Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
This rough draft SOP will provide a substantial road map on how to build and manage a SOC and or a Cyber Intelligence Operations Center.
    • by 
    •   19  
      SocCISACyber SecurityCyber Forensics
The paper deals with the Issues related to Medical Instrumentation which have come in light in the recent decade. As the instrumentation advances the added features provide great ease but also add security and privacy concerns as has... more
    • by 
    •   2  
      Biomedical informaticsCyber Forensics
If we start from the concept: “Forensic Computer is the science of extracting data so that it can be presented as evidence in a court of law” (Albert J. Marcella, 2007), in the process of extraction is important the recovery, examination... more
    • by 
    •   8  
      Criminal JusticeCyberlawCybercrimesCybersecurity
We are glad to inform you that the School of Engineering & Technology, Sharda University, Greater Noida is organizing One Week International FDP on "Recent Trends in Cyber Security" through online mode from 26th June -01st July, 2021.... more
    • by 
    •   17  
      Information SecurityNetwork SecurityCyberneticsData Analysis
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally... more
    • by 
    •   6  
      EngineeringExpert SystemsComputer ForensicsDigital Forensics
The utilization of the internet within organizations has surged over the past decade. Though, it has numerous benefits, the internet also comes with its own challenges such as intrusions and threats. Bring Your Own Device (BYOD) as a... more
    • by 
    •   14  
      Computer ScienceInformation SecurityData MiningDatabase Systems
The need for forensic accounting is due to incessant failure of the statutory audit to detect and prevent fraudulent activities. The purpose of this study is to examine the "Relevance of Forensic Accounting: Issues in Accountancy and... more
    • by 
    • Cyber Forensics
In present day's satellite play important role in various part of life and industry. Security, entertainment, data communication and many other things are dependent on satellite networks and communication modules. Satellite is more or... more
    • by  and +1
    •   5  
      Artificial IntelligenceNetwork SecuritySatellite NetworksCyber Forensics
This document contain a simple example of an expert witness digital forensics report
    • by 
    •   24  
      Critical TheoryCriminologyCriminal LawCriminal Justice
    • by 
    •   10  
      Computer ForensicsDigital ForensicsWireless NetworkWireless Technology
Today it is globally known that it is a modern era of Artificial Intelligence. There is a great impact of Artificial Intelligence on the society as we are surrounded by technology. It is being observed that in Today's time, Artificial... more
    • by 
    •   5  
      Digital ForensicsCyber SecurityCyber ForensicsArtificial Intelligence And Techniques
Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into... more
    • by 
    •   17  
      CybersecurityDigital ForensicsAll areas of Informatics, Educational technologies, Cyber Security & Forensics, Cyber Audit, ICTCyber Security
Despite growing concern among legal scholars and criminologists, our understanding of cyber stalking and cyber harassment legislation in the United States remains limited. Using a qualitative approach, this research work explored cyber... more
    • by 
    •   2  
      Cyber ForensicsE-discovery
On April 4, 2017 a Syrian government air-attack at Khan Sheikhoun, Syria was followed by reports, photographs, and video data that indicated a significant number of casualties from exposure to toxic gases associated with the attack. This... more
    • by 
    •   4  
      Computational ForensicsCyber ForensicsAnti ForensicsLaw of Forensics and Scientific Evidence
The computer is being used by majority of the people living today. There are linked to the computer either directly or indirectly. The computer systems are gaining their implementations in different departments. Either it is education or... more
    • by 
    •   11  
      Computer ForensicsDigital ForensicsDigital Investigation,Computer Forensics, Computer securityCyber Forensics
In the recent years, the use of internet and information technology across the globe has been increased tremendously. The opportunity to use the internet is huge and unconditional. Therefore, the criminal activities in the cyber world is... more
