StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Virtual Machine Forensics - Essay Example

Cite this document
Summary
This essay "Virtual Machine Forensics" presents virtual machines that are considered as mimicries of certain computer systems. Type 2 hypervisors (hosted hypervisors) are virtual machine managers that are installed as software applications on an operating system that is already in existence…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Virtual Machine Forensics
Read Text Preview

Extract of sample "Virtual Machine Forensics"

VMware workstation supports Windows and Linux while Oracle VirtualBox supports the two mentioned operating systems together with OS X and Solaris. Kernel-based VMs supports Unix-like operating systems while Parallels Desktop supports Mac OS X. Investigations that involve VMs are not different from the normal investigations. In such investigations which incorporate the use of type 2 hypervisors, a forensic image is obtained from the host computer and the network logs (Steuart, Nelson & Phillips, 2009).

Some of the forensic tools that can be loaded on the drive include Digital Forensic Framework, SIFT, CAINE Linux, The Sleuth Kit which works well with KVM and BlackLight. There are various deterrents that should be considered before releasing a virtual machine to the consumer. Some of these precautions include evaluating some of the assets that require protection and coming up with an uncompromising security tactic. The vibrant nature of a company should also be merged in the security plan involved in the fortification of data and the software of the VM.

Both malicious and non-malicious threats to the software and data should be considered. Thereafter, the company should develop a security strategy that deals with the evasion of these potential harms to the software and the data. Some of the major threats include DDoS attacks (Distributed Denial of service) and zero-day attacks (Steuart, Nelson & Phillips, 2009). These attacks have a high monetary impact on the software and data hence, the need of developing a security strategy to deal with such attacks.

   

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Virtual Machine Forensics Essay Example | Topics and Well Written Essays - 250 words, n.d.)
Virtual Machine Forensics Essay Example | Topics and Well Written Essays - 250 words. https://studentshare.org/information-technology/1882205-virtual-machine-forensics
(Virtual Machine Forensics Essay Example | Topics and Well Written Essays - 250 Words)
Virtual Machine Forensics Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1882205-virtual-machine-forensics.
“Virtual Machine Forensics Essay Example | Topics and Well Written Essays - 250 Words”. https://studentshare.org/information-technology/1882205-virtual-machine-forensics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Virtual Machine Forensics

Current Developments in Forensic Computing

The emergence of computer crimes which is highly technical in nature has led to the creation of a new branch of forensic science known as computer forensics derived from the practice of forensic medicine ( Berghel, 2003; Gladyshev, 2004).... The following part of this paper presents the definition of computer forensics than the currents developments in this field and finally the effects of various factors like economic, social, political, and cultural factors on computer forensics....
7 Pages (1750 words) Report

Malware. PMDump and Holodeck

Aquilina in his book Malware forensics: Investigating and Analyzing Malicious Code (2008), basically PMDump is a useful tool for the investigator to determine what processes are used by a program.... (2008), Malware forensics: Investigating and Analyzing Malicious Code, Burlington, MA: Syngress Publishing.... It also claims that its software is used by such technology giants such as Microsoft and Adobe and is safe for use on the test XP machine (Holodeck 2012)....
3 Pages (750 words) Essay

The Role of Environmental Situation

In the paper “The Role of Environmental Situation” the author analyzes childhood discrimination and fundamental social troubles that cautiously continually confront the present society.... Childhood victimization, as well as, violent offending symbolizes solemn social issues that brazen out a society....
5 Pages (1250 words) Assignment

Scientists and Programmers Withhold Research

Scientists and Programmers Withhold Research Name Professor Institution Course Date Key Words: DMCA Liability, Digital, I.... Introduction US regime in its quest to ensure advancement of digital knowhow has relentlessly backed intensive research activities by respective scientists.... hellip; This is to ensure scientists, programmers and other digital experts in their respective fields uphold essential innovations whose contribution to the global economy is viable....
12 Pages (3000 words) Essay

The History of Computer Forensics

In other words, computer forensics is application of the scientific method to digital media in order to establish information for judicial review.... Mostly, computer forensics experts investigate data storage devices, either fixed like hard disks or removable like compact disc and solid-state devices.... The work of a computer forensics expert is to identify sources of documentary or other digital evidence, preserve the evidence, analyze the evidence, and present the finding....
24 Pages (6000 words) Essay

Computer Forensics Suites

The paper discusses Online Digital Forensic suite as an efficient suite for investigating computer forensics cases, and cybercrime activities.... With the advanced technology, the scientists improvised Computer forensics suites that have been used in the pursuit of curbing the criminal activities.... However, with the advanced technology, the scientists improvised Computer forensics suites that have been used in the pursuit of curbing the criminal activities....
2 Pages (500 words) Essay

Virtual Machine Forensics and Network Forensics

Virtual Machine Forensics A virtual machine (VM) is a software program for creating different environments with each of the environment simulating its components (both hardware and software).... According to the paper, a virtual machine (VM) is a software program for creating different environments with each of the environment simulating its components (both hardware and software).... Each of the environments (virtual machine) mimics a real computer system with its operating system and hardware....
2 Pages (500 words) Article

The Key Principles of Cyber Forensics

This particular paper will describe digital evidence, explain on the key principles of cyber forensics while outlining the threats that are held when digital evidence is stored on computers.... It will then on proceed and discuss some of the investigation process that are used when conducting digital forensics and finally concluding by outlining the importance of crime reconstruction hypotheses and alternative hypotheses.... Cyber forensics is therefore the process of extracting information and data from computer systems while guaranteeing on its accuracy and reliability, in a manner that is legally acceptable via the application of computer technology to the investigation of computer based crime (US-Cert, 2008)....
17 Pages (4250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us