Reader small image

You're reading from  Cloud Forensics Demystified

Product typeBook
Published inFeb 2024
Reading LevelN/a
PublisherPackt
ISBN-139781800564411
Edition1st Edition
Languages
Tools
Concepts
Right arrow
Authors (2):
Ganesh Ramakrishnan
Ganesh Ramakrishnan
author image
Ganesh Ramakrishnan

Ganesh Ramakrishnan is a senior manager at KPMG Canada's Incident Response team, with over 12 years of incident response experience. He leads a dynamic team focused on responding to and managing incidents for organizations across various industry sectors, working with KPMG's incident response teams globally. He has led numerous incident response cases, including high-profile ones, and collaborated with law enforcement agencies worldwide. Apart from assisting organizations during crises, Ganesh also helps them prepare for incidents and educates them on handling them. Ganesh has a master's in computer application and an MSc in network and information security. He also holds CISSP, SANS GCFA, and SANS GNFA certifications.
Read more about Ganesh Ramakrishnan

Mansoor Haqanee
Mansoor Haqanee
author image
Mansoor Haqanee

Mansoor Haqanee is a manager with KPMG Canada's Forensic Technology team, with over six years of experience in software development, computer forensics, and incident response. Mansoor has a background in electrical engineering with a bachelor of engineering from Toronto Metropolitan University (formerly Ryerson University). Combining his education with both software development and computer forensic experience, he is equipped to provide organizations with insights into the security of their assets. Mansoor has provided technology consulting services to a wide range of industries in the education, financial services, healthcare, telecommunications, manufacturing, and government sectors, to name a few.
Read more about Mansoor Haqanee

View More author details
Right arrow

Summary

To summarize, the basic principles for collecting forensic artifacts, disk images, and memory dumps are similar when investigators have access to the operating system. The process is very similar if they have access to a computer or a device as part of the investigation. What is more important to learn are the steps to gain safe access to an operating system during an incident response situation.

Debunking cloud forensic acquisition is key; however, investigators must familiarize themselves with getting access to the full disk without making significant modifications to the instance, such as adding a new empty disk or installing tools only to create a full disk image and jumping through the challenges of exporting. Most cloud services have the option to snapshot your entire disk; this allows for more accessible collections. As for memory dump, unfortunately, there is no better option than jumping on the infected machine and running tools to dump memory. It is important for...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Cloud Forensics Demystified
Published in: Feb 2024Publisher: PacktISBN-13: 9781800564411

Authors (2)

author image
Ganesh Ramakrishnan

Ganesh Ramakrishnan is a senior manager at KPMG Canada's Incident Response team, with over 12 years of incident response experience. He leads a dynamic team focused on responding to and managing incidents for organizations across various industry sectors, working with KPMG's incident response teams globally. He has led numerous incident response cases, including high-profile ones, and collaborated with law enforcement agencies worldwide. Apart from assisting organizations during crises, Ganesh also helps them prepare for incidents and educates them on handling them. Ganesh has a master's in computer application and an MSc in network and information security. He also holds CISSP, SANS GCFA, and SANS GNFA certifications.
Read more about Ganesh Ramakrishnan

author image
Mansoor Haqanee

Mansoor Haqanee is a manager with KPMG Canada's Forensic Technology team, with over six years of experience in software development, computer forensics, and incident response. Mansoor has a background in electrical engineering with a bachelor of engineering from Toronto Metropolitan University (formerly Ryerson University). Combining his education with both software development and computer forensic experience, he is equipped to provide organizations with insights into the security of their assets. Mansoor has provided technology consulting services to a wide range of industries in the education, financial services, healthcare, telecommunications, manufacturing, and government sectors, to name a few.
Read more about Mansoor Haqanee