Latest News - Computer Science

Security Assessment Report

Security Assessment Report Computing platforms consist of hardware and software components. The hardware components include the devices used to input data into the computer, the devices used to...

Information Systems and Identity Management

Information Systems and Identity Management Introduction The use of Information Technology in healthcare has exposed patients’ information to cyber-attacks. Cybercriminals exploit the...

Incidence Response Team

Incidence Response Team A computer incident response team is a group of well-trained people carefully selected given the role of handling an incident correctly and promptly so that it can be...

Cyber Investigation Tools

Cyber Investigation Tools Ways of tracking an attacker Trace-routing – This technique shows the computers that are within the range of the user and the target machine. Resolving the host-name...