Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Welcome to keycybr"They want what you have got, don't give it to them""Think before post"Well in this podcast you will get familiar with Cyber Investigation domain. Cyber crime is on the rise henc... more
FAQs about CI&R WARRIORS:How many episodes does CI&R WARRIORS have?The podcast currently has 173 episodes available.
July 29, 2021NET THREAT I.E. MORPHING PICTURE FOR REVENGEThe internet has given rise to a new industry for the online publication and consumption of obscene materials. The online sites represent the largest growth sector of digital economy. Gradually increase of electronic devices has given rise to so many offences like cyber bullying, cyber stalking and pornographic and etc. Photo morphing is the offence which is increasing in cyber space as compare to any other offences in cyber world.Featuring “keycybr” CI&R Intern “Taranga Dutta”Get in touch with him – https://www.linkedin.com/in/tarangadutta/...more3minPlay
July 29, 2021DATA LOSS PREVENTIONData loss prevention software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use, in motion, and at rest. The terms "data loss" and "data leak" are related and are often used interchangeably.Featuring “keycybr” CI&R Intern “Abhishek Kumar”Get in touch with him – https://www.linkedin.com/in/anjaanabishek/...more13minPlay
July 29, 2021WEB SERVER ATTACKSAn internet server attack typically involves pre planned activities called an attack methodology that art attacker follows to succeed in the goal of breaching the target web server's security. Attackers hack an internet server in multiple stages.Featuring “keycybr” CI&R Intern “Shubham Parge”Get in touch with him – https://www.linkedin.com/in/iamshubhamparge/...more11minPlay
July 28, 2021MOBILE THREATSLike viruses and spyware that can infect your PC, there are a variety of security threats that can affect mobile devices. We divide these mobile threats into several categories: application-based threats, web-based threats, network-based threats and physical threats.Featuring “keycybr” CI&R Intern “Himanshu Paliwal”Get in touch with him - https://www.linkedin.com/in/himanshupaliwal4...more15minPlay
July 28, 2021FORENSIC EXAMINATION OF DIGITAL EVIDENCEDigital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.Featuring “keycybr” CI&R Intern “Kritika Shrivastava”Get in touch with her – https://www.linkedin.com/in/kritika-shrivastava-63564320a...more11minPlay
July 28, 2021ELECTRONICS EVIDENCE & ITS CHALLENGESToday, the biggest challenge the Courts have to deal with regard to electronic evidence is its authenticity, veracity, genuineness and reliability for it to be admissible before the court of law.Featuring “keycybr” CI&R Intern “Divyadharshini M”Get in touch with her – https://www.linkedin.com/in/divyadharshini-mohan-66a4071aa/...more13minPlay
July 28, 2021ADVANTAGES OF CYBER LAWCyber Security provides protection against theft of data, protects computers from theft, minimizing computer freezing, provides privacy for users, it offers strict regulation, and it's difficult to work with non-technical people.Featuring “keycybr” CI&R Intern “Biswajeet Ray”Get in touch with him – https://www.linkedin.com/in/biswajeet-ray-397742200/...more8minPlay
July 28, 2021WHERE DOES EVIDENCE GET STOREDMost evidence should be stored at room temperature, unless it is liquid evidence, in which case it should be refrigerated and packaged in a sterile glass or plastic bottle.Featuring “keycybr” CI&R Intern “Dheeraj Khandelwal”Get in touch with him –...more6minPlay
July 28, 2021DARK WEBThe dark web refers to encrypted online content that is not indexed by conventional search engines. Sometimes, the dark web is also called the dark net. The dark web is a part of the deep web, which just refers to websites that do not appear on search engines.Featuring “keycybr” CI&R Intern “Manav Pundhir”Get in touch with him – https://www.linkedin.com/in/manav-pundhir-2a38b91b5/...more5minPlay
July 28, 2021CHARACTER EVIDENCECharacter evidence is a term used in the law of evidence to describe any testimony or document submitted for the purpose of proving that a person acted in a particular way on a particular occasion based on the character or disposition of that person.Featuring “keycybr” CI&R Intern “Raajisa v v”Get in touch with her – https://www.linkedin.com/in/raajisa-vv-b825821a1 ...more13minPlay
FAQs about CI&R WARRIORS:How many episodes does CI&R WARRIORS have?The podcast currently has 173 episodes available.