Category: Investigation Techniques

  • Signature Based Detection of User Events for Post-Mortem Forensic Analysis

    Signature Based Detection of User Events for Post-Mortem Forensic Analysis

    The concept of signatures is used in many fields, normally for the detection of some sort of pattern. For example, antivirus and network intrusion detection systems sometimes implement signature matching to attempt to differentiate legitimate code or network traffic from malicious data. The principle of these systems that that within a given set of data, malicious data…

  • Social Media and Intelligence Gathering

    Online social media has changed the way many people, businesses and even governments interact with each other. Because of Twitter’s popularity and its ability to broadcast small pieces of information to a large number of people, it is an effective form of mass communication. However, ease in communication that allows the public to freely communicate…