Overview When a computer incident occurs, the attacked organization responds with a set of predetermined actions. Applying digital forensics techniques and protocols and looking at the above sources of evidence…
Category: Articles
ArticlesKey Elements in Cybercrime Investigations: Part 1
By Richard Kafui0Overview Digital forensics has been defined as the “process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable in any legal proceedings Computer related…
ArticlesCorporate Cybercrime Policies, Procedures and Investigations
By Richard Kafui0Overview of Cybercrime Computer related incidents or crimes are increasing in number and severity in recent times. Cybercrime has been defined as a crime in which a computer is the…
ArticlesComputer Forensics and Information Security: What are the differences?
By Richard Kafui0Overview The wide adoption of information technology and social media platforms is leading to increasing complex cybercrime, including corporate espionage, cyberwarfare, information warfare and sextortion. Newer means of communications technologies…
ArticlesCybersecurity and Information Security: Are they the same?
By Richard Kafui0Overview The field of Cybersecurity has become one of the most important and lucrative fields in ICT due to the rise of cybercrime rate the last decade. The terms cybersecurity,…
ArticlesThe Challenges of Cybercrime Investigations and Prosecution
By Richard Kafui0Overview As discussed in our last publication, every form of criminal’s act has a technology aspect in it. Investigators and prosecutors struggle to find enough evidence for cybercrime prosecution.…
ArticlesEnhancing Cybercrime Reporting
By Richard Kafui0Overview As discussed in our last publication, every form of criminal’s act has a technology aspect in it. Investigators and prosecutors struggle to find enough evidence for cybercrime prosecution. Besides…
