Given our understanding of the bigger Cyberspace, why is forensics of malicious exploitation events and the associated attribution of the perpetrators so difficult to accomplish accurately and legally? As part of your research into this topic consider the following two “competing” computer processing paradigms: 1) cloud computing and its services-based, centralized approach, and 2) continuing focus on decentralizing applications and pushing more and more power “to the edge of the networks” (e.g. blockchain, trusted computing, smart contracts, decentralized consensus, etc.). • Identify and explain 5 challenges to conducting accurate and legal digital forensics (and its associated attribution), regardless of the computing environment being used. • Discuss the impact the 2 computer processing paradigms identified above have on the 5 challenges you identified. Note that some of these impacts should be significantly different and some may be surprising similar. • Explain what can be done to minimize these impacts
Given our understanding of the bigger Cyberspace, why is forensics of malicious exploitation events and the
associated attribution of the perpetrators so difficult to accomplish accurately and legally? As part of your research into this topic consider
the following two “competing” computer processing paradigms: 1) cloud computing and its services-based, centralized approach, and 2)
continuing focus on decentralizing applications and pushing more and more power “to the edge of the networks” (e.g. blockchain, trusted
computing, smart contracts, decentralized consensus, etc.).
• Identify and explain 5 challenges to conducting accurate and legal digital forensics (and its associated attribution), regardless of the
computing environment being used.
• Discuss the impact the 2 computer processing paradigms identified above have on the 5 challenges you identified. Note that some of
these impacts should be significantly different and some may be surprising similar.
• Explain what can be done to minimize these impacts
Step by step
Solved in 3 steps