KarWei

@KarWei

bruh

Joined on Aug 20, 2019

  • DFI Focus Areas Table of Contents [TOC] 01 Intro to Forensics Definition of Digital Forensics digital forensics
     Like  Bookmark
  • 12 Rooting and Jailbreaking Table of Contents [TOC] Rooting and Jailbreaking devices has restrictions limit app installation
     Like  Bookmark
  • 11 IOS Forensics Table of Contents [TOC] IOS iphone os = ios Enhanced Features on IOS
     Like  Bookmark
  • 07 Digital Forensics Lab Table of Contents [TOC] Forensic Lab Certification Requirements digital forensic lab whr u conduct inves.
     Like 4 Bookmark
  • 06 Analysis and Validation Table of Contents [TOC] What Data to Collect and Analyse depends on nature of inves. AND amt to process investigators often locate and recover specific items like emails - simplify speed processing
     Like  Bookmark
  • 05 Evidence Processing Table of Contents [TOC] Understanding File Systems file system - gives os road map to data on disk type of file system used determines how data is stored on disk
     Like  Bookmark
  • 04 Forensic Tools Table of Contents [TOC] Digital Forensic Tools Evaluating Tool Needs consider open src tools
     Like  Bookmark
  • 03 Data Acquisition Table of Contents [TOC] Data Acquisition before analyse data, need to secure goal of forensic data acquisition is to create forensic copy of piece of media that is suitable to use as evi in court of law
     Like  Bookmark
  • 01 Intro to Forensics Table of Contents [TOC] Overview digital forensics application of comp science and investigative procedures for legal purpose
     Like  Bookmark
  • 09 CSRF Table of Contents [TOC] CSRF CSRF malicious website cause user's browser to perform unwanted action on trusted site when user is auth
     Like  Bookmark
  • 10 Android Forensics Table of Contents [TOC] Android is open src phone platform based on linux kernel developed by google, now maintained by open handset alliance
     Like  Bookmark
  • 09 Cellular Mobile Networks Table of Contents [TOC] How do Cellphones Work? mode of communication full duplex
     Like  Bookmark
  • 08 Crime and Incident Scene Processing Table of Contents [TOC] Identifying Digital Evidence digital evi any info stored/transmitted in digital form
     Like  Bookmark
  • 08 Authentication and Authorisation Table of Contents [TOC] Authentication vs Authorisation auth process/action of proving/showing sth to be genuine, true or valid
     Like  Bookmark
  • 06 Preventing XSS Table of Contents [TOC] Middleware middleware func that receive req and res with 3rd arg of another func that will call the next middleware func if any
     Like  Bookmark
  • 05 Logging with Morgan Table of Contents [TOC] Logging collect and store data over time for analysis gain insights
     Like  Bookmark
  • 07 Preventing SQL Injection Table of Contents [TOC] SQL Injection Prevention Placeholders mysql query()
     Like  Bookmark
  • 02 Understanding Digital Forensics Table of Contents [TOC] Systematic Approach steps for prob solving make initial assessment abt case type
     Like  Bookmark
  • :::info AWS Certified Developer Associate DVA-C01 ::: 15 AWS Monitoring - Cloudwatch, X-Ray and Cloudtrial Table of Contents [TOC] Monitoring in AWS
     Like 1 Bookmark
  • :::info AWS Certified Developer Associate DVA-C01 ::: 18 DynamoDB Table of Contents [TOC] Introduction
     Like  Bookmark