Challenges Incident Handlers Face when Resources are at cloud environment
The cloud environment has resources that are shared by many users; it is challenging for incident handlers to get free resources that are not paid for (Alex at el 2017). When resources are shared by many people, users make it complex to find it. When it comes to the cloud environment, incident handlers must have the basics of cloud computing plus configurations and the infrastructure of the cloud. It will be time-consuming and expensive for the incident handlers to learn the basics of cloud computing in order to operate the services. Through learning all the basics of cloud computing is a hectic activity for the incident handlers to conduct in order to get the information that they want.
The cloud services have security parameters that are a challenge for the incident handlers to manage. The many security features are put in place because cloud computing has many technologies that involve networks, databases, operating systems, virtualizations resource scheduling (Aziz at el 2017). The incident handlers will have a harsh time trying to identify incidents when resources have been moved to the cloud environment. Sometimes the system may crash, and network packets floods and unauthorized utilization may take place, thus resulting in loss of sensitive resources of an organization (Kebande at el 2018). There are also safety policies that will block incident handlers from accessing the funds when they have no full rights of accessing the resources. The security parameters that are being enforced, they have restrictions on accessing the services that are being offered by the cloud.
The cloud services have security parameters that are a challenge for the incident handlers to manage. The many security features are put in place because cloud computing has many technologies that involve networks, databases, operating systems, virtualizations resource scheduling (Aziz at el 2017). The incident handlers will have a harsh time trying to identify incidents when resources have been moved to the cloud environment. Sometimes the system may crash, and network packets floods and unauthorized utilization may take place, thus resulting in loss of sensitive resources of an organization (Kebande at el 2018). There are also safety policies that will block incident handlers from accessing the funds when they have no full rights of accessing the resources. The security parameters that are being enforced, they have restrictions on accessing the services that are being offered by the cloud.
The cloud services have security parameters that are a challenge for the incident handlers to manage. The many security features are put in place because cloud computing has many technologies that involve networks, databases, operating systems, virtualizations resource scheduling (Aziz at el 2017). The incident handlers will have a harsh time trying to identify incidents when resources have been moved to the cloud environment. Sometimes the system may crash, and network packets floods and unauthorized utilization may take place, thus resulting in loss of sensitive resources of an organization (Kebande at el 2018). There are also safety policies that will block incident handlers from accessing the funds when they have no full rights of accessing the resources. The security parameters that are being enforced, they have restrictions on accessing the services that are being offered by the cloud.
Reference
Alex, M. E., & Kishore, R. (2017). Forensics framework for cloud computing. Computers & Electrical Engineering, 60, 193-205.Retrieved from: https://www.sciencedirect.com/science/article/pii/S0045790617302689
Aziz, A. S. A., Fouad, M. M., & Hassanien, A. E. (2017). Cloud computing forensic analysis: trends and challenges. In Multimedia Forensics and Security (pp. 3-23). Springer, Cham. Retrieved from: https://link.springer.com/chapter/10.1007/978-3-319-44270-9_1
Kebede, V. R., & Venter, H. S. (2018). On digital forensic readiness in the cloud using a distributed agent-based solution: issues and challenges. Australian Journal of Forensic Sciences, 50(2), 209-238.Retrieved from: https://www.tandfonline.com/doi/abs/10.1080/00450618.2016.1194473