Science topic
Cyber Forensics - Science topic
Explore the latest questions and answers in Cyber Forensics, and find Cyber Forensics experts.
Questions related to Cyber Forensics
Hello everyone:)
Can anyone recommend me some publications on data destruction? I am looking for e.g. publications concerning:
- the use of microwave radiation in the destruction of data or data carriers,
- analyzes of thermal resistance of data carriers, Curie temperature for the magnetic layer of hard drives, resistance of NAND systems,
- solutions used in the chemical destruction of data carriers,
but also other methods of data destruction, both physical and software (e.g. overwriting).
Or maybe someone knows and uses some unusual or little-known data destruction methods?
Please provide real life example on life data acquisition in cyber forensics
recent hot area of research in the field of cyber forensics
In reading various articles and in even discussions with consultants, the terms Cyber Security and Information Security are used interchangeably and sometimes the former seems to be taking over the latter. I want to share my thoughts on this and to show how there can be a distinction between Cyber Risks and Information Security Risks and also show how these two risks can be defined.
Cyber Risks
All risks that affects the organization’s Information Systems such as breaches, IT related threats (Ransomware, virus, malware, etc.). This requires that the relevant People, Process & Technology are in place to predict, prevent, detect and respond against cyber threats.
Information Security (IS) Risks
With IS Risk the focus is on the tenets of Information Security, these are the controls which are to be designed in all IT solutions prior to go live:
Confidentiality – Controls in place to mitigate against the unauthorized disclosure of information.
Integrity – Controls in place to mitigate against the unauthorized modification of information.
Availability – Controls in place to mitigate against downtime of Information Systems, such as Denial Of Service attacks.
So Cyber Risks would relate more to the daily IT related activities of an organization and the Information Security Risks would be the controls that are baked in to IT solutions during the development phase.
2FA Two Factor Authentication
or
MFA Multi factor Authentication be used with bio metric authication
i wanted to test the virus data set with different data mining algorithms..so kindly share the link of the repositories and best tools to experiment.
I have Android Malware dataset but don't know how to get dataset of benign or reliably good applications. I need both dataset for doing comparison in malware analysis.
Image processing techniques for catching forgery
Is there any real-life sceanrio for applied steganography ? why should I hide the message rather than encrypting it by the so many offered tools of today from SSL/TLS to Ipsec/VPN to openPGP .. ? Is steganography applications born dead in modern computer to computer communications ?
I would like to get a data set of windows API calls to use in a classifier to detect the malware by its behavior. Any one can help i appreciate.
Thank you.
If we employ a forensic agent/multi-agent to gather digital forensic data "potential" across diverse platforms, we all know that, this data will be streaming from different platforms. So if this is true, How can we solve the problem of Time synchronization across the different platforms if all agents in the machines are synchronized within the same time zone
*Take note: If we have to normalize based on attributes.
Read many works using Reuters Newsgroup data or Enron email dataset for author gender identification. I am doing my research in author profiling and i would like to use social media analytics. Any suggestions , how to grab data and make it useful in the work??
can I get tool on cyber harassment. Is there any published research on cyber harassment in Africa?
threat intelligence implementation in Enterprises and its importance
Recently I have visited one the website published a data in row and column in pdf file format. I have noticed that after two days later on the data has been changed in one of the cells but file name is remain same.
My question is that
1. Can we check the date of medication of the file and any track record of the changes sequence with valid proof?
2. Is there any computer forensic tool or software to check the modification or overwrite the file details of the website?
I want to know some latest issues in terms of privacy due to data publishing or data mining in real example that happened after 2013. I have some example like
Google bypass safari browser privacy bypass issue
Max Schrems against Facebook.
Please share if you know some more example
Most of the Privacy Preserving Data Mining (PPDM) methods require to determine sensitive knowledge by data owner in order to hide them. I need some scientific reference that helps data owner to select this sensitive knowledge wisely. Can anyone suggest some paper or book?
Ping flood attack is an attempt to bring down the servers
Penetration testing is a very difficult and complex task in network security testing. How can we automate this process? Which tools or demo and test versions are available?
Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone.
I need the vendor details and approximate cost of the software in INR.
The duration of the programme could be one year (Two semesters).