You are here:-Computer Forensic Investigations

Threat Modeling And Vulnerability Assessment – Walmart

1.                Abstract Threat modeling and vulnerability assessment are new methodologies that are being adopted in the development of applications and information systems in order to protect the information in a better way. In this paper, we will talk about why Walmart needs these methodologies despite its security programs and how the company can benefit from

CyberStalking and Child Pornography – Case Analysis

Report On 14th August 2014, a cybercriminal named Michael Martinez was arrested on a charge of multiple charges that he had been committing from October 2013. The suspect was charged with sextortion, cyberstalking, and child exploitation with one minor charge. The arrest of the suspect as “Del Rio Man Arrested on Federal Cyberstalking and Child

Cyber Security Principles – Question Answer

Malware has been around for a long. You are asked to investigate a particular malware and answering the following questions (in complete sentences) based on Internet research: What is the common name and any pseudonyms or variant names? The malware dyreza has been a threat to the banks as it tries to steal the credentials

McAfee Antivirus – Assessment

McAfee antivirus McAfee antivirus is the first antivirus program ever introduced in computer market in order to keep the computer running without any interruption by the viruses. It sold around 1 million copies for its first antivirus. Now it has been acquired by Intel and now has been renamed as Intel Security. Intel decided to

Which technologies are used to collect and use these data that make up A “digital footprint”? – Annotated Bibliography

Malhotra, A., et.al. 2012. Studying User Footprints in Different Online Social Networks. 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1065 - 1070. This article is merely concerned about gathering the digital footprints of the users online and to use that digital footprint to find out their membership on other