background preloader

International Journal of Cyber-Security and Digital Forensics (IJCSDF)

International Journal of Cyber-Security and Digital Forensics (IJCSDF)
About this Journal The International Journal of Cyber-Security and Digital Forensics (IJCSDF) is a knowledge resource for practitioners, scientists, and researchers among others working in various fields of Cyber Security, Privacy, Trust, Digital Forensics, Hacking, and Cyber Warfare. We welcome original contributions as high quality technical papers (full and short) describing original unpublished results of theoretical, empirical, conceptual or experimental research. All submitted papers will be peer-reviewed by members of the editorial board and selected reviewers and those accepted will be published in the next volume of the journal. As such, IJCSDF reserves the right to select only best submitted papers for publication. All submitted papers would be reviewed by at least two reviewers and one member of editorial committee. IJCSDF is an open access journal which means that all content is freely available without charge to the user or his/her institution. Important Notes:

Related:  tiggerfanaticantoniotanCybersecurityIT Sec

Google's Python Class - Educational Materials Welcome to Google's Python Class -- this is a free class for people with a little bit of programming experience who want to learn Python. The class includes written materials, lecture videos, and lots of code exercises to practice Python coding. These materials are used within Google to introduce Python to people who have just a little programming experience. The first exercises work on basic Python concepts like strings and lists, building up to the later exercises which are full programs dealing with text files, processes, and http connections.

Simple Workflow Service - Cloud Workflow Management Amazon SWF promotes a separation between the control flow of your background job's stepwise logic and the actual units of work that contain your unique business logic. This allows you to separately manage, maintain, and scale "state machinery" of your application from the core business logic that differentiates it. As your business requirements change, you can easily change application logic without having to worry about the underlying state machinery, task dispatch, and flow control. Amazon SWF runs within Amazon’s high-availability data centers, so the state tracking and task processing engine is available whenever applications need them. Amazon SWF redundantly stores the tasks, reliably dispatches them to application components, tracks their progress, and keeps their latest state. Amazon SWF replaces the complexity of custom-coded workflow solutions and process automation software with a fully managed cloud workflow web service.

FireEye predictions for cybersecurity in 2015 Sony is still smarting over a cataclysmic cyberattack, US banks, Target and Staples have all been targeted, and it seems hackers are always one step ahead. But what can we expect from next year? Security flaws Heartbleed, Cryptolocker and Shellshock have all had their time in the media spotlight, companies are reviewing their risk management and damage control processes, and investment is being pumped into training the next generation of cybersecurity experts in an attempt to keep corporate network intrusion to a minimum. Mobile and Web-based viruses remain a scourge, and hardly a week goes by without hearing of another data breach or a new strain of malware being discovered in the wild. According to Greg Day, CTO of the EMEA region at security firm FireEye , these situations are likely to deepen and worsen over the coming year and into 2015. The security and forensics firm predicts that in the technical realm, mobile ransomware will surge in popularity.

7 Clever Google Tricks Worth Knowing Email Below I have compiled a list of 7 clever Google tricks that I believe everyone should be aware of. Together I think they represent the apex of the grand possibilities associated with Google search manipulation tricks TR-069 Other forums, such as the Home Gateway Initiative (HGI), Digital Video Broadcasting (DVB) and WiMAX Forum endorsed CWMP as the protocol for remote management of home network devices and terminals (such as the DVB IPTV set-top box). There is a growing trend to add TR-069 management functionality to home networking devices behind the gateway, as well as many other access devices like M2M,[3] FTTH CPE/ONTs, WIMAX CPE[4] and other carrier access equipment. Communication between the device and ACS[edit] Transport details[edit] CWMP is a text based protocol. Orders sent between the device (CPE) and auto configuration server (ACS) are transported over HTTP (or more frequently HTTPS).

free CCENT/ICND1 practice tests You can try our demo/free practice tests to have a feel of our premier practice test questions. Please use the link below to create your free account. Once you activate your free account, you can access our free tests and upgrade to the paid tests anytime. Available Free Practice Tests Free CCENT/ICND1 Practice Test : 15 questions. Free ICND2 Practice Test : 17 questions.

Microsoft Azure for Research The Microsoft Azure for Research project facilitates and accelerates scholarly and scientific research by enabling researchers to use the power of Microsoft Azure to perform big data computations in the cloud. Take full advantage of the power and scalability of cloud computing for collaboration, computation, and data-intensive processing. Microsoft Azure is an open platform that supports languages, tools, or frameworks, such as Linux, Python, Java, Hadoop, and Microsoft .NET Framework. Cyber Security In today’s information economy, data can be your organization’s most valuable asset — but with the rise of mobile technology, cloud computing and an exponentially growing volume of digital information, keeping that data secure also becomes one of your greatest challenges. No one is immune to data loss incidents — and no one is better equipped than Kroll to help you identify and close gaps that put your organization’s cyber security at risk. Information security issues — such as data breaches or employee misconduct — are a constant worry for C-suite leaders as well as for front-line managers in your organization. Cyber security challenges put sensitive data at risk and can cost your company time, revenue and resources. At Kroll, we know securing and managing electronically stored information (ESI) is critical to the future of your business. Sign up for our monthly newsletter and receive expert insight into the latest issues and trends in privacy and data security.

5 Best Practices in Data Breach Incident Response It goes without saying that all IT organizations should have an active Incident Response (IR) Plan in place – i.e. a policy that defines in specific terms what constitutes an information security incident, and provides a step-by-step process to follow when an incident occurs. There’s a lot of good guidance online about how to recruit a data breach response team, set initial policy, and plan for disaster. For those organizations already prepared for IT incident response, be aware that best practices continue to evolve. The best IR plans are nimble enough to adjust over time.

GPS Waypoints Editor Record hiking trails, backpacking trips, and camping adventures with Backpacker GPS Trails Pro. View maps, navigate with GPS and digital compass, take photos, and backtrack to the trailhead. GPS Trails Pro works in remote places like national parks, wilderness areas, and backcountry spots without relying on data and cell signals. Multi-tenancy in the cloud: Why it matters Whether an IT organization is going with public or private clouds, it's important to understand the nuances of multi-tenant architecture. For public clouds, IT managers need to understand the degree of multi-tenancy supported by whichever vendor they are looking at. For private clouds, the entire responsibility of designing a multi-tenant architecture rests with the IT managers. Enterprise cloud adoption has gone beyond the levels of intellectual pursuits and casual experimentation.

California data breach law AB1710 stirs up debate on notification requirements California Assembly Bill No.1710 (AB 1710) was signed into law on September 30, 2014, and amends California’s existing data protection laws, in part by setting forth requirements on what to do if protected data is exposed. AB1710 takes effect this January 1st, 2015, and there has already been much speculation and debate regarding several key pieces of the legislation. One such point of debate is the wording that amends what must be done if data is breached, which now states that a breached entity must “offer to provide appropriate identity theft prevention and mitigation services, if any, to the affected person at no cost for not less than 12 months if the breach exposed or may have exposed specified personal information.” It is the use of “if any” as a modifier that is causing contention; i.e., does this phrasing mandate services, or simply that entities choosing to offer services must do so for 12 months? The de facto offering is, of course, credit monitoring.

The 10 Windows group policy settings you need to get right In the enterprise, one of the most common ways to configure Microsoft Windows computers is with group policy. For the most part, group policies are settings pushed into a computer's registry to configure security settings and other operational behaviors. Group policies can be pushed down from Active Directory (actually, they're pulled down by the client) or by configuring local group policy. The ability to set and configure security settings using group policy is one of the big advantages of working with Windows computers. Yes, many operating systems today have comparable management systems, but Windows has had group policies since Windows NT 4.0 Service Pack 4, released in October 1998. Ah, I can still remember using secedit.exe to configure local group policies.

Five tips to secure your cloud future (c) The cloud has been central to the business workings of organisations. Reliance on the cloud as a central storage tool highlights the importance of security.