Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Welcome to keycybr"They want what you have got, don't give it to them""Think before post"Well in this podcast you will get familiar with Cyber Investigation domain. Cyber crime is on the rise henc... more
FAQs about CI&R WARRIORS:How many episodes does CI&R WARRIORS have?The podcast currently has 173 episodes available.
September 24, 2021WHAT EXACTLY IS A CYBER INVESTIGATIONCyber crime has an expansive definition that includes any crime conducted via the Internet, network or digital device. Capturing digital evidence, such as that found on cellular phones, GPS devices, computers, tablets and network servers, is crucial to investigating and solving cyber crimes.Featuring “keycybr” CI&R Intern “Kiruthika Nagarajan”Get in touch with her – https://www.linkedin.com/in/kikkee/...more12minPlay
September 24, 2021DOMINOS DATABASE LEAKA hacker has allegedly leaked customer data of Domino's, a pizza restaurant chain, according to information shared by a cybersecurity expert. The company has acknowledged the data breach but said that customers' financial information was not exposed because of it.Featuring “keycybr” CI&R Intern “Mohit Moan”Get in touch with him – https://www.linkedin.com/in/mohit-moan-13127792/...more14minPlay
September 15, 2021HOW DO COMPANIES AVOID SENDING OUT CONFIDENTIAL INFORMATIONBusinesses are storing an increasing amount of their information in the cloud. As such, it’s becoming far more difficult to prevent employees sharing confidential information with competitors. Stealing information may be as simple as forwarding an email containing client information to a personal email address, or copying information onto an external storage device. Employers must then remain alert to protect their business’ valuable assets. This article will outline the steps that prudent employers can take to deter former employees from stealing confidential information.Featuring “keycybr” CI&R Intern “Bhushan Ahire”Get in touch with him – https://www.linkedin.com/in/bhushan-ahire-a07a091a6/...more9minPlay
September 15, 2021WHAT ARE SOME MAJOR TAKEAWAYS FROM DIGITAL EVIDENCE?From a technical standpoint, the main goal of computer forensics is to identify, collect, preserve, and analyze data in a way that preserves the integrity of the evidence collected so it can be used effectively in a legal case.Featuring “keycybr” CI&R Intern “Jayant Verma”Get in touch with him – https://www.linkedin.com/in/jayant-verma-075543203/...more9minPlay
September 10, 2021CONSUMER PRODUCTS & PROTECTIONIt covers public, private, joint and cooperative sectors. The Act enshrines the rights of the consumer such as right to safety, right to be informed, right to be heard, and right to choose, right to seek redressal and right to consumer education. All of us are consumers of goods and services.Featuring “keycybr” CI&R Intern “Komal Yadav”Get in touch with her – https://www.linkedin.com/in/komal-yadav-664228180/...more13minPlay
September 10, 2021TESTIMONIAL EVIDENCETestimonial evidence is a statement made under oath. An example would be a witness pointing to someone in the courtroom and saying, “That's the guy I saw robbing the grocery store.” This is also called direct evidence or prima facie evidence. Physical evidence can be any object or material relevant in a crime.Featuring “keycybr” CI&R Intern “Mohamed Asan”Get in touch with him – https://www.linkedin.com/in/mohamed-asan-209a89212/...more11minPlay
September 10, 2021HOW CAN WE PROTECT DIIGITAL EVIDENCEThe storage and management of forensic evidence is an important part of the criminal justice system. Evidence management has also become a concern for private companies.An increasing number of corporate HR and IT departments find they need to manage evidence for internal investigations of data theft and acceptable use violations. Other companies are interested in collecting evidence to audit the effectiveness of their security programs. All of these companies will benefit from more systematic evidence management, but many have not yet learned the most effective processes used by law enforcement.Featuring “keycybr” CI&R Intern “Mansi”Get in touch with her – https://www.linkedin.com/in/mansi-253465205/...more11minPlay
September 03, 2021ANALOGICAL EVIDENCEOne of the weakest types of evidence in writing, analogical evidence compares something that is not certain or known with a situation that is known. Then, the text draws conclusions based on that comparison.Featuring “keycybr” CI&R Intern “Lokesh Dhakad”Get in touch with him – https://www.linkedin.com/in/lokeshdhakad/...more3minPlay
September 03, 2021EMAIL & INTERNET FRAUDEmail fraud (or email scam) is intentional deception for either personal gain or to damage another individual by means of email. Almost as soon as email became widely used, it began to be used as a means to defraud people. Email fraud can take the form of a "con game", or scam. Confidence tricks tend to exploit the inherent greed and dishonesty of its victims.Featuring “keycybr” CI&R Intern “Saurav Vashistha”Get in touch with him – https://www.linkedin.com/in/saurav-vashistha-335855196/...more13minPlay
FAQs about CI&R WARRIORS:How many episodes does CI&R WARRIORS have?The podcast currently has 173 episodes available.