23. The information contained in this presentation does not break any intellectual property, nor does it provide detailed information that may be in conflict with any laws (hopefully...) :)6
214. By interconnecting these resources to the internal resources of a consumers’ datacenter, usually via virtual private network (VPN) connectivity.74
215.
216. They also negotiate relationships between various cloud providers and consumers.75
294. How do you get permission to test your application running on Amazon EC2 when the results of your testing could show you data from another client completely?108
295.
296. "In networking, black holes refer to places in the network where incoming traffic is silently discarded (or "dropped"), without informing the source that the data did not reach its intended recipient." - From Wikipedia109
438. Used to spawn instances of the EDPR agent. Example:IMAGE ami-54f3103d 173
439.
440. to brute an password composed of uppercase letters, lowercase letters, and the numbers 0-9, with a length of between 1 to 8 characters against a PGP ZIP file.174
484. This can be easily achieved using the on-demand feature of cloud.198
485.
486. Amazon Web Services is already providing a good forensic feature where it can provide a MD5 hash of every file that is on the cloud system.199
487.
488.
489. Virtualization of various entities like the applications and host systems, which once used to be in-house is now scattered on the cloud.201
490.
491. Since we are acquiring data from a virtual environment, the forensic investigator should have a clear and precise understanding of how they work and what files are interesting and required to acquire.202