Latest News - Computer Science

Malicious Network Activity Report

Malicious Network Activity Report 1.0. Description Of Event The Swiss International Group noted various threats compromising the security implemented in the different banks belonging to the...

After Action Report

After Action Report Purpose This After Action Report (AAR) aims to enlighten stakeholders on the cyber threats the nation’s network is exposed to and thus establish appropriate solutions that...

Forensic Analysis Research

Forensic Analysis Research Timeline analysis is an integral component of digital forensic analysis in both the private and public sectors. Lin (2018) explains that this process is primarily tailored...

Computer Forensics Analysis

Computer Forensics Analysis Computer forensics’ image analysis refers to the logical examination of computerized pictures caught by a picture processor. Scientific picture examination can...

Audit Logs

Audit Logs Audit logs, also known as audit trails, are a record of an event in an Information Technology System. Audit trails also include destination, resource address, user information, and time...

Active Directory

Active Directory Explain the Types of Information that Can Be Stored in an Active Directory User Record The Active Directory is one of the most important features in the Windows operating system, as...