Cloud Computing (KRAUS)

Description

To prepare for this assignment, be sure you have completed the assigned reading for this week outlined both below and in your Weekly Overview.

Don't use plagiarized sources. Get Your Custom Assignment on
Cloud Computing (KRAUS)
From as Little as $13/Page

Before you begin, be sure to review the following resources:

Chapter 2: Computer Forensics Investigation Process
Section 1: Importance of Computer Forensic Process
Section 2: Phases involved in the Computer Forensic Investigation Process
Section 3: Pre-Investigation Phase
Mislan, R. P., & Wedge, T. (2008). Designing laboratories for small scale digital device forensics. Proceedings of the Conference on Digital Forensics, Security & Law, 81–88. http://libproxy.ecpi.edu:2048/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=i3h&AN=48870250&site=ehost-live.
Instructions
For this assignment, you will examine cloud computing. Watch the following presentation videos:
Cloud Computing: How it all Works Links to an external site.
Cloud Computing Security – Simply Speaking Links to an external site.
Law Enforcement Agencies, Cloud Computing, and Digital Evidence Documentation Security
Assignment QuestionsOnce you have watched the video presentations, write your responses to the following assignment items:
What are the risks of cloud computing?
What can you do to secure your data and prevent cybersecurity issues?
Provide one advantage and one disadvantage for members of the public to use cloud computing.
Provide one advantage and one disadvantage for a law enforcement agency to use cloud computing.
What aspects of cloud computing usage by a victim or potential suspect could lead to service provider data request issues for law enforcement? Explain your answer.
Describe the forensic acquisition process involved in working with data stored in the “cloud”. Does data automatically remain in the jurisdiction where an individual resides? Explain your position with an example.
Describe the safeguards that can be established for cloud computing to prevent cybercrime incidents within the law enforcement or public realm.
Response Format
Responses will be written in short essay paragraphs from the perspective of a law enforcement professional.
Your response should demonstrate critical thinking.
Write your answers in complete sentences.
Justify and support your responses, using the information found in your text and through research.
Avoid copying text directly from the textbook. This is considered plagiarism and is not acceptable. Instead, paraphrase the information you found in the sources reviewed and then write in your own words the information that you found to be relevant to this assignment.
Use in-text citations in your responses using APA format.