eCite Digital Repository

Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud' - a forensic computing perspective

Citation

Broucek, V and Turner, P, Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the 'cloud' - a forensic computing perspective, Journal of Computer Virology and Hacking Techniques, 9, (1) pp. 27-33. ISSN 1772-9890 (2013) [Refereed Article]

Copyright Statement

Copyright 2012 Springer-Verlag France

DOI: doi:10.1007/s11416-012-0173-0

Abstract

While hype around the benefits of ‘cloud computing’increase, challenges in maintaining data security and data privacy have also been recognised as significant vulnerabilities (Ristenpart et al. in Proceedings of the 14th ACM conference on computer and communications security, pp 103–115, 2009; Pearson in CLOUD’09, pp 44–52, 2009;Vouk in JComput InfTechnol 4:235–246, 2008). These vulnerabilities generate a range of questions relating to the capacity of organisations relying on cloud solutions to effectively manage risk. This has become particularly the case as the threats faced by organisations have moved increasingly away from indiscriminate malware to more targeted cyberattack tools. From forensic computing perspective it has also been recognised that ‘cloud solutions’ pose additional challenges for forensic computing specialists including discoverability and chain of evidence (Ruan et al. in Adv Digital Forensics VII:35–46, 2011; Reilly et al. in Int J Multimedia Image Process 1:26–34, 2011). However, to date there has been little consideration of how the differences between indiscriminate malware and targeted cyber-attack tools further problematize the capacity of organisations to manage risk. This paper also considers these risks and differentiates between technical, legal and ethical dilemmas posed. The paper also highlights the need for organisations to be aware of these issues when deciding to move to cloud solutions.

Item Details

Item Type:Refereed Article
Keywords:forensic computing, cyber-attack, cloud computing
Research Division:Information and Computing Sciences
Research Group:Information Systems
Research Field:Interorganisational Information Systems and Web Services
Objective Division:Information and Communication Services
Objective Group:Computer Software and Services
Objective Field:Computer Software and Services not elsewhere classified
Author:Broucek, V (Dr Vlasti Broucek)
Author:Turner, P (Associate Professor Paul Turner)
ID Code:88519
Year Published:2013
Deposited By:Computing and Information Systems
Deposited On:2014-02-05
Last Modified:2017-11-13
Downloads:0

Repository Staff Only: item control page