±Forensic Focus Partners
|New Today: 9||Overall: 29213|
|New Yesterday: 5||Visitors: 39|
· SADFE 2015 – Malaga 30th September – 2nd October
· Countering Anti-Forensic Efforts – Part 2
· Windows 8 Touch Keyboard Forensics
· Countering Anti-Forensic Efforts – Part 1
· Linux Timestamps, Oh boy!
· Standard Processes in Windows 10
· NAS Forensics Explained
· Project Spartan Forensics
· FT Cyber Security Summit Europe – London 22nd September
Cloud Forensics - Considerations for a Forensic Investigator
In order to validate the requirements identified from the literature review I would like to incorporate the knowledge of working investigators. I would like to know what you think are key areas/issues an investigator should consider before undertaking an investigation involving Cloud and how they can attempt to manage these.
Responses are greatly appreciated.
I'm working on cloud forensics, too.
In my opinion, there are three main (most important) parts: jurisdiction, organisation and technical issues a forensic investigator is faced.
This means, that you have to note facts about the storage placement and the legal requirements for accessing the data, but imho this is not really a problem for forensic research.
In my opinion, a forensic investigator has three points to access for data stored and used in the cloud.
1. The computer or mobile phone of the victim or the suspicious offender (lets call it local)
2. The cloud envireonment, e.g the server for hosting (store and application systems), lets call it remote
3. The way between local and remote, aka the network.
Best results can be reached by combination of these three parts. I'm working on the network part, which means, that my main research is actually analyzing network traffic (local, remote, and between) to validate the usage of cloud services.