-
Mustafa Al Shalchi wrote a new post on the site MIS 5213 Summer 2016 8 years, 6 months ago
Hi All –
I have a question which I would like your input on; what are some of the ways that organizations forensics teams use to correspond with their computer incident response teams if they notice collusion […]
-
Mustafa Al Shalchi posted a new activity comment 8 years, 6 months ago
Hello, I am an Information Technology consultant with 13+ years of experience. My experience includes Big 4 and industry background in retail, e-commerce, health insurance and pharmaceuticals. I am a graduate of Temple University with a BA in Information Science and Technology and is currently a part-time graduate student. See you all on Monday.
Mustafa -
Mustafa Al Shalchi wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
Hello,
I wanted to post the link to the site where you can view and download Disconnect search engine and browser. With Disconnect, the service promises to mask your location to access content as though y […]
-
Mustafa Al Shalchi posted a new activity comment 8 years, 7 months ago
-
Mustafa Al Shalchi posted a new activity comment 8 years, 7 months ago
While discussing application development with professor Vasant and the class last night, I thought I would share with you an upcoming meeting where this very topic will be discussed; this meeting is hosted by OWASP Philadelphia and will be cover topics in DevOps and AppSec
Meeting will take place on Tuesday, April 12th at 11:30 AM, Malvern, PA
-
Mustafa Al Shalchi wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
Reminder that Temple is hosting Cybersecurity in Action, Research, and Education (CARE), find out more at http://sites.temple.edu/care/
-
Mustafa Al Shalchi wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
Hello class, regarding the website that was mentioned in class; please see link below.
Thanks,
Mustafa
-
Mustafa Al Shalchi wrote a new post on the site Advanced Penetration Testing 8 years, 7 months ago
Cybercrooks rip men off for three times as much money as they get from women, according to a new report from the City of London Police.
The report reveals who’s getting targeted, where they live, and how t […]
-
Mustafa Al Shalchi wrote a new post on the site Advanced Penetration Testing 8 years, 8 months ago
Summary:
Wireshark is a major OSINT tool for network packet analyzation; it captures data packets over the internet and presents them in an understandable format.
Wireshark is a multifaceted O […]
-
Mustafa Al Shalchi commented on the post, Setup Instructions for ALPHA WIRELESS CARD, on the site 8 years, 9 months ago
Thank you for posting Ruslan.
-
Mustafa Al Shalchi wrote a new post on the site Advanced Penetration Testing 8 years, 9 months ago
Metasploit-Unleashed Reading Summary:
The Metasploit Framework is a kaleidoscope of information security exploit kits, which encompasses numerous security exploits ready to be launchpad on a variety of […]
-
Mustafa Al Shalchi posted a new activity comment 8 years, 9 months ago
Week of January 14th Reading Summaries
Reading : CISA Review – section 3.2, 3.5.2
> 3.2: Benefits Realization which is also referred to as benefits management and/or benefits realization
is on the many ways of managing how costs and resources are managed while ensuring delivery date and
end-users/clients’ quality standards are met. .…[Read more] -
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Week 13 Summary
Network security is inherently difficult and there are many reasons for that. Protocols are often insecure, software is frequently vulnerable, and educating end users is time-consuming. Security […] -
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 8 years, 11 months ago
Week 12 summaries
The next grand evolution in the internet is Web Services. While the physical infrastructure, connections, capacity planning has been rolled out, however with much of the data is now created […] -
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Web application vulnerabilities are rampant and the most popular form of this style of attack is SQL injection. The attacker in this attack format will attempt to place data that is interpreted as instructions in […]
-
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years ago
The prevalence of today’s web applications make it a good attack surface because of the many ways it can be reached. Moreover, web application vulnerabilities is a real and likely threat vector for many […]
-
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years ago
Malware recent developments and advancements have allowed hackers and attackers to exploit any device that has an internet connection; many hackers have resorted to using Cryptolocker malware to infect their […]
-
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years ago
“Social Engineering” is underestimated as a likely security threat to many organization; the likely assumption by many is that it is not going to happen to me. However, recent trends and studies support that the […]
-
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
NetCat has been surging in popularity since 2000 among information security professionals. NetCat is unlike Nmap because this utility allows you discover, read and write data across TCP and UDP network connection. […]
-
Mustafa Al Shalchi wrote a new post on the site Introduction to Ethical Hacking 9 years, 1 month ago
There are different sniffing techniques that can be applied within a switched and non-switched environment; ARP spoofing techniques and tools are available that allows an attacker to conduct network […]
- Load More
For an organization to have a forensics team, it must be a large enterprise. A collusion is a serious crime, must likely the company will want to press charges, so that employee would serve time in prison. And since this might be the end goal, an attorney who is part of the Incident response team would need to be engaged. Most likely , the attorney may call in the FBI, and at the point all communication would follow legal protocols.
If the question is what happens before the attorney is called, a good Forensic Analyst would probably request the assistance from the Incident Manager directly. Something like – ” Hey you have a moment, I want to run something by you” And that would start the process of outside / legal validation of collusion.
-Deval