Welcome!

Focusing on Data and Fact with less Hype

Jon Shende

Subscribe to Jon Shende: eMailAlertsEmail Alerts
Get Jon Shende via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jon Shende

Cloud Computing offers a sense of "vastness" in terms of storage and remote processing. According to Simpson Garfinkil, a major challenge to any digital forensics investigator investigating data within the cloud; can be an inability to locate or identify data or code that is lost when single data structures are split into elements. This in effect directly impacts forensic visibility. Within this ecosystem a major concern can be access to and the preservation of data within an on-going digital forensic investigation. Of consideration as mentioned in Part 1 - is that in a live and dynamic system such as the cloud, it is virtually impossible to go back to an original state of data after obtaining a "snapshot" for investigation. Also of importance will be jurisdictional and legal ramifications pertaining to the physical location of the cloud systems holding data under ... (more)

Service-Oriented Architecture and the Cloud

What is SOA?  One can say that the synthesis of Enterprise Application Integration (EAI) platforms with middleware tools and concepts evolved into what we know today as Service Oriented Architecture. SOA then represents a standards based architectural blueprint with an emphasis on business centric services and transactions rather than that of technology oriented objectives: In other words an architectural style which businesses can use to execute and align services with their business model to achieve their business strategy, goals and objectives. For instance, an end-user reques... (more)

Live Forensics and the Cloud - Part 1

Within the realms of digital forensics analysts traditionally performed analysis on static data, either from a core dump, bit to bit imaging etc. Recently we have seen an increased focus directed at the live forensics environment. As users rely more on mobile and other remote devices to access data on demand; data possibly held in some manner of cloud environment, investigators will have to adapt their mode of investigations to suit. I recall reading a marketing pitch a while aback where some vendor claimed that an advantage of Cloud Computing is, an ability to conduct live forens... (more)

Identity and Access Management - An Introduction

With the advent of Web 2.0 and onward, the rise of the terminology and concept we call Cloud Computing, coupled with an increase in the manner technologies are being used, not only by corporations but by individuals as well, comes an increased drive to ensure that risk is managed, effective security measures to protect identities are implemented, and efforts are expended to ensure privacy is maintained. A few years ago, in their quest to implement and maximize on the benefits of Service-Oriented Architecture (SOA), researchers at Microsoft separated SOA into four areas (1) viz. ... (more)

The Impact of Airport X-Ray Technologies - Part 1

Over the last three weeks due to the nature of my IT security job, I have traveled through major airports at least eight times. With all the commotion recently regarding the airports new back-scatter X-ray machines (privacy, health, etc.) I wanted a firsthand look/feel at this experience. While I am sensitive to and an advocate for issues of privacy regarding persons with medical conditions and children, at 15 pounds overweight I don't think any airport security personnel will take pleasure in looking at a scanned image of me. Far from it, I hope I don't give them any nightmares... (more)