DiscoverCI&R WARRIORS
CI&R WARRIORS
Claim Ownership

CI&R WARRIORS

Author: keycybr

Subscribed: 9Played: 111
Share

Description

Welcome to keycybr
"They want what you have got, don't give it to them"
"Think before post"

Well in this podcast you will get familiar with Cyber Investigation domain. Cyber crime is on the rise hence, we have to be alert and aware about cyber security threats.

Cyber investigation is the process law enforcement officers use to track criminals via the computer. Computer crimes is an area of criminal activity that includes Internet fraud, pornography, hacking, copyright infringement, and malicious viral attacks.

173 Episodes
Reverse
Cyber crime has an expansive definition that includes any crime conducted via the Internet, network or digital device. Capturing digital evidence, such as that found on cellular phones, GPS devices, computers, tablets and network servers, is crucial to investigating and solving cyber crimes. Featuring “keycybr” CI&R Intern “Kiruthika Nagarajan” Get in touch with her – https://www.linkedin.com/in/kikkee/
DOMINOS DATABASE LEAK

DOMINOS DATABASE LEAK

2021-09-2413:51

A hacker has allegedly leaked customer data of Domino's, a pizza restaurant chain, according to information shared by a cybersecurity expert. The company has acknowledged the data breach but said that customers' financial information was not exposed because of it. Featuring “keycybr” CI&R Intern “Mohit Moan” Get in touch with him –  https://www.linkedin.com/in/mohit-moan-13127792/
Businesses are storing an increasing amount of their information in the cloud. As such, it’s becoming far more difficult to prevent employees sharing confidential information with competitors. Stealing information may be as simple as forwarding an email containing client information to a personal email address, or copying information onto an external storage device. Employers must then remain alert to protect their business’ valuable assets. This article will outline the steps that prudent employers can take to deter former employees from stealing confidential information. Featuring “keycybr” CI&R Intern “Bhushan Ahire” Get in touch with him – https://www.linkedin.com/in/bhushan-ahire-a07a091a6/
From a technical standpoint, the main goal of computer forensics is to identify, collect, preserve, and analyze data in a way that preserves the integrity of the evidence collected so it can be used effectively in a legal case. Featuring “keycybr” CI&R Intern “Jayant Verma” Get in touch with him – https://www.linkedin.com/in/jayant-verma-075543203/
It covers public, private, joint and cooperative sectors. The Act enshrines the rights of the consumer such as right to safety, right to be informed, right to be heard, and right to choose, right to seek redressal and right to consumer education. All of us are consumers of goods and services. Featuring “keycybr” CI&R Intern “Komal Yadav” Get in touch with her – https://www.linkedin.com/in/komal-yadav-664228180/
TESTIMONIAL EVIDENCE

TESTIMONIAL EVIDENCE

2021-09-1010:26

Testimonial evidence is a statement made under oath. An example would be a witness pointing to someone in the courtroom and saying, “That's the guy I saw robbing the grocery store.” This is also called direct evidence or prima facie evidence. Physical evidence can be any object or material relevant in a crime. Featuring “keycybr” CI&R Intern “Mohamed Asan” Get in touch with him – https://www.linkedin.com/in/mohamed-asan-209a89212/
The storage and management of forensic evidence is an important part of the criminal justice system. Evidence management has also become a concern for private companies. An increasing number of corporate HR and IT departments find they need to manage evidence for internal investigations of data theft and acceptable use violations. Other companies are interested in collecting evidence to audit the effectiveness of their security programs. All of these companies will benefit from more systematic evidence management, but many have not yet learned the most effective processes used by law enforcement. Featuring “keycybr” CI&R Intern “Mansi” Get in touch with her – https://www.linkedin.com/in/mansi-253465205/
hhhhhhh
ANALOGICAL EVIDENCE

ANALOGICAL EVIDENCE

2021-09-0302:50

One of the weakest types of evidence in writing, analogical evidence compares something that is not certain or known with a situation that is known. Then, the text draws conclusions based on that comparison. Featuring “keycybr” CI&R Intern “Lokesh Dhakad” Get in touch with him – https://www.linkedin.com/in/lokeshdhakad/
EMAIL & INTERNET FRAUD

