturing
commercial backscatter X-ray dev... (more)
As the cacophony of cloud evangelism expands into several areas of industry,
one much talked about aspect is that of the private cloud.
But what really is a private cloud, and once within an organization's
security perimeter is such a system a pure cloud computing ecosystem? (Of
course within the security perimeter - IT Security teams again have the
advantage of control in lieu of that in a public cloud.) Bear in mind though
once you start thinking of access from outside your "private cloud" the whole
security dynamic will change. At this point your cloud security
perimeter beco... (more)