IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Hack the Cloud: Ethical Hacking and Cloud Forensics

Hack the Cloud: Ethical Hacking and Cloud Forensics
View Sample PDF
Author(s): Mark Crosbie (IBM, Ireland)
Copyright: 2013
Pages: 17
Source title: Cybercrime and Cloud Forensics: Applications for Investigation Processes
Source Author(s)/Editor(s): Keyun Ruan (University College Dublin, Ireland)
DOI: 10.4018/978-1-4666-2662-1.ch002

Purchase

View Hack the Cloud: Ethical Hacking and Cloud Forensics on the publisher's website for pricing and purchasing information.

Abstract

The goal of this chapter is to explain the challenges that the forensic investigator faces when investigating Cloud Crime and how they can learn from the techniques used by Ethical Hackers to improve their investigation technique. The security threat posed by hackers on the Internet is constantly evolving. Cloud computing provides new avenues for hackers to exploit organizations, giving rise to new classes of vulnerability, and new security challenges. The forensic investigator must learn to “think like a hacker” so that they can reconstruct the path the hacker takes through the cloud environment. This chapter will explain how an Ethical Hacker works, how the Ethical Hacker views the Cloud, and in doing so illustrate the new challenges facing a forensic investigator.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom