Skip to main content

Posts

Showing posts from October, 2018

Computer Forensics Resources

  Computer Forensics Resources The 4 Most Important Steps of Computer Forensics Investigation http://www.netconclave.com/blog/the-4-most-important-steps-of-computer-forensics-investigation/ What to Bring on a Computer Forensics Investigation https://www.csoonline.com/article/2120792/investigations-forensics/what-to-bring-on-a-computer-forensics-investigation.html   https://toolcatalog.nist.gov/populated_taxonomy/index.php Forensic Readiness Planning https://www.ncsc.gov.uk/content/files/guidance_files/IG%2018%20-%20Forensic%20Readiness%20Planning%20-%20Issue%201.1%20Oct%202015%20-%20NCSC%20Web.pdf FORENSICS CHECKLIST http://webarchive.nationalarchives.gov.uk/20050302073058/http://www.dti.gov.uk/bestpractice/assets/security/forensics_and_the_law.pdf GOV.UK https://www.gov.uk/government/organisations/department-for-business-energy-and-industrial-strategy Digital Forensics / Incident Response Forms, Policies, and

Biometrics authentication

https://www3.nhk.or.jp/nhkworld/en/news/20181004_41/ Fujitsu says the new technology identifies people by their unique biological information such as veins in their palms and facial data. Palm authentication technology is already used in automatic teller machines at banks but needs to be supplemented by data provided by a cash card and a pin number. An enormous amount of data is needed to identify people accurately with only the information on the veins in their palms. Therefore, the technology is a limited now. Fujitsu says it has developed a system to boost data processing capability. By combining information on the veins in palms and facial recognition, it will take only a second to identify a million people without using pin numbers. The company says it plans to make it practical within fiscal 2020. An engineer at the Fujitsu Laboratories, Hiroshi Tsuda, says that the technology will be especially helpful in case of a disaster as people can make paymen

All things Internet - a List of References

Published guidance NCSC’s guidance is aimed at helping UK government departments, agencies, the critical national infrastructure and its supply chains protect their information and systems. It also has relevance for local government and the wider public sector. https://www.ncsc.gov.uk/index/guidance?page=1 ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of expertise for cyber security in Europe. https://www.enisa.europa.eu/topics Expectations for Computer Security Incident Response https://tools.ietf.org/rfc/rfc2350 Internet Security Glossary https://www.ietf.org/rfc/rfc2828.txt   PKCS #10: Certification Request Syntax Specification Version 1.7 https://tools.ietf.org/rfc/rfc2986.txt   Guidelines for Evidence Collection and Archiving https://www.ietf.org/rfc/rfc3227.txt

Amazon must be missing me - really!

Christmas goods are appearing on shop shelves now and email offers are filling the inbox -but that's not really news. What's news to me is Amazon.com must be missing me as they have sent me email telling me they have products that would interest me - really! You see, being such a big spender (a whopping £90 in just 12 months) on Amazon.co.uk they (Amazon.com) have got this jealousy hang up right before Christmas and sent me SPAM - really! On the otherhand it may be a test - they've been looking at my LinkedIn profile recently and perhaps want to test my information assurance knowledge. So, if you're reading, the email had no obligatory unsubscribe or update preference option and I didn't give Amazon UK permission to share my details. By the way, since I use DuckDuckGo most ads are irrelevant and would I want to import Bluetooth earphones and pay all that shipping - really!