SlideShare ist ein Scribd-Unternehmen logo
1 von 10
NIST Cloud Computing
Forum and Workshop VIII
Dr. Martin Herman
ITL Senior Advisor for Forensics and IT
Information Technology Laboratory (ITL)
National Institute of Standards & Technology
NIST Cloud Computing Forum and Workshop VIII
July 2015
Cloud Computing Forensic Science
‱  Application of science and technology to
investigation and establishment of facts of
interest within cloud environments for
–  Courtroom
‱  Criminal investigation and prosecution (e.g., child
exploitation, drug dealings, terrorism, cyber attacks,
data breaches, insider theft)
‱  Civil litigation (e.g., e-discovery in lawsuits, insurance
claims)
–  Regulatory compliance (e.g., auditing)
–  Internal business policy violations
‱  Within an enterprise (e.g., HR privacy violations,
employee computer misuse)
–  Cybersecurity (incident response)
‱  Mitigate future cyber attacks, prevent system failure,
minimize data loss
NIST Cloud Computing Forum and Workshop VIII
July 2015
NIST Activities
‱  Chair of the Cloud Computing Forensic Science
Working Group
‱  Long-term goals:
–  Determine challenges in cloud forensics
‱  Forensics applied to artifacts/evidence found in the
cloud (as opposed to using the cloud to perform
forensic analysis on data from other sources)
‱  Identify, aggregate, analyze challenges
–  Prioritize challenges
–  Determine gaps in technology, standards and
measurements to address these challenges
–  Develop a roadmap to address these challenges
NIST Cloud Computing
Forum and Workshop VIII
5. Lack of Transparency
4. Deletion in the Cloud
7. Use of Metadata
1. Confidentiality 3. E-Discovery
8. Geo-location
9. Data Integrity
10. Recovering
Overwritten Data
6. Timestamp
2. Root of Trust
11. Data Chain of Custody
12.Chain of Dependencies13. Resource
Seizure
14.Secure
Provenance
15. Chain of Dependencies
16.Locating Evidence17.Evidence Identification
NIST Cloud Computing Forum and Workshop VIII
Cloud Computing Forensic Science
Challenges
‱  Challenges related to:
Architecture
e.g., Segregation of potential
evidence in a multi-tenant system
Data collection
e.g., Recovery of deleted data in a
shared and distributed virtual
environment;
e.g., E-Discovery
Analysis of forensic data
e.g., Evidence correlation across
multiple cloud Providers
Anti-forensics
e.g., Malicious code may
circumvent virtual machine
isolation methods
‱  Challenges related to:
Incident first responders
e.g., Confidence, competence, and
trustworthiness of the cloud
providers to act as first-responders
and perform data collection
Role management
e.g., Ease of anonymity and
creating false personas online
Legal issues
e.g., Ease of anonymity and
creating false personas online
Standards
e.g., Lack of test and validation
procedures
Training
e.g., Lack of test and validation
procedures
NIST Cloud Computing Forum and Workshop VIII
July 2015
Mindmap (PRIMARY)
NIST Cloud Computing Forum and Workshop VIII
July 2015
Assessment	
  of	
  Importance	
  
NIST Cloud Computing Forum and Workshop VIII
Highest Priority Challenges & Scores
10 Confidentiality and PII
9 Root of trust
9 E-discovery
8 Deletion in the cloud
8 Lack of transparency
7 Timestamp synchronization
7 Use of metadata
7 Multiple venues and
geolocations
7 Data integrity and evidence
preservation
6 Recovering overwritten data
6 Cloud confiscation and
resource seizure
6 Potential evidence
segregation
6 Secure provenance
6 Data chain of custody
6 Chain of dependencies
6 Locating evidence
6 Locating storage media
6 Evidence identification
6 Dynamic storage
6 Live forensics
6 Resource abstraction
6 Ambiguous trust boundaries
6 Cloud training for
investigators
From	
  NIST	
  IR	
  8006:	
  DRAFT	
  NIST	
  Cloud	
  Compu1ng	
  Forensic	
  Science	
  Challenges	
  
h;p://csrc.nist.gov/publica1ons/PubsNISTIRs.html	
  
	
  	
