Blog Posts Tagged with "Forensics"

Cccf3288436ddec8c2344cca4e69bc58

Mitigating Security Threats Through Forensic Psychology

February 06, 2011 Added by:Jonathan Dudek

Identifying the nature of threats - the motives and modi operandi of criminal groups and other critical factors contributing to their behavior, such as underlying cultural and political beliefs - will foster the development of appropriate risk mitigation strategies and safeguards at every level...

Comments  (2)

D8853ae281be8cfdfa18ab73608e8c3f

Improving Insider Threat Testing

February 03, 2011 Added by:Rob Fuller

We need to build organizations up in the detection department from a pentesters point of view. We are loosing this battle, and one of the reasons is we keep our bag of tricks to ourselves, and that's what insider threat testing is all about, getting all the tricks tested in a more open fashion...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

CyberForensics: Understanding Infosec Investigations

January 06, 2011 Added by:Ben Rothke

The book takes a broad look at cyberforensics with various case studies. Each of the books 10 chapters takes a different approach to the topic, and is meant to be a source guide to the core ideas on cyberforensics...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Don't Miss The Computer Forensics Show

October 21, 2010 Added by:Infosec Island Admin

For individuals and companies currently not familiar with computer forensics, The Computer Forensics Show will address issues that your organization needs to be aware of and to help you prepare to deal with potential problem areas that may dramatically impact your bottom line...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The Computer Forensics Show is November 1-2

October 14, 2010 Added by:Infosec Island Admin

For individuals and companies who are not familiar with computer forensics, The Computer Forensics Show will address issues that your organization needs to be aware of and to help you prepare to deal with potential problem areas that may dramatically impact your company's bottom line...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Computer Forensics Pervades All Industries

October 05, 2010 Added by:Infosec Island Admin

The reality today is that every computer is a potential crime scene and must be treated as such. When companies need to conduct internal investigations, especially those involving litigation, discovering and maintaining evidence becomes paramount...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Hacked? Check Out The Computer Forensics Show

September 15, 2010 Added by:Infosec Island Admin

The rate of fraud, abuse and criminal activity on IT systems by hackers, private contractors and even employees is increasing exponentially. For some companies, it is not a question if one of their computers will be used as evidence in a legal matter, it is a question of when...

Comments  (1)

E973b16363b3de77b360563237df7e32

File Carving from a Partially Wiped Evidence Disk

September 13, 2010 Added by:Bozidar Spirovski

On the previous article on proper information disposal, a visitor suggested that Darik's Boot and Nuke can be used for emergency evidence destruction. While it is quite correct, DBAN takes time to finish. So, what evidence can be recovered from a disk on which someone interrupted the DBAN process?

Comments  (2)

09e5dbdf8a3bd6dccce5621459b11e26

Teaching Computer Forensics

August 24, 2010 Added by:Mark Bennett

In the government sector, cyber attacks on government agencies and contractors, originating from China, have proved difficult to suppress. Incident response and mitigation, class action lawsuits, and fines place remediation costs in the billions of dollars...

Comments  (0)

E973b16363b3de77b360563237df7e32

Computer Forensics Evidence Collection

August 23, 2010 Added by:Bozidar Spirovski

Following up on A Computer Forensics Process Tutorial, here is a step-by-step tutorial on how to process a suspect computer to obtain dumps of RAM memory and Disk Drive using Helix Forensic CD...

Comments  (1)

E973b16363b3de77b360563237df7e32

A Computer Forensics Process Tutorial

August 16, 2010 Added by:Bozidar Spirovski

Computer forensics is currently a very popular term, and brings an aura of certain magical steps that forensics teams use. In reality, the computer forensics just job is a standard process. Here is a simple tutorial on what is involved in computer forensics...

Comments  (3)

85ac6feb584b665e85664974c546cfec

3 Basic Elements to Network Forensics Solutions

August 11, 2010 Added by:Ray Tan

The information forensic analysis provides can lead to an informed and efficient security posture within an organization to deter similar attacks in the future. As criminals get smarter and savvier, being able to detect and characterize attacks is crucial...

Comments  (0)

B426b30042abbc15e363cb679bbc937d

More COFEE Please, on Second Thought…

November 09, 2009 Added by:Daniel Kennedy

The forensics tool provided to law enforcement officials created by Microsoft called COFEE  (Computer Online Forensic Evidence Extractor) has been leaked on torrents last week, and this has caused quite a bit of excitement.  Let’s see if the big deal is warranted.

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »