Spoofing and Anonymization (Hiding Network Activity)
Introduction Forensic investigators should always pay heed to the possibility of a cybercriminal to have been using spoofing and anonymizing techniques to cover the tracks left by his digital...
View ArticleData Integrity and Backups
Introduction Data integrity means that a given data set is accurate, complete, consistent, unchanged (original or a true copy) and trustworthy throughout its entire lifecycle, which is ensured through...
View ArticleCommon Security Threats Discovered Through Vulnerability Assessments
Common Security Threats Discovered Through Vulnerability Assessments A vulnerability assessment can efficiently highlight a huge number of diverse security issues. Here are our top 10 security threats...
View ArticleCommon Vulnerability Assessment Types
A vulnerability assessment is a process so complicated that it often requires a comprehensive approach. This would mean that a multiple sub-assessments are to be executed – each of which spanning...
View ArticleMachine Learning for Social Engineering
Social engineering is a form of communication that aims at gaining people’s trust at first and then prompting them to share sensitive information or do something the attacker would take advantage of,...
View ArticleEngineering a Twitter spearphishing bot from machine learning
The term bot is derived from a web robot. A web robot is a type of software that can perform automated tasks over the internet and it is enhanced with machine learning capabilities. In 2014, Twitter...
View ArticleEngineering voice impersonation from machine learning
Text-to-speech (TTS) synthesis is the computer’s way of transforming text to audio. Most popular AI-driven personal assistants rely on TTS software to generate as natural-sounding speech as possible....
View ArticleEngineering speech recognition from machine learning
Speech recognition operates on human inputs that allow users to communicate with machines (e.g., computers, smartphones and home assistants) and machines to respond to an implanted voice. To work...
View ArticleEngineering personality analysis from machine learning
Machine learning (ML) is used to predict many things in our life, such as bitcoin prices, sports results, weather forecasts and movie ticket prices. Numerous researchers have shown that machine...
View ArticleInformation and asset classification in the CISSP exam
This article is part of our CISSP certification prep series. For more CISSP-related resources, see our CISSP certification hub. This article will help you answer two questions related to the CISSP...
View Article
More Pages to Explore .....