Skip to main content

Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE

  • Conference paper
  • First Online:
Book cover Digital Forensics and Cyber Crime (ICDF2C 2013)

Abstract

As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are concerned. Security experts, however, must still be able to acquire and analyze data in a methodical, rigorous and forensically sound manner. This work applies the STRIDE asset-based risk assessment method to cloud computing infrastructure for the purpose of identifying and assessing an organization’s ability to respond to and investigate breaches in cloud computing environments. An extension to the STRIDE risk assessment model is proposed to help organizations quickly respond to incidents while ensuring acquisition and integrity of the largest amount of digital evidence possible. Further, the proposed model allows organizations to assess the needs and capacity of their incident responders before an incident occurs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Allen, M.W.: Creating Successful E-Learning: A Rapid System for Getting it Right the First Time, Every Time. Pfeiffer & Co, San Francisco (2006)

    Google Scholar 

  2. Anderson, L.W., Krathwohl, D.R., Bloom, B.S.: A Taxonomy for Learning, Teaching, and Assessing. Longman, New York (2005)

    Google Scholar 

  3. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a Berkeley view of cloud computing. Science 53(UCB/EECS-2009-28), 07–013 (2009)

    Google Scholar 

  4. Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., Loureiro, S.: A security analysis of amazon’s elastic compute cloud service (2012)

    Google Scholar 

  5. Carrier, B.D., Spafford, E.H.: Getting physical with the digital investigation process. Int. J. Digital Evid. 2(2), 1–20 (2003)

    Google Scholar 

  6. CRA and Computing Research Association. Four grand challenges in trustworthy computing. Technical report (2003)

    Google Scholar 

  7. Dykstra, J., Sherman, A.T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digital Invest. 9, S90–S98 (2012)

    Article  Google Scholar 

  8. Eucalyptus. Eucalyptus: The Open Source Cloud Platform (2013)

    Google Scholar 

  9. EY and EYGM Limited. Into the cloud, out of the fog: Ernst & Young’s 2011 global information security survey. Technical report (2011)

    Google Scholar 

  10. Gartner. Forecast: public cloud services, Worldwide, 2010–2016, 2Q12 Update. Technical report (2012)

    Google Scholar 

  11. James, J.I., Shosha, A.F., Gladyshev, P.: Digital forensic investigation and cloud computing. In: Ruan, K. (ed.) Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp. 1–41. IGI Global, Hershey (2013)

    Chapter  Google Scholar 

  12. Jansen, W.A.: Cloud Hooks: Security and Privacy Issues in Cloud Computing, pp. 1–10. IEEE, Washington, DC (2011)

    Google Scholar 

  13. Kent, K., Chaevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response. Technical report SP800-86 (2006)

    Google Scholar 

  14. Kerrigan, M.: A capability maturity model for digital investigations. Digital Invest. 10(1), 19–33 (2013)

    Article  Google Scholar 

  15. Kui, R., Cong, W., Qian, W.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)

    Article  Google Scholar 

  16. MITRE. OpenStack Security Vulnerabilities

    Google Scholar 

  17. MSDN. The STRIDE Threat Model (2005)

    Google Scholar 

  18. NIST. Common Vulnerability Scoring System

    Google Scholar 

  19. Ponemon and L L C Ponemon Institute. The security of cloud infrastructure: survey of U.S. IT and compliance practitioners. Technical report (2011)

    Google Scholar 

  20. Pooe, A., Labuschagne, L.: A conceptual model for digital forensic readiness. In: 2012 Information Security for South Africa, pp. 1–8. IEEE, August 2012

    Google Scholar 

  21. Ruan, K., Carthy, J., Kechadi, T., Baggili, I.: Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results. Digital Invest. 10(1), 34–43 (2013)

    Article  Google Scholar 

  22. Saripalli, P., Walters, B.: QUIRC: A Quantitative impact and risk assessment framework for cloud security, pp. 280–288. IEEE (2010)

    Google Scholar 

  23. Skok, M.J.: Future of Cloud Computing 2012 (2012)

    Google Scholar 

  24. Sodiya, A.S., Onashoga, S.A., Oladunjoye, B.: Threat modeling using fuzzy logic paradigm. J. Issues Inf. Sci. Technol. 4(1), 53–61 (2007)

    Google Scholar 

  25. Stephenson, P.: Modeling of post-incident root cause analysis. Int. J. Digital Evid. 2(2), 1–16 (2003)

    MathSciNet  Google Scholar 

  26. Swiderski, F., Snyder, W.: Threat Modeling. Microsoft Press, Redmond (2004)

    Google Scholar 

  27. Vouk, M.A.: Cloud computing-Issues, research and implementations, pp. 31–40. IEEE (2008)

    Google Scholar 

  28. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joshua I. James .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

James, J.I., Shosha, A.F., Gladyhsev, P. (2014). Determining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE. In: Gladyshev, P., Marrington, A., Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 132. Springer, Cham. https://doi.org/10.1007/978-3-319-14289-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14289-0_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14288-3

  • Online ISBN: 978-3-319-14289-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics