دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Darren Quick. Ben Martini and Raymond Choo (Auth.)
سری:
ISBN (شابک) : 9780124199705
ناشر: Syngress
سال نشر: 2014
تعداد صفحات: 193
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 5 مگابایت
در صورت تبدیل فایل کتاب Cloud Storage Forensics به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب Cloud Storage Forensics نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب اولین چارچوب قانونی ابر مبتنی بر شواهد را ارائه میکند. با استفاده از سه سرویس ذخیره سازی ابری محبوب و یک سرویس ذخیره سازی ابری خصوصی به عنوان مطالعات موردی، نویسندگان نشان می دهند که چگونه می توان از چارچوب آنها برای تحقیق در مورد بقایای داده ها در سرورهای ذخیره سازی ابری و دستگاه های مشتری استفاده کرد، زمانی که کاربر روش های مختلفی را برای ذخیره سازی انجام می دهد. ، آپلود و به داده ها در ابر دسترسی پیدا کنید.
This book presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors demonstrate how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud.
Front Cover Cloud Storage Forensics Copyright Page Contents Acknowledgments About the Authors Forewords 1 Introduction Introduction Cybercrime and the cloud Challenges faced by law enforcement and government agencies Summary Structure of book and contributions to knowledge References 2 Cloud Storage Forensic Framework Introduction Cloud (storage) forensic framework Commence (Scope) Preparation Evidence source identification and preservation Collection Examination and analysis Presentation Complete Framework summary References 3 Microsoft SkyDrive Cloud Storage Forensic Analysis Introduction SkyDrive forensics: Windows 7 PC Commence (Scope) Preparation Evidence source identification and preservation Collection Examination and analysis Control—Base-VMs SkyDrive client software SkyDrive account when accessed via a browser Keyword search terms Directory listings Prefetch files Link files Thumbcache files Event log files Registry files $Recycle.Bin Data carve Browser analysis Metadata Network analysis System Volume Information Memory (RAM) analysis Eraser, CCleaner, and DBAN Presentation Analysis findings Complete SkyDrive forensics: Apple iPhone 3G Commence (Scope) Preparation Evidence source identification and preservation Collection Examination and analysis Control—Base-XRY SkyDrive accessed via the iOS Safari browser SkyDrive application used to access the research account Presentation Analysis findings Complete Case study Step 1—Commence (Scope) Step 2—Preparation Step 3—Evidence source identification and preservation Step 4—Collection Step 5—Examination and analysis Step 6—Presentation Step 7—Complete Conclusion References 4 Dropbox Analysis: Data Remnants on User Machines Introduction Dropbox forensics: Windows 7 PC Commence (Scope) Preparation Evidence source identification and preservation Collection Examination and analysis Web browser Dropbox account information Control—Base-VMs Dropbox client software Uninstallation of Dropbox client software Keyword search terms Directory listings Prefetch files Link files Registry Thumbcache Event logs Browser analysis Network traffic (PCAP) analysis Memory analysis Results of applying anti-forensic techniques (Eraser, CCleaner) Presentation Artifacts from windows client Volatile data capture Artifacts from browser Complete Dropbox forensics: Apple iPhone 3G Commence (Scope) Preparation Evidence source identification and preservation Collection Examination and analysis Control—Base-XRY Dropbox accessed via the iOS Safari browser Dropbox application used to access the research account Presentation Artifacts from iOS browser Artifacts from Dropbox iOS client software Complete Case study Step 1—Commence (Scope) Step 2—Preparation Step 3—Evidence source identification and preservation Step 4—Collection Step 5—Examination and analysis Step 6—Presentation Step 7—Complete Conclusion References 5 Google Drive: Forensic Analysis of Cloud Storage Data Remnants Introduction Google drive forensics: Windows 7 PC Commence (Scope) Preparation Evidence source identification and preservation Collection Examination and analysis Control—Base-VMs Google drive client software Google drive account when accessed via a browser Keyword search terms Directory listings Prefetch files Link files Thumbcache files Event log files Registry files $Recycle.Bin Data carve Browser analysis Metadata Network analysis System volume information Memory (RAM) analysis Eraser, CCleaner, and DBAN Presentation Analysis findings Complete Google drive forensics: Apple iPhone 3G Commence (Scope) Preparation Evidence source identification and preservation Collection Examination and analysis Control—Base-XRY Google drive accessed via the iOS Safari browser Presentation Analysis findings Complete Google drive case study Step 1—Commence (Scope) Step 2—Preparation Step 3—Evidence source identification and preservation Preservation (PC on scene) Analysis (PC on scene) Collection (iPhone on scene) Analysis (iPhone on scene) Preservation (laptop on scene) Analysis (laptop on scene) Transportation to lab Step 4—Collection Step 5—Examination and analysis Step 6—Presentation Step 7—Complete Conclusion Summary of Microsoft SkyDrive, Dropbox, and Google Drive findings References Appendix A 6 Open Source Cloud Storage Forensics: ownCloud as a Case Study Introduction Cloud forensics framework Outline Experiment setup ownCloud overview Environment configuration Findings Client forensics Evidence source identification and preservation, and collection Examination and analysis of client devices Reporting and presentation Server forensics Evidence source identification and preservation Collection Server examination and analysis Summary of findings Conclusion References 7 Forensic Collection of Cloud Storage Data: Does the Act of Collection Result in Changes to the Data or its Metadata? Introduction Cloud storage providers Dropbox Google Drive Microsoft SkyDrive Data collection via Internet access to a user account Dropbox Collection Analysis Browser dates and times Client software dates and times Client software log files Google Drive Collection Analysis Browser dates and times Client software dates and times Client software log files Microsoft SkyDrive Collection Analysis Browser dates and times Client software dates and times Client software log files Research findings: discussion File contents Dates and times Client software dates and times Browser dates and times Verification of findings Summary Conclusion References 8 Conclusion and Future Work Research summary Future work Glossary Index