cloud forensics
Recently Published Documents


TOTAL DOCUMENTS

112
(FIVE YEARS 34)

H-INDEX

12
(FIVE YEARS 2)

2021 ◽  
pp. 145-160
Author(s):  
Ronald L. Krutz
Keyword(s):  

Author(s):  
Kinjal Bhagariya ◽  
Dr. Ravi Sheth ◽  
Ms. Dharati Dholariya

We are aware that cloud computing evolves as a transformative and No Doubt helpful field for futures generations on account of its several economic benefits in each domain as well as commercial, public, governmental, organizational, etc. Cloud forensics one of the most important areas within the developing field is that the means that investigators conduct researches in the relevant ways in which a digital crime took place over the cloud. This area is known as cloud forensics. Cloud forensics is a relevant field that works on all of this problem. This paper gives an overall research perspective of cloud forensics including its logging measures that need forensics challenges and what is the help of the cybercrime investigation and preventing for cloud forensics and the currently available solutions.


Author(s):  
Alicia Leslie-Jones

Cybersecurity is an ever-evolving area of technology. As such, there will always be myriad trends to consider. Through the progression of cybersecurity comes the increased need for organizations to keep pace with the rapid development of technology. However, the current skills gap of cybersecurity professionals has overwhelmingly become a cause for concern. The spread of cloud computing has created a need for new cloud forensics procedures, and the use of internet-connected medical devices has added concerns for the information security structure of many organizations. In order to resolve these issues, proper vulnerability testing and implementation of new processes to keep up with the changes in technology have to be introduced to reduce the possibility of hacking incidents and aid in remediation. If more organizations leverage the skills and personnel available to them, there are ways to reduce the skills gap and other issues affecting cybersecurity.


Sign in / Sign up

Export Citation Format

Share Document