Mark Crosbie’s research while affiliated with IBM and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (4)


Hack the Cloud:
  • Chapter

January 2015

·

95 Reads

·

1 Citation

·

Mark Crosbie

The goal of this chapter is to explain the challenges that the forensic investigator faces when investigating Cloud Crime and how they can learn from the techniques used by Ethical Hackers to improve their investigation technique. The security threat posed by hackers on the Internet is constantly evolving. Cloud computing provides new avenues for hackers to exploit organizations, giving rise to new classes of vulnerability, and new security challenges. The forensic investigator must learn to “think like a hacker” so that they can reconstruct the path the hacker takes through the cloud environment. This chapter will explain how an Ethical Hacker works, how the Ethical Hacker views the Cloud, and in doing so illustrate the new challenges facing a forensic investigator.


Hack the Cloud

January 2013

·

33 Reads

·

4 Citations

The goal of this chapter is to explain the challenges that the forensic investigator faces when investigating Cloud Crime and how they can learn from the techniques used by Ethical Hackers to improve their investigation technique. The security threat posed by hackers on the Internet is constantly evolving. Cloud computing provides new avenues for hackers to exploit organizations, giving rise to new classes of vulnerability, and new security challenges. The forensic investigator must learn to “think like a hacker” so that they can reconstruct the path the hacker takes through the cloud environment. This chapter will explain how an Ethical Hacker works, how the Ethical Hacker views the Cloud, and in doing so illustrate the new challenges facing a forensic investigator.


Figure 1. Where is cloud forensics? 
Figure 2. Cloud forensic three-dimensional model 
Figure 4. Cloud forensic organizational structure 
Cloud forensics: An overview
  • Article
  • Full-text available

January 2011

·

35,948 Reads

·

145 Citations

Cloud computing is estimated to be one of the most transformative technologies in the history of computing. Cloud organizations, including the providers and customers of cloud services, have yet to establish a well-defined forensic capability. Without this they are unable to ensure the robustness and suitability of their services to support investigations of criminal activity. In this paper, we take the first steps towards defining the new area of cloud forensics, and analyze its challenges and opportunities.

Download

Cloud Forensics

January 2011

·

4,419 Reads

·

196 Citations

IFIP Advances in Information and Communication Technology

Cloud computing may well become one of the most transformative technologies in the history of computing. Cloud service providers and customers have yet to establish adequate forensic capabilities that could support investigations of criminal activities in the cloud. This paper discusses the emerging area of cloud forensics, and highlights its challenges and opportunities.

Citations (2)


... Finally, the investigation concludes with the preparation of technical reports outlining the findings. All results are documented to ensure transparency [27]. ...

Reference:

Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review
Cloud forensics: An overview

... 34 One of the basic functionalities of our modern vehicles is that they are suitable for communication with our mobile communication devices, or have a mobile communication channel themselves, typically for transmitting operating data sent to the manufacturer, for Software and Firmware Updates (Software Over 32 Ruan et al. 2011. 33 Forensics Colleges 2022; Ruan et al. 2011;Ruan et al. 2013;Joshi -Shubhakar Pilli 2016: 187-202. 34 Hendricks 2022Walsh 2021;Interpol 2021;Krasznay 2021;Munday 2021. ...

Cloud Forensics

IFIP Advances in Information and Communication Technology