Network Upgrade Proposal Network speeds are affected by several factors, including congestion due to the inability of old networks to scale correctly on a hub, old cabling with relatively low...
Latest News - Computer Science
Malicious Network Activity Report 1.0. Description Of Event The Swiss International Group noted various threats compromising the security implemented in the different banks belonging to the...
After Action Report Purpose This After Action Report (AAR) aims to enlighten stakeholders on the cyber threats the nation’s network is exposed to and thus establish appropriate solutions that...
Forensic Analysis Research Timeline analysis is an integral component of digital forensic analysis in both the private and public sectors. Lin (2018) explains that this process is primarily tailored...
Computer Forensics Analysis Computer forensics’ image analysis refers to the logical examination of computerized pictures caught by a picture processor. Scientific picture examination can...
Audit Logs Audit logs, also known as audit trails, are a record of an event in an Information Technology System. Audit trails also include destination, resource address, user information, and time...