Blog
Data Recovery Basic
Data Recovery

Basic Data Recovery

Project Name: Basic Data Recovery Description: Basic Data Recovery will help all digital forensics investigator to perform perform data recovery. Author: Rohit D Sadgune Summary of Content Basic Data Recovery File System Recovery Phases of basic data recovery Data Recovery is the process of extracting digital information in form of …

Read More
Fraud Invetigation
General

Fraud Investigation Concept

fraud investigation concept

Read More
Forensics Analysis
Digital Forensics

Forensics Analysis in India

Forensics Analysis in India Computer Forensics: – Computer forensics is the scientific examination and analysis of data held on, or retrieved from, degital storage media in such a way that the information can be used as evidence in a court of law to conclude suspect to culprit.  The Computer Forensic …

Read More
ProDiscover

ProDiscover Incident Response Project

ProDiscover Incident Response Project   Project Name: ProDiscover Incident Response Project Description: Step by step guide to ProDiscover Incident Response Author: Rohit D Sadgune Summary of Contents In this blog we will learn following things how to start prodiscover incident response Project number & case files Adding suspected evidence drive …

Read More
Digital Evidence India
Digital Forensics
1

Digital Evidence India

Digital Evidence India Types of digital evidence India Digital Evidence India The Court and Rule of Evidence – Digital Evidence  Rules of Procedure (Data compaction, Data Duplication/Authentication by Expert Data Compilation Information Discoverable Verification/validation, Standard followed Digital Forensic Science tool, technique, Approach, analysis and Process the digital evidence These evidence …

Read More
Cyber Threat
Indicator of Attack vs Indicator of Compromises

Indicator of Attack vs Indicator of Compromises Project Name: Indicator of Attack vs Indicator of Compromises (IOA vs IOC) Description: –  Cyber Threats are nothing but system to system attack that creates adversary’s efforts on the confidentiality, integrity, or availability of a digital information resident on system. Cyber-attacks are increasing in …

How to keep your cell phones secure
Cyber Threat
How to keep your cell phones secure

How to keep your cell phones secure Project Name: How to keep your cell phones secure Description: Mobile malware is spreading exponentially today, stealing personal and professional information which may ruin one’s financial, professional and mental health. This blog shares all simple tips to understand how one’s cell phone can be …

Power of Security Operation Center
Cyber Threat
Power of Security Operation Center

Power of Security Operation Center Project Name: Power of Security Operation Center Description: – Power of Security Operation Center is a concept of a highly skilled expert team working towards continuously monitoring and improving organizations security in the process of prevention, careful planning, detection and responding with a well-defined process. In …

Cyber Security Lifecycle
Cyber Threat
1
Cyber Security Lifecycle

Cyber Security Lifecycle Project Name: Cyber Security Lifecycle Description: Without applying a Lifecycle mechanism to a cyber security in any organization there arises an increased risk of cyber threats affecting the system. A systematic approach in any organization delivers and resist the cyber-attacks, persistent threats to a great extent. The cyber …

Types of System Software
Cyber Threat
Types of System Software

Types of System Software Project Name: Types of System Software Description: This blog will help to understand Types of System Software Author: Rohit D Sadgune / Amruta Sadgune Frequently Asked Question on Types of System Software What are different types of system software? What are the different types of software? …

Cyber Threat

Indicator of Attack vs Indicator of Compromises

Indicator of Attack vs Indicator of Compromises Project Name: Indicator of Attack vs Indicator of Compromises (IOA vs IOC) Description: –  Cyber Threats are nothing but system to system attack that creates adversary’s efforts on the confidentiality, integrity, or availability of a digital information resident on system. Cyber-attacks are increasing in …

How to keep your cell phones secure
Cyber Threat

How to keep your cell phones secure

How to keep your cell phones secure Project Name: How to keep your cell phones secure Description: Mobile malware is spreading exponentially today, stealing personal and professional information which may ruin one’s financial, professional and mental health. This blog shares all simple tips to understand how one’s cell phone can be …

Power of Security Operation Center
Cyber Threat

Power of Security Operation Center

Power of Security Operation Center Project Name: Power of Security Operation Center Description: – Power of Security Operation Center is a concept of a highly skilled expert team working towards continuously monitoring and improving organizations security in the process of prevention, careful planning, detection and responding with a well-defined process. In …

Cyber Security Lifecycle
Cyber Threat
1

Cyber Security Lifecycle

Cyber Security Lifecycle Project Name: Cyber Security Lifecycle Description: Without applying a Lifecycle mechanism to a cyber security in any organization there arises an increased risk of cyber threats affecting the system. A systematic approach in any organization delivers and resist the cyber-attacks, persistent threats to a great extent. The cyber …