With the wide scale adoption of cloud computing paradigms and Internet of Things implementations, the arena of
service delivery has changed significantly for the world of technology-oriented services. While these new modes of service delivery have provided innovations that were not fathomable earlier, they not only create new non-traditional pathways for evidence generation, nevertheless, they have also been seen to carry a potential of creating and exposing a whole new set of security vulnerabilities that malicious actors can exploit.