Ask a question to Desklib · AI bot

Ask NowBETA

Digital Forensics in Cloud Computing Investigation Process

Added on -2019-09-23

This research paper analyses the use of digital forensic framework in cloud computing investigations. It examines forensic methodologies for different deployment models as well as cloud platforms.
| 9 pages
| 2094 words
| 204 views

Trusted by 2+ million users,
1000+ happy students everyday

Running head: DIGITAL FORENSICSDigital ForensicsName of the Student:Name of the University:Author Note:
DIGITAL FORENSICS1Abstract There has been increasing interests in the use of cloud computing and thus it presentsdifferent types of opportunities for the exploration as well as the proper enforcement of thelaws. There must be provision for the identification of proper changes and this will layemphasis in the preservation of data for different types of forensic purposes. Research isconducted to examine the forensic methodologies for different deployment models as well ascloud platforms. It has been found that the benefits derived from the cloud storage devicemust be secured with the help of forensic investigation. This will help to understand themalicious practices that are being carried out and thus it can be solved with digital forensics.This research paper will analyse the use of digital forensic framework in cloud computinginvestigations
DIGITAL FORENSICS2ContentsIntroduction............................................................................................................................3Research Aim.........................................................................................................................4Research Objectives...............................................................................................................4Research Questions................................................................................................................4Background of the Study............................................................................................................4Methodology..........................................................................................................................6Conclusion..............................................................................................................................6References..................................................................................................................................8

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Students who viewed this