As mentioned in Part 1 of this article, one of my functions is to research
current and up and coming solutions within the technology realm, particularly
that of distributed computing and cloud computing.
It is a strong possibility that malicious users will eventually identify and
exploit potential flaws within the cloud computing model. CSPs, in their
pursuit to secure market share may have underestimated the possibilities of
attack and misuse of their cloud resources by a malicious user or users.
The likelihood that the creation, storage, processing and distribution of
illicit material will present major legal issues, is also a grave reality 
Digital Forensic Examiners also know that any effective forensic system has
to have an effective means of monitoring and collecting a wide range of data
as; there is no directive which states what may be pertinent to any one ... (more)
[Adopted from my BLOG December 2009]
Lately in the IT community all the hype is on Cloud Computing. We have small
start-ups offering several variations of Cloud services as well as some of
the established big players (Google, Amazon, IBM, Novell (aimed at cloud
service providers),Sun) stepping up their offerings of cloud services.
But what exactly is Cloud Computing? Is it Virtualization? Is it services
that we accessed via a web browser over the years, something totally new, or
is it all of these,but just rebranded?
The term Cloud Computing started gaining traction when Google a... (more)
In an earlier article, I stated that we can view Service-Oriented
Architecture (SOA) as a synthesis of Enterprise Application Integration (EAI)
platforms with middleware tools. This evolution has evolved into an
architectural style which, entities can then utilize to execute and align key
services with their operational model to achieve strategies, goals and
Most who interact with or have interacted with the Department of Defence
(DoD), will know of the various domains through which operations are
As with any effective entity within the federal realm, t... (more)
Proponents of the cloud ecosystem touts its "vastness, flexibility and
scalability as advantages for the implementation of cloud services. However,
from a digital point of view this can be a veritable forensic challenge as we
view the cloud in terms of its scope and diversity.
According to Dr. Stephen Wolthusen "Digital forensics (also referred to at
times as computer forensics) encompasses approaches and techniques for
gathering and analyzing traces of human and computer-generated activity in
such a way that it is suitable in a court of law."
A key challenge to a digital inve... (more)
What is SOA? One can say that the synthesis of Enterprise Application
Integration (EAI) platforms with middleware tools and concepts evolved into
what we know today as Service Oriented Architecture.
SOA then represents a standards based architectural blueprint with an
emphasis on business centric services and transactions rather than that of
technology oriented objectives: In other words an architectural style which
businesses can use to execute and align services with their business model to
achieve their business strategy, goals and objectives.
For instance, an end-user reques... (more)