• 19 min read The Evolution of Computer Networking Technology This report will describe three phases of computer networking with the first being the early development of common principles such…
• 3 min read 5 Skills to Start a Career in Digital Forensics Cybersecurity and information technology are two of the fastest growing industries in the technology space. It is expected that with…
• 2 min read Not-Petya Cyber Attack (Russia vs Ukraine) One of the most recent attacks using malware was an event known as NotPetya (Not-pet-ya) which involved a massive Russian…
• 1 min read What is Cyber Crime? Cybercrime, also known as computer crime or digital crime, refers to criminal activity that involves the use of computers or…
• 1 min read Uniform Computer Information Transactions Act (UCITA) The Uniform Computer Information Transactions Act (UCITA) is a law that was developed by the National Conference of Commissioners on…
• 2 min read Uniform Electronic Transactions Act The Uniform Electronic Transactions Act is a law that was established in 1999 by the National Conference of Commissioners on…
• 1 min read The Privacy Act of 1974 The Privacy Act of 1974 was developed in order to established a standardized set of principles and guidelines regarding the…
• 2 min read The Computer Security Act The The Computer Security Act was created in 1987 by U.S. Congress in order to enhance security policies surrounding…
• 2 min read Health Insurance Portability and Accountability Act (HIPAA) Health Insurance Portability and Accountability Act (HIPAA) is a law within the United States that protects individuals’ privacy rights in…
• 1 min read Computer Fraud and Abuse Act The Computer Fraud and Abuse Act (CFAA) is a federal law in the United States that criminalizes computer-related fraud and…
Volatility: Digital Forensics The Volatility Framework is an open source digital forensics software created by the Volatility Foundation. Volatility is a tool that…
• 1 min read What is a MAC Address? The Media Access Control address or MAC address is unique address similar to an IP address that is associated with…