The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Hack the Cloud: Ethical Hacking and Cloud Forensics
Abstract
The goal of this chapter is to explain the challenges that the forensic investigator faces when investigating Cloud Crime and how they can learn from the techniques used by Ethical Hackers to improve their investigation technique. The security threat posed by hackers on the Internet is constantly evolving. Cloud computing provides new avenues for hackers to exploit organizations, giving rise to new classes of vulnerability, and new security challenges. The forensic investigator must learn to “think like a hacker” so that they can reconstruct the path the hacker takes through the cloud environment. This chapter will explain how an Ethical Hacker works, how the Ethical Hacker views the Cloud, and in doing so illustrate the new challenges facing a forensic investigator.
Related Content
Hossam Nabil Elshenraki.
© 2024.
23 pages.
|
Ibtesam Mohammed Alawadhi.
© 2024.
9 pages.
|
Akashdeep Bhardwaj.
© 2024.
33 pages.
|
John Blake.
© 2024.
12 pages.
|
Wasswa Shafik.
© 2024.
36 pages.
|
Amar Yasser El-Bably.
© 2024.
12 pages.
|
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav.
© 2024.
23 pages.
|
|
|