Proposed computer forensic approach for cloud computing environment
The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducin...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Published: |
American Scientific Publishers
2016
|
Subjects: |