Cybersecurity

An analysis of different data sources used in a forensics investigation

This article provides an overview of four different data sources used in various forensics investigations. The first source includes...

Nov 25 · 13 min read >
Data Sources

Forensics in Business Continuity Planning

Business continuity planning in any organization today must incorporate aspects of computer forensics in order to be sustainable. According...

Nov 16 · 52 sec read >
Business Continuity

What is the Role of Computer Forensics?

Computer forensics can play a vital role in an organization’s recovery from a cyber attack. By properly following forensics...

Nov 16 · 48 sec read >
Computer Forensics

Malicious Code Detection

Malicious code detection is an ongoing obfuscation-deobfuscation game because of the nature of the malware or goals of the...

Oct 27 · 1 min read >
Malicious Code Detection

Remote Access Trojans

Remote Access Trojans have become a serious security concern as hackers have developed more sophisticated code that can be...

Oct 27 · 1 min read >
Remote Access Trojans

Presenting Digital Evidence

Testifying and writing a report are both essential ingredients to a successful digital forensics investigation. Digital forensics personnel will...

Oct 14 · 1 min read >
presenting digital evidence

Confusion over Terminology

The terms risk, vulnerability and threat are often confusing and sometime interchangeable leading to a lack of understanding when...

Oct 12 · 54 sec read >
cybersecurity terminology

Data Hiding and Steganography

The term ‘Steganography’ refers to ‘covered writing’ and encompasses methods of transmitting secret messages through innocuous cover carriers in...

Sep 28 · 1 min read >
data hiding

Preparation Phase of a Digital Search

The preparation phase of digital search is the most important phase of the digital investigation process. If not carried...

Sep 28 · 1 min read >
Preparation Phase of a Digital Search