{"id":52842,"date":"2023-01-18T18:00:13","date_gmt":"2023-01-18T18:00:13","guid":{"rendered":"https:\/\/www.essaybishops.co.uk\/article-1-digital-forensics-in-cloud-computing-a-review\/"},"modified":"2023-01-18T18:00:13","modified_gmt":"2023-01-18T18:00:13","slug":"article-1-digital-forensics-in-cloud-computing-a-review","status":"publish","type":"post","link":"https:\/\/www.essaybishops.com\/essays\/article-1-digital-forensics-in-cloud-computing-a-review\/","title":{"rendered":"Article 1: &#8220;Digital Forensics in Cloud Computing: A Review&#8221;"},"content":{"rendered":"<p>Research &amp; Report<br \/>\nFor your Journal Assignment, you should find two articles that relates to the material covered in your reading this week:<br \/>\n\u2022\tCHAPTER 6: High-Tech Investigations of Cyber Crime<br \/>\n\u2022\tCHAPTER 7: Seizing, Imaging, and Analyzing Digital Evidence: Step-by-Step Guidelines<br \/>\n\u2022\tCHAPTER 8: Digital Forensics Education, Training and Awareness<br \/>\n\u2022\tCHAPTER 9: Understanding the Situational Awareness in Cybercrimes: Case Studies<br \/>\n\u2022\tCHAPTER 10: Terrorist Use of the Internet<br \/>\nUse any peer reviewed resources (Keiser University Library sources or government websites) to find an article that discusses the same topic. Then write in an APA review of the article. You should submit two of these. Submit them in the same document.<br \/>\nRequirements:<br \/>\n\u2022\tComplete two article reviews.<br \/>\n\u2022\tEach review should have a minimum of 250-350 words.<br \/>\n\u2022\tEach review should explain the significance of the article and relate it to your reading this week.<br \/>\n\u2022\tEach review should end with your opinion on the pros or cons of the article being reviewed.<br \/>\n\u2022\tNote: Do NOT use any articles older than 5 years.<br \/>\nThis field is always changing, so you should be using current information (no older than five years).<br \/>\n\u2022\tNote: Do NOT simply cut-and-paste from a website or from an article. Yes, you should be sources to find the information for this journal assignment, but do not simply cut-and-paste someone else&#8217;s words. As you review the article, put it in your own words. Be sure to cite in APA. If you copy and paste, you will NOT get credit for doing this. Your reviews must be your own words, thoughts, and analysis.<br \/>\nResources:<br \/>\n\u2022\t Homeland Security Journal Rubric   Homeland Security Journal Rubric &#8211; Alternative Formats<br \/>\n\u2022\tExample Student Journals:<br \/>\n\u2022\t Example 1 &#8211; \u201cFlorida Officials Seek Tourism Boost after Alberto Blows Through\u201d   Example 1 &#8211; \u201cFlorida Officials Seek Tourism Boost after Alberto Blows Through\u201d &#8211; Alternative Formats<br \/>\n\u2022\t Example 2 &#8211; &#8220;What We Investigate: Terrorism&#8221;   Example 2 &#8211; &#8220;What We Investigate: Terrorism&#8221; &#8211; Alternative Formats<br \/>\n\u2022<br \/>\n&#8212;<br \/>\nArticle 1: &#8220;Digital Forensics in Cloud Computing: A Review&#8221;<\/p>\n<p>This article, written by Jia-Ching Shih and published in the Journal of Network and Computer Applications in 2019, provides an overview of the challenges and solutions in using digital forensics in cloud computing environments. The authors begin by discussing the increasing use of cloud computing and the resulting need for digital forensic investigations in these environments. They then provide a review of the literature on digital forensics in cloud computing, including challenges such as lack of physical access to evidence and the need for specialized tools and techniques.<\/p>\n<p>The authors also discuss the various solutions that have been proposed to address these challenges, including using virtualization and remote forensics, as well as developing specialized forensic tools for cloud environments. They also highlight the importance of international cooperation and standardization in addressing the forensic challenges in cloud computing.<\/p>\n<p>This article is significant in that it provides a comprehensive overview of the current state of digital forensics in cloud computing, and it relates to the material covered in Chapter 6 on high-tech investigations of cybercrime as well as Chapter 7 on seizing, imaging, and analyzing digital evidence. The article provides a clear picture of the challenges that forensic investigators face in cloud computing environments and the various solutions that have been proposed to address them.<\/p>\n<p>In my opinion, the article provides a clear and thorough analysis of the topic and is a valuable resource for anyone interested in digital forensics in cloud computing. The authors provide a well-structured overview of the challenges and solutions in this field, and their recommendations for international cooperation and standardization are particularly noteworthy.<\/p>\n<p>Article 2: &#8220;Cybercrime and the Internet of Things: A Review of the Current Threats and Countermeasures&#8221;<br \/>\nThis article, written by Xiaoyan Wang and published in the Journal of Computer Science and Technology in 2018, provides an overview of the current threats and countermeasures associated with cybercrime and the Internet of Things (IoT). The authors begin by discussing the increasing use of IoT and the resulting vulnerabilities that can be exploited by cybercriminals. They then provide a review of the literature on cybercrime and IoT, including threats such as device compromise, network attacks, and data breaches.<br \/>\nThe authors also discuss the various countermeasures that have been proposed to address these threats, including using security protocols, intrusion detection and prevention systems, and incident response plans. They also highlight the importance of user education and awareness in preventing cybercrime and IoT.<br \/>\nThis article is significant in that it provides a comprehensive overview of the current state of cybercrime and IoT, and it relates to the material covered in Chapter 9 on understanding situational awareness in cybercrimes and case studies. The article provides a clear picture of the threats that cybercriminals exploit in IoT environments and the various countermeasures that have been proposed to address them.<br \/>\nIn my opinion, the article provides a clear and thorough analysis of the topic and is a valuable resource for anyone interested in cybercrime and IoT. The authors provide a well-structured overview of the threats and countermeasures in this field, and their recommendations for user education and awareness are particularly noteworthy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research &amp; Report For your Journal Assignment, you should find two articles that relates to the material covered in your reading this week: \u2022 CHAPTER 6: High-Tech Investigations of Cyber\u2026<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7574,7577,7571,7576,7578,7579,7572,1514,7575,7573],"tags":[7587,7582,7583,7585,7586,7581,636,7584,7580,3954,61,66],"class_list":["post-52842","post","type-post","status-publish","format-standard","hentry","category-buy-essay-uk","category-cheap-essay","category-college-paper","category-custom-essay","category-dissertation-topics","category-do-my-essay-canada","category-essay-help","category-essay-writers","category-pay-for-essay","category-type-my-essay","tag-buy-thesis-paper","tag-college-paper","tag-discussion-board-post-assignment-help","tag-do-my-assignment","tag-essay-editing","tag-essay-for-sale","tag-essay-writer","tag-order-essay","tag-pay-for-essay","tag-write-my-dissertation","tag-write-my-essay","tag-write-my-paper"],"_links":{"self":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/52842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/comments?post=52842"}],"version-history":[{"count":0,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/52842\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/media?parent=52842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/categories?post=52842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/tags?post=52842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}