首页> 外文期刊>Journal of Computer Virology and Hacking Techniques >Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the ‘cloud’—a forensic computing perspective
【24h】

Technical, legal and ethical dilemmas: distinguishing risks arising from malware and cyber-attack tools in the ‘cloud’—a forensic computing perspective

机译:技术,法律和道德困境:区分“云”中法医计算角度的恶意软件和网络攻击工具所带来的风险

获取原文
获取原文并翻译 | 示例

摘要

While hype around the benefits of ‘cloud computing’increase, challenges in maintaining data security and data privacy have also been recognised as significant vulnerabilities (Ristenpart et al. in Proceedings of the 14th ACM conference on computer and communications security, pp 103–115, 2009; Pearson in CLOUD’09, pp 44–52, 2009; Vouk in J Comput Inf Technol 4:235–246, 2008). These vulnerabilities generate a range of questions relating to the capacity of organisations relying on cloud solutions to effectively manage risk. This has become particularly the case as the threats faced by organisations have moved increasingly away from indiscriminate malware to more targeted cyber-attack tools. From forensic computing perspective it has also been recognised that ‘cloud solutions’ pose additional challenges for forensic computing specialists including discoverability and chain of evidence (Ruan et al. in Adv Digital Forensics VII:35–46, 2011; Reilly et al. in Int J Multimedia Image Process 1:26–34, 2011). However, to date there has been little consideration of how the differences between indiscriminate malware and targeted cyber-attack tools further problematize the capacity of organisations to manage risk. This paper also considers these risks and differentiates between technical, legal and ethical dilemmas posed. The paper also highlights the need for organisations to be aware of these issues when deciding to move to cloud solutions.
机译:尽管围绕“云计算”的好处进行了大肆宣传,但维护数据安全性和数据隐私性方面的挑战也被认为是重大漏洞(Ristenpart等人在第14届ACM计算机和通信安全性会议论文集,第103-115页, 2009年; Pearson在CLOUD'09中,第44-52页,2009年; Vouk在J Comput Inf Technol 4:235-246,2008年)。这些漏洞产生了一系列问题,这些问题与依靠云解决方案有效管理风险的组织的能力有关。由于组织所面临的威胁已从不加区分的恶意软件转移到更具针对性的网络攻击工具,这种情况尤其如此。从法医计算的角度来看,人们还认识到“云解决方案”对法医计算专家构成了额外的挑战,包括可发现性和证据链(Ruan等人,Adv Digital Forensics VII:35-46,2011; Reilly等人,Int J多媒体图片处理1:26-34,2011年)。但是,迄今为止,几乎没有考虑过不加选择的恶意软件和有针对性的网络攻击工具之间的差异如何进一步使组织的风险管理能力出现问题。本文还考虑了这些风险,并对所构成的技术,法律和道德困境进行了区分。本文还强调了组织在决定转向云解决方案时需要意识到这些问题的必要性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号