Incident Response in Forensic Informatics

Hello dear KernelBlog followers. In this article, I will talk about the importance of the rules to be followed during Incident Response in Forensic Informatics. First of all, if we divide Forensic Informatics under three main headings, the first step is to identify, collect and preserve evidence. Special forces, law enforcement agencies, crime scene investigation[…]

E-Discovery

Hello dear Kernelblog followers. In this article, I will show you what is E-Discovery, and how to do it. E-discovery (e-discovery) is an inseparable part from the forensic informatics that emerged in the early 1990s. E-discovery can be defined as the discovery process in civil cases conducted for crimes committed electronically. It provides gathering and[…]

Zer0Day Attacks

A zero-day vulnerability is a software flaw that is not recognized or detected until exploited by a developer or vendor. They are often difficult to detect until the attacks occur. Attacks happen by abusing this vulnerability and spreading malware without allowing developers to release a patch or fix. If a software contains a security flaw,[…]

Information Security

Information Security is defined as the protection of information, as an asset, from unauthorized access, use, alteration, disclosure, modification, destruction, and disruption. It consists of three basic elements; Confidentiality: Protecting information from being accessed by unauthorized parties. Integrity: Preventing data from being modified in an unauthorized or undetected manner. Accessibility: Data, software, and hardware are[…]

Protecting Your WordPress Website

Hello, in this article I will talk about protecting your wordpress website. Let’s get into it without further ado. Keeping WordPress Updated The updating doesn’t just end with updating WordPress, you have to keep updated in every way. As example, let’s say in one of the communication forms’ 1.12.20 release there used to be a[…]

XSS Vulnerability: Exploitation and Preventation

In this article, we will talk about a web security vulnerability called XSS and it’s reasons, how to exploit it as well as how to prevent it. XSS (Cross Site Scripting) Vulnerability lets the attacker run javascript codes on the website using the input areas on it. The reason why this vulnerability appears is because[…]