Question: An anonymous attacker has set up a service in the cloud to store a large collection of contraband images and videos. The website allows users
An anonymous attacker has set up a service in the cloud to store a large collection of contraband images and videos. The website allows users to upload and download this content anonymously. He pays for his cloud services with a pre-paid credit card purchased with cash. This attacker encrypts his data in cloud storage, and he reverts his virtual webserver to a clean state daily. Law enforcement is tipped off to the website and wishes both to terminate the service and prosecute the criminal. Answer the following questions based on this scenario. a) Provide a list of potential digital evidence and media that the investigator is going to seize for possible forensic examination in this case study. How would you gain access to this evidence? [2+3= 5 Marks] b) Explain two acquisition methods that you should use in this situation. [5 Marks] c) Describe significant challenges with cloud forensics, including forensic acquisition and evidence preservation in this case study. [5 Marks] d) Explain what "anti-forensics" is, and provide detail on some anti-forensics tactics that could be used in this case study. [2+3=5 Marks] e) How should you proceed if the suspects computer is running?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
