Fighting cyber threats, fraud, or both – Join IBM Cyber Beat Live on JULY 26, 2016 | 12:30PM ET (11:30AM CT)
Many of us have been victims of a fraud attack—often, multiple times in one...
Changing Passwords Regularly is Doing More Harm Than Good How often do you change your passwords? Every month? Every year? …Read More
In this article we will look at the environment in which eForensics exists; the legal and regulatory regimes in which systems and cyber criminals operate. We perform forensic analysis on systems to investigate a crime and hopefully prosecute a criminal; but to do that we need to understand which laws and regulations have been broken. There are pitfalls in working out what laws and regulations are in operation for a particular context; as what is illegal in one regime may not be in another, and is it the law in the location of the system or the criminal that applies? The information here forms the underlying legal knowledge in the CISSP certification and underpins the International Information Systems Security Certification Consortium (ISC)2 body of knowledge.Read More