public • 2 min read IPv4 and IPv6 IPv4 Internet Protocol version 4 or IPv4 is the standard IP address used since the early 80’s. IPv4 is…
public • 2 min read The OSI Model The Open Systems Interconnection Model or OSI Model is logical structure for understanding computer networking designed by the International Organization…
public • 3 min read Quality of Service in Computer Networking QoS is an essential element of network architecture that is commonly used at the enterprise level. In environments where certain…
public • 2 min read What is the Cyber Domain? The cyber domain as it is referred to in the reading materials, is essentially a combination of space, various threat…
public • 12 min read An Evaluation of Digital Forensics Tools Introduction This report covers five digital forensics software tools that vary in user difficulty from the beginner to intermediate level.…
public • 3 min read What is a Cyber Act of War? U.S. Legal defines an act of war with the following description. “An act of war is an action by…
public • 1 min read U.S. Law and Cybersecurity The U.S. government began to take cybersecurity more seriously over the last two decades as numerous cyber attacks and…
public • 1 min read What is Digital Forensics? Digital forensics is an element of cybersecurity that focuses on the acquisition, recovery, investigation and analysis of digital material found…
public • 1 min read What is SIM Swapping? The subscriber identity module (SIM) card is a small physical and now electronic component of a cell phone that allows…
public • 2 min read Types of Digital Forensics There are four primary types of digital forensics which includes computer forensics, mobile forensics, network forensics and cloud forensics. Other…
public Ghiro: Image Forensics Ghiro is a free tool used for image forensics. The tool allows the user to easily extract and analyze EXIF,…
public • 2 min read Chain of Custody Chain of custody is the trail of documentation that links each piece of evidence to an aspect of a law…