Legal & Tech Law Dispatch
All You Need to Know About Common Vulnerabilities, Attack Vectors, and Mitigation Techniques
Staying ahead of emerging vulnerabilities and threat vectors drastically minimizes organizational risk. This article provides an overview of common vulnerabilities in financial systems, the typical attack vectors hackers deploy to target them, and proven mitigation strategies security teams utilize to strengthen protection. Most Prevalent Vulnerabilities Several vulnerabilities frequently targeted in financial services include: SQL Injection … Continue reading All You Need to Know About Common Vulnerabilities, Attack Vectors, and Mitigation Techniques
Study Notes on Cyber Laws & Intellectual Property Rights – Cyber Forensics | Elective Paper-IV SEM 4
Unit 1: Fundamentals of Cyber Law Introduction to Cyber Space Jurisprudence of Cyber Law Scope of Cyber Law Cyber Law in India Special Reference to Information Technology Act, 2000 (as amended) Information Technology Act, 2008 Introduction to Cyber Space Definition: Cyber space refers to the virtual environment created by interconnected computer systems. Example: Websites, social … Continue reading Study Notes on Cyber Laws & Intellectual Property Rights – Cyber Forensics | Elective Paper-IV SEM 4
Study Notes on Security Testing – Cyber Forensics | Core Paper- XVI SEM 4
Unit 1: Access Control Testing Access Control Tests of Networks (External Interface) Networks (Internal Interface and DMZ) Physical Access Testing Piggybacking Anonymous Entry Break-in Wireless Access Testing Board Classes of Testing Black Box of Zero Knowledge Crystal Box or Full Knowledge Testing Grey Box Testing Unit 2: Security Audit Choosing the Standard Against Which to … Continue reading Study Notes on Security Testing – Cyber Forensics | Core Paper- XVI SEM 4
Study Notes on Business Continuity & Disaster Recovery Management – Cyber Forensics | Core Paper- XV SEM 4
Unit 1: Introduction Introduction to Business Continuity Management (BCM) and Disaster Recovery (DR) Terms and Definitions BCM Principles BCM Lifecycle BCM Programme Management Understanding the Organization Determining Business Continuity Strategy Developing and Implementing a BCM Response BCM Exercising Maintaining and Reviewing BCM Arrangements Embedding BCM in the Organization’s Culture BCM in Business: Benefits and Consequences … Continue reading Study Notes on Business Continuity & Disaster Recovery Management – Cyber Forensics | Core Paper- XV SEM 4
Study Notes on Governance, Risk & Compliance – Cyber Forensics | Core Paper- XIV SEM 4
Unit 1: Governance, Risk & Compliance Definition, Scope, and Objectives – IT Governance Metrics & Framework – BASEL – OECD Unit 2: Best Practices for IT Governance ITIL ISO/IEC 27001 Control Objectives of Information and Related Technology (COBIT) The Information Security Management Maturity Model Capability Maturity Model Any other latest standards and compliance technologies Unit … Continue reading Study Notes on Governance, Risk & Compliance – Cyber Forensics | Core Paper- XIV SEM 4
Study Notes on Application Security – Cyber Forensics | Core Paper- XIII SEM 4
Unit 1: Application Types Client/Server Applications Components of Client/Server Applications (Logical & Physical Architecture) Web Applications About Web Applications Technologies used to create Web Applications Components of Web Application Architecture Data Warehouse Applications About DW Applications Uses Physical & Logical Architecture Management Information Systems Unit 2: Web application security Introduction to web application Primer OWASP … Continue reading Study Notes on Application Security – Cyber Forensics | Core Paper- XIII SEM 4
Study Notes on Data Privacy – Cyber Forensics | Elective Paper- III SEM 3
Unit 1: Introduction to Privacy Data Protection & Privacy Terminologies Data Protection Principles and Approaches to Privacy Code for Protection of Personal Information Information Life Cycle Data Security Threats and Mitigation Data Storage Security Issues in Cloud Computing Data Protection & Privacy Terminologies Data Protection: Safeguarding data from unauthorized access and ensuring its confidentiality and … Continue reading Study Notes on Data Privacy – Cyber Forensics | Elective Paper- III SEM 3
Study Notes on Advanced Information Security – Cyber Forensics | Core Paper- XI SEM 3
Unit 1: Digital Rights Management Meaning of Digital Rights Management (DRM) Need for DRM and preventing illegal file sharing on the Internet DRM schemes – Microsoft DRM 2.0, and the Content Scrambling System Reasons why DRM schemes have been unsuccessful so far Requirements for a good DRM scheme – secure hardware, secure software, and an … Continue reading Study Notes on Advanced Information Security – Cyber Forensics | Core Paper- XI SEM 3
Study Notes on Advanced Cyber Forensics – Cyber Forensics | Core Paper- X SEM 3
Unit 1: Windows Forensics Volatile Data Collection Memory Dump System Time Logged On Users Open Files Network Information (Cached NetBIOS Name Table) Network Connections Process Information Process-to-Port Mapping Process Memory Network Status Clipboard Contents Service/Driver Information Command History Mapped Drives Shares Non-Volatile Data Collection Disk Imaging (External Storage such as USB and Native Hard Disk) … Continue reading Study Notes on Advanced Cyber Forensics – Cyber Forensics | Core Paper- X SEM 3
Study Notes on Database Management Security – Cyber Forensics | Core Paper- IX SEM 3
Unit 1: Fundamentals of Databases What is a Database? DBMS – Purpose of DB and Users of DB Components of DB Concepts of RDBMS Basic SET Concepts (SET, Subset) Set of Ordered Tuples – Relations as a DB (Concepts of PK, FK, Surrogate Keys, Composite Keys, Candidate Keys) Relational DB Operators (Cartesian Product, Union, Intersect, … Continue reading Study Notes on Database Management Security – Cyber Forensics | Core Paper- IX SEM 3