Incident Response in Forensic Informatics

Hello dear KernelBlog followers. In this article, I will talk about the importance of the rules to be followed during Incident Response in Forensic Informatics. First of all, if we divide Forensic Informatics under three main headings, the first step is to identify, collect and preserve evidence. Special forces, law enforcement agencies, crime scene investigation[…]

E-Discovery

Hello dear Kernelblog followers. In this article, I will show you what is E-Discovery, and how to do it. E-discovery (e-discovery) is an inseparable part from the forensic informatics that emerged in the early 1990s. E-discovery can be defined as the discovery process in civil cases conducted for crimes committed electronically. It provides gathering and[…]

Zer0Day Attacks

A zero-day vulnerability is a software flaw that is not recognized or detected until exploited by a developer or vendor. They are often difficult to detect until the attacks occur. Attacks happen by abusing this vulnerability and spreading malware without allowing developers to release a patch or fix. If a software contains a security flaw,[…]