-
Ruslan Yakush commented on the post, Week 3 Question, on the site 7 years, 9 months ago
Joseph, training is really important to keep up with proper forensics ethics. Certification is great way of validating skills and knowledge it the field of forensics. Also, I think it is critical for an examiner to have an amazing personality to apply rule of ethics; otherwise, if person is no kind and honest of him/herself then I believe there is…[Read more]
-
Ruslan Yakush commented on the post, Week 3 Question, on the site 7 years, 9 months ago
Andres, very interesting approach to define key points for Ethics. It is obviously very important for criminal justice system to have ethical forensics to influence appropriate behavior and actions. An Examiner should keep very close attention to details when gathering evidence and finding an evidence. Any manipulations or misleadings would…[Read more]
-
Ruslan Yakush posted a new activity comment 7 years, 9 months ago
Digital Forensics is very growing field and plays critical role in investigations, but still there is no code of ethics that would protect confidentiality of data and evidence, investigation integrity, human behavior and honest investigation principles.
Given enormous number of technologies, there are certain technical trends affecting ethics…[Read more]
-
Ruslan Yakush posted a new activity comment 7 years, 9 months ago
Anthony, nice article! This is great example as proof of consequences when company does not have appropriate security access controls, services and protocols monitoring and alerting. However, in this case, given inappropriate site’s content, hacker did a great job revealing the truth and having court of law to apply all required prosecutions.…[Read more]
-
Ruslan Yakush commented on the post, Progress Report for Week Ending, March 15, on the site 7 years, 9 months ago
Darin, great point! I believe if USA had all states united in terms of having one set of country laws and regulations, then a lot of complications would have been gone. I think it would simplify cybersecurity laws and tactics, general laws and standards, etc..
As an example, it is similar to having a company with lots of tools and applications…[Read more] -
Ruslan Yakush commented on the post, Progress Report for Week Ending, February 16, on the site 7 years, 9 months ago
Elizabeth, great article! The fact that tampering with Bio-IoT devices pose life threatening situation is really serious concern. It is one thing when hackers get advantage of financial landmark and gain money, but if hackers can potentially exploit vulnerability in IoT devices, and I am sure they will at some point, then it really bring a huge…[Read more]
-
Ruslan Yakush commented on the post, Progress Report for Week Ending, February 9, on the site 7 years, 9 months ago
Nice post, Darin! I agree with your point about interesting shift for attacking small less valuable targets versus chasing a “big fish” for more ransom. My input on this thought would be….what if attacking larger number of less secured targets would get more profits to malicious hackers rather than trying to attack more profitable highly…[Read more]
-
Ruslan Yakush commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 9 months ago
Roberto, your statement about negative impact to business results is great example of necessity for organization to have sounds computer forensics practices to ensure information systems integrity and defense-in-depth security strategy. Of course, this level of integrity can be achieved by thorough understanding not only technical, but legal…[Read more]
-
Ruslan Yakush commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 9 months ago
Great point, Amanda! Thanks for bringing this up. I agree that some investigations don’t need to involve law enforcement into the process. I believe it would make sense to bring law enforcement in case of criminal investigations and computer crimes; however, certain policy violations could be resolved internally by the organizations assuming…[Read more]
-
Ruslan Yakush commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 9 months ago
Andres, great explanation of organizational forensics from ethics and policies stand point. It looks like the logic of this example is somewhat similar to a concept of Audit process. So, I believe Forensics in this context would be going beyond the audit in a sense that it involves searching for evidence that might be used in a court of law. Do…[Read more]
-
Ruslan Yakush commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 9 months ago
Darin, I definitely agree about critical importance of chain-of-custody. I remember dealing with a Subpoena issued by Department of Justice for one of companies I worked for in the past, and that is where I was fully responsible for identifying and preserving requested evidence and making sure a chain-of-custody is kept consistent. For this…[Read more]
-
Ruslan Yakush posted a new activity comment 7 years, 11 months ago
Regarding HIPPA compliance, I agree that there should be an exception to unforeseen life-threateaning situations. Compliance is obviously important too, but it comes to human lives, it should override any kind of laws and regulations. There is nothing more critical than saving humans life. So, I would say that if a medical consultant need to reply…[Read more]
-
Ruslan Yakush posted a new activity comment 7 years, 11 months ago
Network security products come as open source and commercial. The difference between the two is significant, and each has its own benefits and disadvantages. Open-source is free and commercial is not. Depending on the environment and infrastructure needs, open-source security product such as Linux-based OS can be the best choice since it would…[Read more]
-
Ruslan Yakush posted a new activity comment 7 years, 11 months ago
Billal, great explanation! Prior to existence of stateful firewalls, firewalls were stateless that were processing each network frame and packet individually. These packets operate at Network Layer of OSI model and operates efficiently since stateless firewall look at header part of packet, therefore not looking at packet context to inspect nature…[Read more]
-
Ruslan Yakush posted a new activity comment 8 years ago
NMAP is really great tool for all kind of passive/active scanning activities. I use it regularly to scan for open ports and services without interrupting any services. For example, if I scan just for servers availability and response time, I would need to an authorization for this type of info gathering. However, for more verbose scanning I would…[Read more]
-
Ruslan Yakush posted a new activity comment 8 years ago
There are many security tools that are very beneficial for security professionals, including:
– WireShark for sniffing network data and detailed protocols and packets analysis
– EtherCap for MITM attacks
– Kismet for detailed Wireless scans and vulnerability analysis
– Cain and Abel for password cracking / recovery
– Metasploitable for…[Read more] -
Ruslan Yakush posted a new activity comment 8 years ago
BYOD plays important role in delivering convenient services to end users’ satisfaction while trying to make sure to keeping everything secured. In medical field HIPPA rules have high security requirements related to Electronic Medical Record and keeping all the data undisclosed by BYOD. One example of disclosure would include situation where BYOD…[Read more]
-
Ruslan Yakush posted a new activity comment 8 years ago
Mushima,
Great explanation and examples. I would agree that being IT Security professional, it is better be concerned about pandemic threat considering possible impacts that could arise from its nature. Business Continuity Planning or even having internal pandemic team are must have in order to promptly and effectively respond to pandemic…[Read more] -
Ruslan Yakush posted a new activity comment 8 years, 1 month ago
Quantum computing has many benefits, but it could also undermine the cryptographic algorithms. Unlike conventional computers, which require data to be encoded into binary digits (bits) with values of either zero or one, quantum computers use quantum bits (qubits), which represent both zero and one values. If these qubits are separated while acting…[Read more]
-
Ruslan Yakush posted a new activity comment 8 years, 1 month ago
When the Kerckhoff’s Principle states that a cryptosystem should be secure even if everything about the system, except the key, is public knowledge, I think all is needed is to really keep the key secretly private without sharing it with public. For example, PKI concept and principles of operation are known by public, but cryptography key is known…[Read more]
- Load More