69
6
clouD coMputIng anD
DIgItal ForensIcs
PROF. GERALD EMERICK
Introduction
Last week you received a meeting invitation from a manager in one of your organiza-
tion’s most critical and sensitive areas. e meeting seems to be related to a routine soft-
ware vendor visit, and the manager is looking for someone to represent the information
security team. You think to yourself, “No problem, I have done this a hundred times
over the years.” Ten minutes into the meeting, you realize the vendor only offers their
application as a cloud service, and the organizational area is extremely excited by the
cloud provider’s claims of speed of delivery, ease of implementation, customer control,
and minimal internal information systems requirements. e application ...