Digital Forensic in The Cloud (BSIT400 week11 )

Computer security is inspired by the methods of investigation





As part of a police investigation, you often respond to simple questions (Who? When? What? Where?) And go through the analysis of hard drives, mobile phones or USB sticks. A device that integrates collection capabilities, research, analysis of digital evidence. These are techniques hitherto largely reserved for institutions such as the police or the police, the official. And that open today in the corporate world. This in order to go more easily to the source of the incident which shook its information system: litigation, crisis management, acts of malice, fraud, or simple computer attack.

A data analysis to respect the legal framework

Take the case of a theft of documents affecting sensitive data of a company. Once the hard drives and copies the memory of a computer realized, all files will be transferred into the Digital Forensics Framework software. Then launches analysis modules to search for traces of such transfers. Once this information has identified the software generates a technical report may, if necessary, be the basis of further judicial investigations. " It is important that the company still remains within the legal framework," insists Solal Jacob founder of ArxSys . " No way to view data and personal directories of employees if this was not provided for by an internal charter to the company concerned ." However, without opening a particular document, it is possible to search by keywords. To locate some data and transmit this information to a competent judicial authority.

All-in-one

As regards the technical aspect, Digital Forensics Framework is an open source solution. " Which means that we allow the user to know how the program works, to be certain that it does not contain backdoors or viruses, or even algorithms mistakes ." A damaging incident in digital evidence analysis software when making ' false positives ' - that is to say, provides an incorrect result on a decision with two choices - by failing to mention the course or conditions deleting a file. Note that the device is also as a cross-platform solution, in that it allows through various developed pilot launch in the same program data analysis on multiple devices (PC running Windows or Linux penny, phones portable, keyUSB ...). ArxSys was awarded the Innovation Award at the Assizes of security, who stood last week in Monaco.

Posted by Ed
Find out more:
Cloud computing crime poses unique forensics challenges

Share on Google Plus

About dhoow

This is a short description in the author block about the author. You edit it by entering text in the "Biographical Info" field in the user admin panel.

0 comments:

Post a Comment