View Post

Data Hiding and Steganography

In Cybersecurity by Ian Carnaghan0 Comments

This entry is part 4 of 6 in the series Digital Forensics

The term ‘Steganography’ refers to ‘covered writing’ and encompasses methods of transmitting secret messages through innocuous cover carriers in a manner that their existence is undetectable. Johnson & Jojodia (1998). For years hackers have been finding more innovative ways of hiding data within existing systems usually for the purpose of transporting it to a target destination. The term ‘carrier’ often …

Share
View Post

Preparation Phase of a Digital Search

In Cybersecurity by Ian Carnaghan0 Comments

This entry is part 3 of 6 in the series Digital Forensics

The preparation phase of digital search is the most important phase of the digital investigation process. If not carried out correctly, the can lead to improper handling of evidence that may lead to damage of crucial materials to an investigation. This phase involves the preparation of tools, techniques, search warrants, and monitoring authorizations and management support. Venansius & Tushabe (2004). …

Share
View Post

Yet More Theft of Information Assets

In Cybersecurity by Ian Carnaghan0 Comments

This entry is part 2 of 6 in the series Digital Forensics

It doesn’t seem that long ago that I received an official letter in the mail from the United States Office of Personnel Management (OPM) detailing that sensitive information about me had been compromised. I had been following the news and knew about the breach, so the letter didn’t come as a huge shock. It did make me think about the …

Share
View Post

Important Cybercrime Laws

In Cybersecurity by Ian Carnaghan0 Comments

This entry is part 1 of 6 in the series Digital Forensics

There are a number of cybercrime laws that are extremely important in the field of digital forensics and cybersecurity as a whole. Two of the most important laws include the Computer Fraud and Abuse Act (CFAA) of 1984 and the Electronic Communications Privacy Act (ECPA) of 1986. The original intent of CFAA was to address computer related crimes and more …

Share