“…From this summary, we observe that there is a dearth of research work focusing on cloud forensic standard tools and technologies in the cloud environment. Also, very limited works have concentrated on pointing out the feasible Update forensic tools to fight novel cybercrime [19], [21], [22], [25], [26], [29] Lack of forensic readiness mechanisms and their management [20], [22], [25], [29], [31] Data management and its fragmentation hinders investigations [19]- [22], [24], [26]- [28], [31] Lack of trust and robust chain of custody preservation [19]- [22], [24], [25], [31] Lack of jurisdictional mechanisms for confidential data [24], [26], [31] Cross border investigations due to different jurisdictions and laws [19]- [22], [24] Lack of training and interoperability between investigators and court [21] Anti-forensics [19] B. NETWORKS Data monitoring and acquisition from network traffic are mandatory to prevent most of nowadays cyber-attacks [32]- [34], including, but not limited to, Distributed Denial of Service (DDoS), phishing, DNS tunnelling, Man-in-the-middle (MitM) attacks, SQL injection and others [35], [36].…”