Solved

Forensic computing Research Project

Posted on 2010-09-21
10
847 Views
Last Modified: 2012-05-10
Hi

Please could you give me some project ideas for a forensic computing research project.

I have thought about something to do on Cloud computing and the impact it has in forensic computing, But thinking this might be a bit to less, please could you give some ideas.

Thnx
0
Comment
Question by:mc87
10 Comments
 
LVL 29

Accepted Solution

by:
Rich Weissler earned 250 total points
ID: 33729105
This might be a topic you've already considered, but I still associate cloud computing with distributed applications like the SETI program and the descendants of that effort, which I imagine would be hard to collect evidence on, but I would hope there would be limited need to collect evidence.

But today, there would seem to be a trend towards the acceptance of outsourcing IT services which I wouldn't have considered possible a decade ago -- Email and potentially business-critical database applications.  Both of which would, I assume, have a far greater potential for the need to collect forensic evidence with a decreased ability of organizations to touch the systems needed to do so.  What facilities do hosting companies make available to their clients or law enforcement agencies for the inevitable requests.


0
 
LVL 8

Expert Comment

by:jako
ID: 33732679
how about setting up a scale of confidence and method establishing how sure one is that a piece of code has been stolen
a) using source
b) using suspect binary and stolen source
0
 

Author Comment

by:mc87
ID: 33732893
the research project is for a bsc
0
 
LVL 29

Expert Comment

by:Rich Weissler
ID: 33733858
Okay.  You are looking for a better researched topic, less cutting edge?  How tied to cloud computing are you?

I don't know what topics would be have already been covered in a forensics program, but:

Have you considered topics in counter forensics techniques and recognizing them?
Alternate procedures for collecting evidence from newer technologies: eBooks, iPads, digital cameras.

0
 

Author Comment

by:mc87
ID: 33734241
I have not done much research on Cloud computing, The idea i think is ok but struggling with the bit of what i should concentrate on and how i should take it on. I mean what kind of methods should i use to gather research
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 29

Expert Comment

by:Rich Weissler
ID: 33734730
In that case, it might be worth picking one of the cloud computing systems, and explain that you are doing your BSc Research project in computer forensics on forensic methods appropriate in their environment, with an eye on how they might already be doing things that would protect customer data and assist law enforcement in the event of an investigation.  I suspect if you presented it as something they could use in their marketing or to lower the security concerns of potential customers, someone in the organization will doubtless bend over backwards to help you, possibly even providing an more detailed subtopic to concentrate on.  You may have to make contact with a couple organizations before you find one really willing to help.
0
 

Expert Comment

by:priteshjchauhan
ID: 33740332
In cloud virtual exchange servers - are they as secure as onsite physical boxes?
0
 
LVL 33

Expert Comment

by:shalomc
ID: 33742003
here is an idea related to cloud forensics: forensic tools that examine the file image of a virtual server, completely non-intrusively.
0
 
LVL 62

Assisted Solution

by:btan
btan earned 250 total points
ID: 33759423
Forensic of SCADA system on what to look out for and correlate with the private cloud within the organisation. What should be looking out for for event tracing, it is not the typical server-client configuration

Also cloud forensic would revolve identity tracing since user has a social presence, so how is forensic going to change as artefacts does not reside in client but probably in social network space.
 
just some thought
0
 

Author Closing Comment

by:mc87
ID: 33853417
answerd.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You may have a outside contractor who comes in once a week or seasonal to do some work in your office but you only want to give him access to the programs and files he needs and keep privet all other documents and programs, can you do this on a loca…
Is your company's data protection keeping pace with virtualization? Here are 7 dynamic ways to adapt to rapid breakthroughs in technology.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now