    • by 
    •   4  
      Computer ForensicsCyber crimeCyber ForensicsDigital Evidence
Over the decade web applications are grown rapidly. This leads to cyber crimes. Attacker injects various scripts to malfunction the web application. Attacker injects these scripts to text box of vulnerable web application from various... more
    • by 
    •   6  
      Computer ScienceInformation SecurityComputer SecurityCyber Forensics
Electronic devices are a part and parcel of our lives today. With the penetration of technology in our lives, an increased dependency on gadgets, advancement in AI technologies, etc. the electronic devices hold abundance sensitive data... more
    • by 
    •   20  
      LawCriminal LawCivil LawDigital Literacy
This research paper used the Kali-Linux operating system, to create a platform remotely which allows to control the device Android and Windows operating system using the malicious payload through penetration tools like Metasploit... more
    • by  and +1
    •   10  
      Forensic ScienceExpert evidenceCyber ForensicsFingerprint
    • by 
    •   19  
      Information SecurityComputer ForensicsVirtual MemoryMalware Analysis
Dentro del proceso investigativo en delitos cibernéticos, todos los hallazgos encontrados vienen hacer parte fundamental de la investigación, los mismos que son tratados en el "Computer Crime Scene" como evidencia; la identificación,... more
    • by 
    •   6  
      Computer ForensicsCybercrimesDigital ForensicsCyber Forensics
The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence... more
    • by 
    •   7  
      Digital securityHackingRisk AnalysisCyber Forensics
    • by 
    •   15  
      Computer ScienceInformation SecurityComputer SecuritySemantic Analysis
The purpose of this study is to explore the evolving technology and systems to find a low cost, efficient and portable solution for hard disk drive forensic imaging.Hard Disk Drive Imaging is one of the most frequently used forensic... more
    • by 
    •   34  
      Computer SciencePolice ScienceForensicsCyberlaw
Bilgi çağını yaşadığımız 21. yüzyılda teknolojiye bağımlı bir haldeyiz. Yaşamın her alanını dijitalleştiriyoruz. Bankacılıktan ticarete, habercilikten iletişime, iş hayatından sosyal hayata kadar her şeyin önüne “e” harfini koyar olduk.... more
    • by 
    •   9  
      Computer ForensicsCybercrimesCyber ForensicsComputer Forensics for Cyberspace Crimes
Many a times, it has been argued that over dependency on technology leads to deskilling, lack of innovation and creativity thus resulting in inferior or substandard work. With a field growing in both demand for personnel and market for... more
    • by 
    •   10  
      Computer ForensicsDigital ForensicsCyber SecurityCyber Forensics
COMPUTER FORENSICS INTEGRATES THE FIELDS OF COMPUTER SCIENCE AND LAW TO INVESTIGATE CRIME. FOR DIGITAL EVIDENCE TO BE LEGALLY ADMISSIBLE IN COURT, INVESTIGATORS SHOULD FOLLOW PROPER LEGAL PROCEDURES WHEN RECOVERING AND ANALYZING DATA FROM... more
    • by 
    •   18  
      MathematicsComputer ScienceAlgorithmsInformation Technology
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of various software and hardware approaches for memory dumping there are authors who point out that some of these approaches are not resilient... more
    • by  and +1
    •   25  
      Information SecurityComputer ForensicsVirtual MemoryMalware Analysis
    • by 
    •   17  
      ForensicsComputer ForensicsE-learningVirtual Environments
Abstract—Intrusion Detection Systems (IDS) have become crucial components in computer and network security. NSLKDD intrusion detection dataset which is an enhanced version of KDDCUP'99 dataset was used as the experiment dataset in this... more
    • by 
    •   6  
      Computer VisionNetwork SecurityDigital Image ProcessingCyber Security
Management Fraud is a form of fraud, which normally does not come on surface, but its impact is staggering both in economic terms as well its effect on victims. Fraud whether it is committed by an employee or a manager is a concern of... more
    • by 
    •   6  
      FinanceFraud Detection And PreventionHuman Resource ManagementHuman Resources
In the modern world, we use microprocessors which are either based on ARM or x86 architecture which are the most common processor architectures. ARM originally stood for ‘Acorn RISC Machines’ but over the years changed to ‘Advanced RISC... more
