Abstract

Governments and private organizations are rapidly moving on cloud and storing their private and business information on cloud databases. And currently cloud system is not much secure and different types of attacks are happening on databases. Databases store an expansive scope of private and open data, making them a practical objective for abuse by foes who are hoping to bargain the secrecy of information just as harm the respectability of the information or make it inaccessible to its client. It builds the establishment for the advancement and foundation of key standards in investigation of database forensics and case for forensic management. This research study strives to highlight the different vulnerabilities which are exploited by hackers and afterwards if there is intrusions how one can assess the amount of damage that has been done to the system by forensic analysis. This study also focuses on different solutions which can be used to secure the system so that the integrity of data is made possible. To further explore the forensic auditing process, the research shows the plan of assessing and developing a procedure to start with forensic analysis process. This is made sure following standard operating procedures which are used in forensic analysis and afterwards an investigation is conducted which results in determining the flaws in security and solutions to make them more protected. To sum up, this research study explores and follows a framework that can be used for analysis in a standard procedure which can be used to prove a case through legal channels. This further enables the authorities to proceed and set up a criminal case against the intruders using forensic audit.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.