Summary: | 碩士 === 國防大學管理學院 === 資訊管理學系 === 101 === It is Extremely rapid development of cloud computing applications . Each cloud service providers have been developed numbers of applications and services in recent years. However, cloud computing is a new generation of technology transfer developed from internet. It is not only having the characteristics of the network but also inherited its weaknesses. Especially virtualization, regulations, data privacy, and other issues further make digital forensics work difficult.
The purpose of this study was to correspond the four-oriented from digital evidence forensics standard operate procedure (DEFSOP) which published by domestic scholars Professor Lin Yi long for 24 security risks proposed by the European Network and Information Security Agency(ENISA), and comprehensive various cloud threat corresponding tools, strategies to discussion of the risk assessment of the security of cloud service.
Furthermore, based on the above theoretical to propose Integrative Digital Evidence Forensics Standard Operate Procedure for Cloud Threats (I-DEFSOP) to solve the problems faced by the cloud forensics. Finally, verifying the I-DEFSOP’s integrity, reliability and validity by the Delphi expert survey.
|