  
NIST Cloud Computing Forum and Workshop VIII
Use Case Template
Cloud forensic challenge highlighted by this use case:
Title of use case:
Description of use case:
Forensic evidence relevant to use case:
Relevance to the cloud forensic challenge:
The role of each cloud stakeholder in the forensic
investigation:
Cloud Service Consumer (Enterprise):
Cloud Service Consumer (Individual):
Cloud Service Provider:
Cloud Broker (Technical):
Cloud Broker (Business):
Cloud Carrier:
Cloud Auditor (Law enforcement):
Cloud Auditor (Government regulators):
Cloud Auditor (Accreditation & certification bodies):
Cloud Auditor (Forensics lab practitioners):
How do the cloud stakeholders work together in the
forensic investigation?
The role of client endpoints:
What is effect of different cloud service/deployment
models?
IaaS Public:
IaaS Private:
IaaS Hybrid:
IaaS Community:
PaaS Public:
PaaS Private:
PaaS Hybrid:
PaaS Community:
SaaS Public:
SaaS Private:
SaaS Hybrid:
SaaS Community:
What technical, legal and best practices elements are
needed to achieve a successful forensic investigation in
this use case?
Technical (technology and technical standards):
Legal:
Best practices:
For the technical elements, what are the gaps in
technology and standards?
NIST Cloud Computing Forum and Workshop VIII
July 2015
Today’s Agenda
‱  Will focus on several of the top challenges
–  Cloud E-Discovery
–  Root of trust
–  Deletion in the cloud
–  Timestamp synchronization
–  Data integrity & evidence preservation
‱  Will also discuss other areas of interest in cloud
forensics
–  Data governance in the cloud
–  Forensics in stealth and dark clouds
–  Cloud forensics architecture

Weitere Àhnliche Inhalte

Was ist angesagt?

Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptxAjit Wadhawan
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 

Was ist angesagt? (20)

Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
Cloud security
Cloud securityCloud security
Cloud security
 
Security attacks
Security attacksSecurity attacks
Security attacks
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Cloud security
Cloud securityCloud security
Cloud security
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Soc
SocSoc
Soc
 

Ähnlich wie Cloud Computing Forensic Science

Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfamallblitz0
 
Cyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz AcademyCyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz Academytrashbin306
 
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"sharinblitz
 
Cloud Computing: Security, Privacy and Trust Aspects across Public and Privat...
Cloud Computing: Security, Privacy and Trust Aspects across Public and Privat...Cloud Computing: Security, Privacy and Trust Aspects across Public and Privat...
Cloud Computing: Security, Privacy and Trust Aspects across Public and Privat...Marco Casassa Mont
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityTech and Law Center
 
Data Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsData Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsCloud Standards Customer Council
 
SafeGov Cloud and Law Enforcement event - 31Jan13
SafeGov Cloud and Law Enforcement event - 31Jan13SafeGov Cloud and Law Enforcement event - 31Jan13
SafeGov Cloud and Law Enforcement event - 31Jan13Rick Holgate
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016Elsa Prieto
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRBMichael Zimmer
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMHector Del Castillo, CPM, CPMM
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 

Ähnlich wie Cloud Computing Forensic Science (20)

Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
 
Cyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz AcademyCyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz Academy
 
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
 
Cloud Computing: Security, Privacy and Trust Aspects across Public and Privat...
Cloud Computing: Security, Privacy and Trust Aspects across Public and Privat...Cloud Computing: Security, Privacy and Trust Aspects across Public and Privat...
Cloud Computing: Security, Privacy and Trust Aspects across Public and Privat...
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 
Data Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for StandardsData Residency: Challenges and the Need for Standards
Data Residency: Challenges and the Need for Standards
 
SafeGov Cloud and Law Enforcement event - 31Jan13
SafeGov Cloud and Law Enforcement event - 31Jan13SafeGov Cloud and Law Enforcement event - 31Jan13
SafeGov Cloud and Law Enforcement event - 31Jan13
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
Research, the Cloud, and the IRB
Research, the Cloud, and the IRBResearch, the Cloud, and the IRB
Research, the Cloud, and the IRB
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMMCloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
Cloud01: Best Practices for Virtual Cloud Security - H. Del Castillo, AIPMM
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 

Mehr von David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTDavid Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackDavid Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTDavid Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd editionDavid Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanDavid Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHSDavid Sweigert
 

Mehr von David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

KĂŒrzlich hochgeladen

(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...indiancallgirl4rent
 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Modelsindiancallgirl4rent
 
