Enomaly Inc.
Enomaly is the progenitor of cloud computers. It developed a series of software for virtualization and management of cloud computing. Enomaly is first company which focused on the emerging cloud computer. Today, their software called Elastic Computing Platform allows web hosts and service providers to offer public facing IaaS and cloud services to their customers. The company is among the first to provide self-service IaaS (Infrastructure - as - a - Service) platform software, the first version of the Enomalism open-source platform launched in 2005, later renamed the ECP.
Enomaly platform which is Enterprise cloud computing; Works elastic computing platform (ECP) for operators and service providers, custody and each enterprise customer service, help them to provide more efficiency, flexibility of cloud computing platform. More than 15000 companies using ECP business cloud computing platform, realize the infrastructure of on-demand service, enjoy the dynamic scaling of supply and calculating work. Enomaly elastic computing platform (ECP) is for operators and unlimited scalability. ECP operator level architecture can support very large cloud platform, in different environment. It increased the flexibility of business self-service.
Characteristics of Enomaly ECP
Enomaly ECP (Elastic Computing Platform, Elastic Computing Platform) is a fully functional, easy to use, mature and stable cloud infrastructure (IaaS) management software (similar to amazon's cloud services AWS EC2), can help enterprises and operators to quickly construct and develop the cloud Computing environment (as well as enterprise internal users provide private cloud service, also for public users provide public cloud services). ECP allows users through th...
... middle of paper ...
...
Cloud Security Alliance. "Top Threats to Cloud Computing.” Cloud Security Alliance. N.p., n.d. Web. 02 Apr. 2014.
Condron, Stephanie, Ian Gallagher and Simon Watkins. “Exposed: Barclays account details for sale as 'gold mine' of up to 27,000 files is leaked in worst breach of bank data EVER.” N.d. Web. 10 Feb 2014.
Cole, Arthur. "Defining 'Elasticity' in the Cloud." Defining 'Elasticity' in the Cloud. N.p., n.d. Web. 18 Feb. 2014.
ISTF, JUCC. "Background of Cloud Computing." Network Computing. Computing Services Centre, 27 06 2011. Web. 2 Apr 2014.
Reilly, Denis, Chris Wren, and Tom Berry. "Cloud Computing: Pros and Cons for Computer Forensic Investigations." School of Computing and Mathematical Sciences (2011): n. pag. Web.
Viswanathan, Priya. “Cloud Computing- Is it Really All That Beneficial?” Advantages and Disadvantages of Cloud Computing (2013): n. pag. Web.
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
Digital Forensic is the process of uncovering and interpreting electronic data that can be used in a court of law. It requires a set of standards to show how the information that is gathered, preserve, and analyzed is strictly followed. The analysts need to understand the evolution of the current technology and how it will impact how they gather their information. The investigator is able to uncover evidence and analyze it to gain the understanding of the motives, crime, and the criminal’s identity to help solve the crime. As computers and technology continue to become a part of our everyday lives, the cyber realm contains a growing realm for evince in all types of criminal investigations (Cummings, 2008) Digital forensics is a way to connect information security and law enforcement. It ensures that the digital evidence is collected in a way that it can make it into the courts in an unhampered or uncontaminated way (Dlamini, M., Eloff, J. & Eloff, M., 2009).
He acknowledges that criminal justice information needs good security because it is information about citizens, often at their most distressed and vulnerable. “Imagine if someone hacked and even edited video of alleged criminals before they were even charged or of child victims describing their attackers.” He notes that with all of the state and local law enforcement officers in the United States, the data requirement will be huge. The only system that can sustain such a requirement with the latest, most flexible technology would be the cloud. The cloud does pose security risks; however, the FBI has issued a policy that addresses both security and privacy issues.
Technologies are advancing in today's world where more information is being generated, stored and distributed through digital gadgets. This requires investigators and forensic expert to increase the use of digital evidence gathering as a tool to fight against cyber-crime (International competition network, n.d.).
Abstract This paper discusses several implementations of modern technology in criminal investigations, and the ethical issues that accompany these techniques, focusing on the tradeoff between security and privacy. Specific topics include centralization of information, telecommunications, and general technology. Cases are cited for each topic, as well as a discussion of the ethical issues involved.
7. “What cloud computing really means.” By Eric Knorr, Galen Gruman. Accessed. 21 November 2013. < http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031 >
Britz, Marjie. 2009. Computer forensics and cybercrime: an introduction. Upper Saddle River, N.J.: Pearson Prentice Hall.
Despite these advantages, Grispos, Glisson and Storer (2012) highlighted several challenges that the cloud environment may pose for digital forensic investigators during the collection and analysis phrases of the investigation process. Artifacts, data used that can be used as evidence, are often hard to extract because resources can be redirected and/or disappear destroying the trial of evidence in the process. During the preparation stage of the investigation, an investigator trained in the conventional methods of digital forensics will usually obtain a comprehensive history and overview of the crime scene, and have a idea of what will be required from the organization in order to proceed with the investigation. However, in the case of network forensic investigations, there is a no comprehensive history and overview of the suspected crime scene, and there is a lack of structured environment in which data transmissions between various network points and platforms can be collected as evidence. There may also be a lack of structure in the target environment and methods of monitoring and reporting transmission information may not exist. The segregation of duties and differences in the service models that exists between cloud service providers and cus...
Cloud Security Alliance CLOUD SECURITY ALLIANCE The Notorious Nine: Cloud Computing Top Threats in 2013, [online]. Available: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
There are many options that are provided by Amazon Elastic Compute Cloud (Amazon EC2) like as follows: preconfigured software, complete environments, processors, and memory. Scalability is also offered on a pay as you go basis. The time required to implement a new server takes mire minutes, capacity can be scaled with ease. You will only have to pay for whatever you use when it comes to Amazon EC2. Application with fail proof safeguards can be developed with the use of Amazon EC2. (Amazon Web Services, 2012)
In conclusion, computer crimes have increased in the recent past because of the proliferation of these devices due to technological advancements. This has in turn contributed to the emergence of computer forensics, which involves the use of various processes and tools to gather evidence that is admissible in a court. There are various types of computer forensic tools or programs with different features, costs, and areas of effectiveness. Similarly, there are various computer experts for various computer crime scenarios. Since these experts are only suitable for varying computer crime scenarios, the hourly costs of hiring them differ based on the specific details of the case.
In most crimes committed today criminals’ leave behind digital evidence that can be recovered by digital forensic experts and digital forensic tools.
Then reports that will represent the information gathered are written (“Computer Crime Investigation Using Forensic Tools and Technology”). As digital technology continues to advance, methods are kept up to date and
Cloud computing is convenient and user-friendly. It offers benefits such as the ease of software maintenance. No CD is required to install the resources and users do not have to worry if their software is out of date. Servers and capacity planning are also not required with Cloud computing. It does not require any equipment outlay and you do not need to guard against obsolete hardware. Cloud computing applications can also be access anywhere on your computer or mobile. Redundancy and disaster planning is also taken care by your cloud provider. With all these benefits cloud computing has to offer, many businesses have started to use cloud computing today. However there is also bound to have disadvantages.
...tecture for scalability and availability as the public cloud but is restricted to a single organization.