The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent attacks on the cloud environment highlights the necessity for conducting forensic investigations. But performing forensics in the cloud is different from traditional environment. Conforming the same, National Institute of Standards and Technology (NIST) listed more than 65 challenges for cloud forensics. Even though cloud is a XaaS provider, Forensics-as-a-Service was not included in that list...
The popularity and usage of the cloud for both commercial and non-commercial purposes has grown exceptionally. This triggered researchers around the world to focus on performing forensic investigation in cloud environment. Recently, the National Institute of Standards and Technology had collected, categorized and listed various architectural, acquisition, analysis and legal issues in cloud forensics...
Cloud computing is a fast developing technology widely used across industry as well as academia. With the growing popularity of cloud services, the probability of attacks on cloud systems has also gone up drastically. As a result there is a growing demand for enabling cloud systems with forensic capabilities. But, existing digital forensic techniques cannot be directly applied to cloud environments...
Cloud computing has emerged as a technology in demand both from the industry as well as from the academia's perspectives. Wide spread use of cloud computing has not reached its potential owing to various challenges - security being the foremost one. Customers still hesitate to trust the cloud environment as they feel that security mechanisms are inadequate. Building trust on the Cloud Service Providers...
Wireless networks is still an emerging field in terms of security. Taking advantage from unreliability nature of wireless medium, antagonists can easily accomplish numerous attacks. Among those attacks, selective jamming is more clever technique in which jammer will target and corrupt only the messages of high importance. There are existing methods to prevent selective jamming in internal threat model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.