devices

Discribe-the-different-types-of-Disk-and-there-characterstics

Discribe the different types of Disk and there characterstics

In thisarticle explain Discribe the different types of Disk and there characterstics & uses. Disk Drive is a digital data storage device that uses different storage mechanisms such as mechanical, electronic, magnetic, and optical to store the data. It is addressable and rewritable to support changes and modification of data. Depending on the type of media and mechanism of reading and writing the data, the different types of disk drives are as follows: Magnetic Storage …

Discribe the different types of Disk and there characterstics Read More »

Understand-the-Chain-of-Custody-and-It’s-Importance

Understand the Chain of Custody and It’s Importance

Understand the Chain of Custody and It’s Importance In this Chain of custody is a legal document that demonstrates the progression of evidence as it travels from the original evidence location to the forensic laboratory. It is a roadmap that shows how investigators collected, analyzed, and preserved the evidence. The investigators need to present this document in court. It ensures accurate auditing of the original data evidence, imaging of the source media, tracking of the …

Understand the Chain of Custody and It’s Importance Read More »

computer-forensic-investigation

Collect Physical Evidence in computer forensic investigation

The victim computer and its elements are vital evidence sources in a computer forensic investigation. Collect all the electronic devices or any other media found at the crime scene. Seize storage devices like hard drives, memory cards, and removable media as they can have stored information. Handheld devices like smart phones, mobile phones, PDAs, digital multimedia devices, and GPS receivers can have valuable evidence information like Internet browsing history, e-mails, chat logs and friend lists, …

Collect Physical Evidence in computer forensic investigation Read More »

Planning-the-Search-and-Seizure-of-investigation

Planning the Search and Seizure of investigation

Planning the Search and Seizure of investigation in this investigators need to design a strategic process to conduct the search and seizure process after analyzing the crime scene. This will help them distribute tasks between the team members to complete the seizure and allow the team to use time and tools in a well-defined manner. Initial Search of the Scene Once the forensic team has arrived at the scene and unloaded their equipment, they will …

Planning the Search and Seizure of investigation Read More »

Documenting-the-Electronic-Crime-Scene

Documenting the Electronic Crime Scene

Documenting the Electronic Crime Scene is necessary to maintain a record of all the forensic investigation processes applied to identify, extract, analyze, and preserve the evidence. The details should include location of the crime, status of the system, connected network devices, storage media, smart phones, mobile phones, PDAs, Internet and network access, The document will help trace the serial numbers or other identifiers of the procured devices. Documenting also includes taking photographs, video, notes, and …

Documenting the Electronic Crime Scene Read More »

Understanding-Digital-Evidence-and-It’s-Types

Understanding Digital Evidence and It’s Types

Understanding Digital Evidence in this digital devices utilized in cyberattacks and different security breaches store some knowledge regarding the session, like login user, time, sort of association, science addresses, etc., which may act as proof for prosecuting the assaulter. Digital proof includes all such data that’s either keep or transmitted in digital type and has important price, so serving to investigators notice the wrongdoer. Digital proof is present across computing devices, servers, routers etc. it’s …

Understanding Digital Evidence and It’s Types Read More »

ISO-27001-Annex : A.11.2.7-Secure-Disposal-or-Re-use-of-Equipment

ISO 27001 Annex : A.11.2.7 Secure Disposal or Re-use of Equipment, A.11.2.8 Unattended User Equipment & A.11.2.9 Clear Desk and Clear Screen Policy

In this article explain ISO 27001 Annex : A.11.2.7  Secure Disposal or Re-use of Equipment, A.11.2.8 Unattended User Equipment & A.11.2.9 Clear Desk and Clear Screen Policy A.11.2.7  Secure Disposal or Re-use of Equipment Control- To avoid the removal or overriding of sensitive data and software by the disposal or reuse of any device containing storage medium, all devices must be reviewed. Implementation Guidance- Equipment should be tested to ensure that the storage media is …

ISO 27001 Annex : A.11.2.7 Secure Disposal or Re-use of Equipment, A.11.2.8 Unattended User Equipment & A.11.2.9 Clear Desk and Clear Screen Policy Read More »

ISO-27001-Annex : A.6.2-Mobile-Devices-and-Teleworking

ISO 27001 Annex : A.6.2 Mobile Devices and Teleworking

ISO 27001 Annex : A.6.2 Mobile Devices and Teleworking its objective is to ensure the security of teleworking and the use of mobile devices. A.6.2.1  Mobile Device Policy  Control- To manage the risks introduced by the use of mobile devices, a policy and supporting safety measures should be adopted.  Implementation Guidance- Special care should be taken when using mobile devices to ensure that business information is not compromised. The policy on mobile devices should take …

ISO 27001 Annex : A.6.2 Mobile Devices and Teleworking Read More »

The-10-Secrets-You-Will-Never-Know-About-Cyber-Security-And-Its-Important?

The 10 Secrets You Will Never Know About Cyber Security And Its Important?

The 10 Secrets You Will Never Know About Cyber Security And Its Important? Know about Cyber Security Whether you’re a techie or not, there’s a good chance that your life is very reliant on the net and its wonders. Your social media accounts are likely humming, and you recognize your way round the IOT devices you employ . All of those devices connect you to the cyber world in a method or another. Here are …

The 10 Secrets You Will Never Know About Cyber Security And Its Important? Read More »

life-cycle-of-forensics-information-in-the-system

Life Cycle of forensics information in the system

Forensics Information Life Cycle of forensics information in the system Forensics information in order to efficiently handle the numerous incidents that an organization may come across, it’s essential that the forensic issues be implemented into the existing system life cycle. A few such examples are as given below: • Maintaining a backup of the system on a regular basis• For securing centralized log servers, audit reports should be forwarded by auditing the workstations, servers, and …

Life Cycle of forensics information in the system Read More »