Forensics Journal - Stevenson University 2015 | Page 31
FORENSICS JOURNAL
security. Both Network Forensic Analysis Toolkits and Intrusion
Detection Systems are critical components of computer systems
when attempting to detect network attacks and maintain cloud
security. Fraud prevention techniques are also an important tool
when attempting to protect data stored on the cloud. With help
from organizations such as the Association of Certified Fraud
Examiners, businesses can continually improve data security. A
combination of fraud prevention and detection techniques will
provide strong defenses against the potential attacks threatening
the cloud computing industry.
King, N. J., & Raja, V. T. (2012). Protecting the privacy and security
of sensitive customer data in the cloud. Computer Law & Security
Review, 28, 308-319.
Makryllow, G. (2014, March). Data storage and security in the
cloud. Retrieved April 25, 2014, from http://www.cso.com.au/
article/539547/data_storage_security_cloud/
Mukherjee, B., Heberlein, L. T., & Levitt, K. N. (1994). Network
intrusion detection. Retrieved December 10, 2013, from
http://wenke.gtisc.gatech.edu/ids-readings/network_id.pdf
REFERENCES
Pavanireddy, K., Srinivas, K. S., & Aruna, V. (2014). Reducing
associate data fraud in the cloud. International journal of research
in computer application and robotics, 2.1, 34-39.
Booth, G., Soknacki, A., & Somayaji, A. (2013, June 5). Cloud
security: Attacks and current defenses. Retrieved April 17, 2014,
from http://www.albany.edu/iasymposium/proceedings/2013/16BoothSoknackiSomayaji.pdf
Rouse, M. (2010, August 4). Infrastructure as a service (IaaS).
Retrieved April 10, 2014, from