As mentioned in Part 1 of this article, one of my functions is to research
current and up and coming solutions within the technology realm, particularly
that of distributed computing and cloud computing.
It is a strong possibility that malicious users will eventually identify and
exploit potential flaws within the cloud computing model. CSPs, in their
pursuit to secure market share may have underestimated the possibilities of
attack and misuse of their cloud resources by a malicious user or users.
The likelihood that the creation, storage, processing and distribution of
illicit material will present major legal issues, is also a grave reality 
Digital Forensic Examiners also know that any effective forensic system has
to have an effective means of monitoring and collecting a wide range of data
as; there is no directive which states what may be pertinent to any one ... (more)
Cloud Computing offers a sense of "vastness" in terms of storage and remote
processing. According to Simpson Garfinkil, a major challenge to any digital
forensics investigator investigating data within the cloud; can be an
inability to locate or identify data or code that is lost when single data
structures are split into elements.
This in effect directly impacts forensic visibility.
Within this ecosystem a major concern can be access to and the preservation
of data within an on-going digital forensic investigation. Of consideration
as mentioned in Part 1 - is that in a live and ... (more)
Malicious software or malware is a security nightmare. One can agree with the
statement that malware in the internet is a growing epidemic and is costing
industry billions of dollars each year.
According to Microsoft Malware "is short for malicious software and is
typically used as a catch-all term to refer to any software designed to cause
damage to a single computer, server, or computer network, whether it's a
virus, spyware, et al."
Although the growth of malware may be flattening, its design sophistication
is not. Per Kaspersky labs approximately 300,000 new malware programs ... (more)
[Adopted from my BLOG December 2009]
Lately in the IT community all the hype is on Cloud Computing. We have small
start-ups offering several variations of Cloud services as well as some of
the established big players (Google, Amazon, IBM, Novell (aimed at cloud
service providers),Sun) stepping up their offerings of cloud services.
But what exactly is Cloud Computing? Is it Virtualization? Is it services
that we accessed via a web browser over the years, something totally new, or
is it all of these,but just rebranded?
The term Cloud Computing started gaining traction when Google a... (more)
One major concern with the adoption of cloud computing is the lack of a
defined standard or standards that are specific to operations impacting
security, interoperability & mobility within the Cloud ecosystem.
As most managers of security departments will attest to, there is a fine line
between security and operations. While we as business managers want to ensure
that we maximize the ROI on our operational investments and ensure that
availability is paramount for our users, we do not want to do so at the
expense of our security measures, policies and protocols.
On the other hand we... (more)