    • by 
    •   15  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
    • by 
    •   5  
      Computer ForensicsDigital ForensicsIEEE 802.11 WLANWiFI
The process of identifying and establishing attribution and motive in both cyber-attacks and counter attacks is often a problematic/challenging process. This is largely due to events often being undocumented and unverified, because of the... more
    • by 
    •   4  
      Computer ForensicsCyber ForensicsCyber AttacksScript-based Cyber Attacks
Lirieka Meintjes-Van Der Cognitive bias affecting forensic Walt & Adebola Olaborede expert opinion The influence of bias in forensic expert opinion can create problems for the criminal justice system. Many research studies have shown that... more
    • by 
    •   11  
      Criminal LawLaw of evidenceDNA (Forensic Science)Cognitive Bias
Serious weaknesses were discovered in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs). Concretely, attackers... more
    • by 
    •   12  
      Network SecurityBiometricsCryptographyBiometrics Authentication Technologies
Software tools designed for disk analysis play a critical role today in digital forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally... more
    • by 
    •   5  
      Expert SystemsComputer ForensicsDigital ForensicsCyber Security
Computers are found in every aspect of our daily lives, employed for personal, social, and professional purposes. Electronic devices like hard discs and flash are standard storage media for most forms of information. The World Wide Web... more
    • by 
    •   5  
      Internet & TechnologyComputer SystemsCybercrimeCyber Forensics
A large number of industries including: critical national infrastructure (electricity, gas, water, etc.) and manufacturing firms rely heavily on computer systems, networks, control systems, and embedded devices... more
    • by 
    •   6  
      Computer ScienceInformation TechnologySCADACyber Security
The purpose of this research is to investigate and identify ARP Poison Attacks by analyzing the pcap files
captured by Wireshark.
    • by 
    •   3  
      Network SecurityCyber ForensicsWireshark
ABSTRAK Anti Forensik merupakan suatu bagian kajian di bidang Teknologi Informasi yang bertujuan untuk mengamankan data digital yang bersifat rahasia, agar tidak ditemukan oleh ahli komputer forensik (investigator) pada saat proses... more
    • by  and +1
    •   6  
      Digital ForensicsDigital Investigation,Computer Forensics, Computer secuirtyDigital Investigation,Computer Forensics, Computer securityCyber Forensics
    • by 
    •   8  
      The Internet of ThingsInternet of ThingsDigital ForensicsDigital Investigation,Computer Forensics, Computer security
The use of hydro energy to generate electric power is crucial to meet the increasing energy demand of a modern economy and maintains the stability of power supply for unstable sources of power like solar, and wind. In newly constructed... more
    • by 
    •   4  
      Computer Security And ReliabilitySmart GridCyber ForensicsPower System - SCADA and Smart Grid Applications
    • by  and +1
    •   20  
      Computer ScienceInformation SecurityInternational StudiesCyber Warfare
    • by 
    •   20  
      Computer ScienceInformation SecurityInternational StudiesCyber Warfare
    • by 
    •   5  
      Computer ScienceCyber ForensicsSequenceComputer Applications
Cyber Forensics
    • by 
    • Cyber Forensics
"En ces temps de Covid-19, et à l'image de l'attaque informatique sur les données de la compagnie EasyJet, le cyberespace est de plus en plus instable. États, entreprises et particuliers semblent promis à une période de très forte... more
    • by 
    •   16  
      Information SecurityCybercrimesInformation WarfareCyber Warfare
Today’s world lives more online than offline, uses digital mean and technology almost with every breath and shudders with the thought of compromised privacy and security. Computers have come to the verge where we have computers as our... more
    • by 
    •   2  
      Data SecurityCyber Forensics
The rate at which employee’s fall victim of Identity Theft and Phishing attack. Promote the education of employees and conduct training sessions with mock phishing scenarios. The fact that organizations have Information... more
    • by 
    •   4  
      Information SecurityCyber SecurityCyber ForensicsDigital Forensic, Cyber Crime, Cyber Security