Month: December 2014

  • Introduction to computer forensics and investigations

    This post was republished to Triathlon John at 17:51:12 17/12/2014 Introduction to computer forensics and investigations These are my notes from the course provided by OpenLearn, they are not intended to provide guidance in a work environment and I accept no responsibility for how these are used – they are simply my notes made from…

  • Introduction to cyber security – Week 8, Managing security risks

    Information as an asset Information is valuable but can be lost or stolen. Considering information as an asset allows creation of strategies for protecting info and minimising consequences of disaster. Information assets vary by organisations/individuals: Doctors surgery Medical records Contact lists Emails Employee records Manufacturer Order books Staff records Bank references Supplier & customer correspondence…

  • Introduction to cyber security – Week 7, When your defences fail

    Identity theft Preventing identity theft – ensure AV software is up to date, do not respond to phising emails. Detecting identity theft Unexplained bank withdrawals or credit card charges Bills & other expected official letters don’t arrive Cards/cheques decline Notified that their information has been breached/compromised Connected by bank/credit card company about suspicious activity Loss…