The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
The Cloud Security Ecosystem 2015
DOI: 10.1016/b978-0-12-801595-7.00017-3
|View full text |Cite
|
Sign up to set email alerts
|

Integrating digital forensic practices in cloud incident handling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…More specifically, including digital forensic practices will provide an in‐depth understanding of an incident, help identify perpetrators and potentially their motives, and identify appropriate response actions as well as improving the response strategy for rapid actions. This echoed the observations of Ab Rahman and Choo . For example, using forensic tools allowed us to recover data of forensic interest from the databases of apps, etc., which could be used to reconstruct the event.…”
Section: Discussionmentioning
confidence: 53%
See 1 more Smart Citation
“…More specifically, including digital forensic practices will provide an in‐depth understanding of an incident, help identify perpetrators and potentially their motives, and identify appropriate response actions as well as improving the response strategy for rapid actions. This echoed the observations of Ab Rahman and Choo . For example, using forensic tools allowed us to recover data of forensic interest from the databases of apps, etc., which could be used to reconstruct the event.…”
Section: Discussionmentioning
confidence: 53%
“…In this study, we adapt our previously published models and present a refined model which integrates both cloud incident handling and forensic‐by‐design principles. We then demonstrate the utility of our model using a set of controlled experiments.…”
Section: Introductionmentioning
confidence: 99%
“…One potential future work is to develop and validate a cloud incident handling and forensic readiness model such as the model of Ab Rahman and Choo (Rahman and Choo, 2015b).…”
Section: Discussionmentioning
confidence: 99%
“…This concept of forensic readiness is important because not only does it facilitate digital investigations but it allows these activities to proceed with minimal interruption or cost to the business (Pangalos et al, 2010) (Rahman and Choo, 2015b). This concept of forensic readiness is important because not only does it facilitate digital investigations but it allows these activities to proceed with minimal interruption or cost to the business (Pangalos et al, 2010) (Rahman and Choo, 2015b).…”
mentioning
confidence: 99%
“…In an extra effort in a recent work, to respond to the increased volume of forensic data and the sophisticated attacks targeting cloud services, the model was later enhanced to a cloud incident handling and forensics-by-design model. The efficacy of the model was then demonstrated by using Google Drive, Dropbox, and OneDrive [57][58][59][60].…”
Section: Cloud Forensics Process Modelsmentioning
confidence: 99%