![]() ![]() ![]() In this chapter, using pCloud (an extensively used online cloud storage service) as a case study, and we elaborate on different kinds of artifacts retrievable during a forensic examination. Therefore, it is vital for cyber forensics examiners to be equipped and informed about best methods for investigation of different cloud platforms. There are many ways for criminals to compromise cloud services ranging from nontechnical attack methods, such as social engineering, to deploying advanced malwares. This attracts the eyes of cyber criminals, since much valuable information such as user credentials and private customer records are stored in the cloud. ![]() Due to the flexibility, affordability, and portability of cloud storage, individuals and companies envisage cloud storage as one of the preferred storage media nowadays. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |