Forensics Journal - Stevenson University 2015 | Page 31

FORENSICS JOURNAL security. Both Network Forensic Analysis Toolkits and Intrusion Detection Systems are critical components of computer systems when attempting to detect network attacks and maintain cloud security. Fraud prevention techniques are also an important tool when attempting to protect data stored on the cloud. With help from organizations such as the Association of Certified Fraud Examiners, businesses can continually improve data security. A combination of fraud prevention and detection techniques will provide strong defenses against the potential attacks threatening the cloud computing industry. King, N. J., & Raja, V. T. (2012). Protecting the privacy and security of sensitive customer data in the cloud. Computer Law & Security Review, 28, 308-319. Makryllow, G. (2014, March). Data storage and security in the cloud. Retrieved April 25, 2014, from http://www.cso.com.au/ article/539547/data_storage_security_cloud/ Mukherjee, B., Heberlein, L. T., & Levitt, K. N. (1994). Network intrusion detection. Retrieved December 10, 2013, from http://wenke.gtisc.gatech.edu/ids-readings/network_id.pdf REFERENCES Pavanireddy, K., Srinivas, K. S., & Aruna, V. (2014). Reducing associate data fraud in the cloud. International journal of research in computer application and robotics, 2.1, 34-39. Booth, G., Soknacki, A., & Somayaji, A. (2013, June 5). Cloud security: Attacks and current defenses. Retrieved April 17, 2014, from http://www.albany.edu/iasymposium/proceedings/2013/16BoothSoknackiSomayaji.pdf Rouse, M. (2010, August 4). Infrastructure as a service (IaaS). Retrieved April 10, 2014, from