EMAIL & INTERNET FRAUD

2021-09-0312:40

Email fraud (or email scam) is intentional deception for either personal gain or to damage another individual by means of email. Almost as soon as email became widely used, it began to be used as a means to defraud people. Email fraud can take the form of a "con game", or scam. Confidence tricks tend to exploit the inherent greed and dishonesty of its victims. Featuring “keycybr” CI&R Intern “Saurav Vashistha” Get in touch with him – https://www.linkedin.com/in/saurav-vashistha-335855196/
Identity management, also known as identity and access management, is a framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources. IdM systems fall under the overarching umbrellas of IT security and data management. Featuring “keycybr” CI&R Intern “Kavya Anil” Get in touch with her – https://www.linkedin.com/in/kavya-anil-626540143/ 
BLOCKCHAIN

BLOCKCHAIN

2021-09-0313:18

Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain. Featuring “keycybr” CI&R Intern “Rishabh Shrivastava” Get in touch with him – https://www.linkedin.com/in/rishabh-shrivastava-68b5041b4/
Cyber forensics is the process of acquisition, authentication, analysis and documentation of evidence extracted from and/or contained in a computer system, computer network and digital media. In Cyber Forensics, carving is a helpful technique in finding hidden or deleted files from digital media. Featuring “keycybr” CI&R Intern “Aditya D” Get in touch with him – https://www.linkedin.com/in/aditya-d-157807120/
Digital evidence is information stored or transmitted in binary form that may be relied on in court. It can be found on a computer hard drive, a mobile phone, among other place s. Digital evidence is commonly associated with electronic crime, or e-crime, such as child pornography or credit card fraud. Featuring “keycybr” CI&R Intern "Katikapally Yeswanth" Get in touch with him - https://www.linkedin.com/in/katikapally-yeswanth-7650331a2/
INTERNET OF THINGS

INTERNET OF THINGS

2021-08-3013:09

The Internet of Things describes the network of physical objects, so known as, "things" — that are embedded with sensors, software, and other technologies that is used for the purpose of connecting and exchanging data with other devices and systems over the Internet. Featuring “keycybr” CI&R Intern “Priyesh Singh” Get in touch with him – https://www.linkedin.com/in/thedante/
Some departments are assiduous about destroying evidence, say, one year after a defendant has either been acquitted or sentenced; others hold onto evidence indefinitely, figuring that they're better safe than sorry. Featuring “keycybr” CI&R Intern “Arunroy Thattil” Get in touch with him - https://www.linkedin.com/in/arunroythattil
DRONE FORENSICS

DRONE FORENSICS

2021-08-2706:30

Drone forensics is a branch of digital forensics relating to recovery of digital evidence or data from a drone under forensically sound conditions. Drones and all types of unmanned aerial vehicle (UAV's) are proven to be valuable sources of information in the majority of criminal investigations. Featuring “keycybr” CI&R Intern “Krishna Babu” Get in touch with her –  https://www.linkedin.com/in/krishna-babu-16b626140/
CYBER CAFE FRAUD

CYBER CAFE FRAUD

2021-08-2711:49

In general, modus operandi is the method acquired by any criminal for the successful commission of a crime. At a minimum, every Modus Operandi will contain three basic elements namely: ❖ Ensure success of the crime; ❖ Protect identity; and ❖ Facilitate effective escape. Featuring “keycybr” CI&R Intern “Pandugayala Nithin Yadav” Get in touch with him – https://www.linkedin.com/in/pandugayala-nithin-yadav-2a4b2a166/
OPEN SOURCE SECURITY

OPEN SOURCE SECURITY

2021-08-2710:32

Open Source Security, commonly referred to as Software Composition Analysis (SCA), is a methodology to provide users better visibility into the open source inventory of their applications. This is done by examining components via binary fingerprints, utilizing professionally curated and proprietary research, matching accurate scans against that proprietary intelligence, as well as proving developers this intelligence directly inside their favorite tools. Featuring “keycybr” CI&R Intern “Gaurav Kumar” Get in touch with him – https://www.linkedin.com/in/gaurav-kumar-0446b2182/
CYBER TRAFFICKING

CYBER TRAFFICKING

2021-08-2704:31

Cyber-trafficking refers to the use of cyber-space for: • the recruitment of victims; • advertisement of victims, • advertisement of victims' services or victims' organs; and for • attracting clients. Very often the term of “virtual trafficking” is used instead of “cy- ber-trafficking”. Featuring “keycybr” CI&R Intern “Aliasgar Chatiwala” Get in touch with him – https://www.linkedin.com/in/aliasgar-chatiwala-2845181b9
loading
Comments