Hot Call Girl In Ludhiana đŸ‘…đŸ„” 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana đŸ‘…đŸ„” 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana đŸ‘…đŸ„” 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana đŸ‘…đŸ„” 9053'900678 Call Girls Service In LudhianaRussian Call Girls in Ludhiana
 
Call Girls Service Chandigarh Gori WhatsApp ❀7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❀7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❀7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❀7710465962 VIP Call Girls Chandi...Niamh verma
 
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...gragteena
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Call Girls Noida
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591adityaroy0215
 
💚😋Mumbai Escort Service Call Girls, â‚č5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, â‚č5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, â‚č5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, â‚č5000 To 25K With AC💚😋Sheetaleventcompany
 
Call Girls In ludhiana For Fun 9053900678 By ludhiana Call Girls For Pick...
Call Girls In  ludhiana  For Fun 9053900678 By  ludhiana  Call Girls For Pick...Call Girls In  ludhiana  For Fun 9053900678 By  ludhiana  Call Girls For Pick...
Call Girls In ludhiana For Fun 9053900678 By ludhiana Call Girls For Pick...Russian Call Girls in Ludhiana
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
 
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Girl Raipur đŸ“Č 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur đŸ“Č 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur đŸ“Č 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur đŸ“Č 9999965857 ヅ10k NiGhT Call Girls In Raipurgragmanisha42
 
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Niamh verma
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...Call Girls Noida
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknowgragteena
 
Russian Call Girls Lucknow â‚č7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow â‚č7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow â‚č7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow â‚č7.5k Pick Up & Drop With Cash Payment 8923113531 ...gurkirankumar98700
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
 

KĂŒrzlich hochgeladen (20)

(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
 
Hot Call Girl In Ludhiana đŸ‘…đŸ„” 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana đŸ‘…đŸ„” 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana đŸ‘…đŸ„” 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana đŸ‘…đŸ„” 9053'900678 Call Girls Service In Ludhiana
 
Call Girls Service Chandigarh Gori WhatsApp ❀7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❀7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❀7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❀7710465962 VIP Call Girls Chandi...
 
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
 
💚😋Mumbai Escort Service Call Girls, â‚č5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, â‚č5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, â‚č5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, â‚č5000 To 25K With AC💚😋
 
Call Girls In ludhiana For Fun 9053900678 By ludhiana Call Girls For Pick...
Call Girls In  ludhiana  For Fun 9053900678 By  ludhiana  Call Girls For Pick...Call Girls In  ludhiana  For Fun 9053900678 By  ludhiana  Call Girls For Pick...
Call Girls In ludhiana For Fun 9053900678 By ludhiana Call Girls For Pick...
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
 
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girl Raipur đŸ“Č 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur đŸ“Č 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur đŸ“Č 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur đŸ“Č 9999965857 ヅ10k NiGhT Call Girls In Raipur
 
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
 
Russian Call Girls Lucknow â‚č7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow â‚č7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow â‚č7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow â‚č7.5k Pick Up & Drop With Cash Payment 8923113531 ...
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 

Cloud Computing Forensic Science

  • 1. NIST Cloud Computing Forum and Workshop VIII Dr. Martin Herman ITL Senior Advisor for Forensics and IT Information Technology Laboratory (ITL) National Institute of Standards & Technology
  • 2. NIST Cloud Computing Forum and Workshop VIII July 2015 Cloud Computing Forensic Science ‱  Application of science and technology to investigation and establishment of facts of interest within cloud environments for –  Courtroom ‱  Criminal investigation and prosecution (e.g., child exploitation, drug dealings, terrorism, cyber attacks, data breaches, insider theft) ‱  Civil litigation (e.g., e-discovery in lawsuits, insurance claims) –  Regulatory compliance (e.g., auditing) –  Internal business policy violations ‱  Within an enterprise (e.g., HR privacy violations, employee computer misuse) –  Cybersecurity (incident response) ‱  Mitigate future cyber attacks, prevent system failure, minimize data loss
  • 3. NIST Cloud Computing Forum and Workshop VIII July 2015 NIST Activities ‱  Chair of the Cloud Computing Forensic Science Working Group ‱  Long-term goals: –  Determine challenges in cloud forensics ‱  Forensics applied to artifacts/evidence found in the cloud (as opposed to using the cloud to perform forensic analysis on data from other sources) ‱  Identify, aggregate, analyze challenges –  Prioritize challenges –  Determine gaps in technology, standards and measurements to address these challenges –  Develop a roadmap to address these challenges
  • 4. NIST Cloud Computing Forum and Workshop VIII 5. Lack of Transparency 4. Deletion in the Cloud 7. Use of Metadata 1. Confidentiality 3. E-Discovery 8. Geo-location 9. Data Integrity 10. Recovering Overwritten Data 6. Timestamp 2. Root of Trust 11. Data Chain of Custody 12.Chain of Dependencies13. Resource Seizure 14.Secure Provenance 15. Chain of Dependencies 16.Locating Evidence17.Evidence Identification
  • 5. NIST Cloud Computing Forum and Workshop VIII Cloud Computing Forensic Science Challenges ‱  Challenges related to: Architecture e.g., Segregation of potential evidence in a multi-tenant system Data collection e.g., Recovery of deleted data in a shared and distributed virtual environment; e.g., E-Discovery Analysis of forensic data e.g., Evidence correlation across multiple cloud Providers Anti-forensics e.g., Malicious code may circumvent virtual machine isolation methods ‱  Challenges related to: Incident first responders e.g., Confidence, competence, and trustworthiness of the cloud providers to act as first-responders and perform data collection Role management e.g., Ease of anonymity and creating false personas online Legal issues e.g., Ease of anonymity and creating false personas online Standards e.g., Lack of test and validation procedures Training e.g., Lack of test and validation procedures
  • 6. NIST Cloud Computing Forum and Workshop VIII July 2015 Mindmap (PRIMARY)
  • 7. NIST Cloud Computing Forum and Workshop VIII July 2015 Assessment  of  Importance  
  • 8. NIST Cloud Computing Forum and Workshop VIII Highest Priority Challenges & Scores 10 Confidentiality and PII 9 Root of trust 9 E-discovery 8 Deletion in the cloud 8 Lack of transparency 7 Timestamp synchronization 7 Use of metadata 7 Multiple venues and geolocations 7 Data integrity and evidence preservation 6 Recovering overwritten data 6 Cloud confiscation and resource seizure 6 Potential evidence segregation 6 Secure provenance 6 Data chain of custody 6 Chain of dependencies 6 Locating evidence 6 Locating storage media 6 Evidence identification 6 Dynamic storage 6 Live forensics 6 Resource abstraction 6 Ambiguous trust boundaries 6 Cloud training for investigators From  NIST  IR  8006:  DRAFT  NIST  Cloud  Compu1ng  Forensic  Science  Challenges   h;p://csrc.nist.gov/publica1ons/PubsNISTIRs.html      
  • 9. NIST Cloud Computing Forum and Workshop VIII Use Case Template Cloud forensic challenge highlighted by this use case: Title of use case: Description of use case: Forensic evidence relevant to use case: Relevance to the cloud forensic challenge: The role of each cloud stakeholder in the forensic investigation: Cloud Service Consumer (Enterprise): Cloud Service Consumer (Individual): Cloud Service Provider: Cloud Broker (Technical): Cloud Broker (Business): Cloud Carrier: Cloud Auditor (Law enforcement): Cloud Auditor (Government regulators): Cloud Auditor (Accreditation & certification bodies): Cloud Auditor (Forensics lab practitioners): How do the cloud stakeholders work together in the forensic investigation? The role of client endpoints: What is effect of different cloud service/deployment models? IaaS Public: IaaS Private: IaaS Hybrid: IaaS Community: PaaS Public: PaaS Private: PaaS Hybrid: PaaS Community: SaaS Public: SaaS Private: SaaS Hybrid: SaaS Community: What technical, legal and best practices elements are needed to achieve a successful forensic investigation in this use case? Technical (technology and technical standards): Legal: Best practices: For the technical elements, what are the gaps in technology and standards?
  • 10. NIST Cloud Computing Forum and Workshop VIII July 2015 Today’s Agenda ‱  Will focus on several of the top challenges –  Cloud E-Discovery –  Root of trust –  Deletion in the cloud –  Timestamp synchronization –  Data integrity & evidence preservation ‱  Will also discuss other areas of interest in cloud forensics –  Data governance in the cloud –  Forensics in stealth and dark clouds –  Cloud forensics architecture