Harshita's DForen6 Show

Follow Harshita's DForen6 Show
Share on
Copy link to clipboard

Welcome to Harshita's DForen6 Show “Computer Forensics… Taking a BYTE outta crime” “Crime Doesn’t Pay. It Just Pays Our Wages!” Well in this podcast you will get familiar with Digital/Computer forensic domain. Cyber crime is on the rise hence, we have to be alert and aware about cyber security threats. So technically the major goal of computer forensics is to recognize, gather, protect and examine data in such a way that protects the integrity of the collected evidence to use it efficiently and effectively in a case.

Harshita Jadhav


    • Jan 3, 2022 LATEST EPISODE
    • infrequent NEW EPISODES
    • 14m AVG DURATION
    • 29 EPISODES


    Search for episodes from Harshita's DForen6 Show with a specific topic:

    Latest episodes from Harshita's DForen6 Show

    TOP 5 COMPUTER FORENSICS CERTIFICATIONS ARE IN DEMAND

    Play Episode Listen Later Jan 3, 2022 14:33


    What Jobs Can You Get With a Computer Forensics Certifications? Computer Forensics Investigator. Computer Forensics Technician. Information Security Analyst. Information Systems Security Analyst. Forensic Computer Analyst. Security Consultant. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    COMPUTER FORENSICS CAREER GUIDE : BRIDGING CRIMINAL JUSTICE & CIS

    Play Episode Listen Later Aug 19, 2021 16:52


    Computer forensics, also known as cyber forensics or digital forensics, is the investigation of digital data gathered as evidence in criminal cases. Law enforcement agencies and private firms fight cybercrime using computer forensics to track, locate and extract digital information needed for criminal investigations. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    WHAT IS DIGITAL FORENSICS & WHY IS IT IMPORTANT?

    Play Episode Listen Later May 26, 2021 17:41


    Digital forensics has found valuable information that allows cyber security companies to develop technology that prevents hackers from accessing a network, website, or device. Hackers and hijackers are skilled at making their way into a person or business's device or network, but digital forensics have collected data --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    MALWARE ANALYST INTERVIEW QUESTIONS & ANSWERS FOR 2021

    Play Episode Listen Later May 24, 2021 24:59


    It is process of executing malware and analyzing its functionality and behavior. This analysis helps to know what malware does during its execution using debugger. It is a process of analyzing/reverse engineering assembly code. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    DIGITAL FORENSICS PROCESS - ANALYSIS

    Play Episode Listen Later Apr 23, 2021 13:10


    The digital forensic process has the following five basic stages: Identification – the first stage identifies potential sources of relevant evidence/information (devices) as well as key custodians and location of data. ... Analysis – an in-depth systematic search of evidence relating to the incident being investigated. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    APPLICATION OF SOCIAL MEDIA FORENSICS TO INVESTIGATE SOCIAL MEDIA CRIME

    Play Episode Listen Later Apr 23, 2021 22:21


    Social media forensics involves the application of cyber investigation and digital analysis techniques for: Collecting information from social networking platforms such as Facebook, Twitter, LinkedIn etc. Storing, ... Preserving the information for fighting a case in the court of law. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    DATA BREACH INCEDANCE RESPONSE PLAN

    Play Episode Listen Later Apr 23, 2021 11:25


    All enterprises should have a data breach incident response plan in place to help minimize the damage caused by a cyber-attack. ... The plan should include a list of processes that should be executed in the event of a breach and should also provide a clear guideline as to what actually constitutes a security incident. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    INVESTIGATION OF FINANCIAL FRAUDS & CYBER CRIME

    Play Episode Listen Later Apr 23, 2021 14:56


    A primary effect of cybercrime is financial; cybercrime can include many different types of profit-driven criminal activity, including ransomware attacks, email and internet fraud, and identity fraud, as well as attempts to steal financial account, credit card or other payment card information. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    MULTIMEDIA FORENSICS

    Play Episode Listen Later Apr 17, 2021 11:23


    Multimedia Forensics includes a set of scientific techniques recently proposed for the analysis of multimedia signals (audio, videos, images) in order to recover probative evidences from them; in particular, such technologies aim to reveal the history of digital contents: ... retrieving information from multimedia signals. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    DATA BREACH

    Play Episode Listen Later Apr 12, 2021 12:08


    A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak, information leakage and also data spill. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    CYBER SECURITY INTERVIEW QUESTIONS

    Play Episode Listen Later Oct 15, 2020 33:17


    The digital world is surrounded by cyber-attacks, this requires a well-trained army of cyber warriors who can foresee, detect and restrict the threats. The demand for Cyber Security Professionals far exceeds the supply - creating exciting opportunities for individuals who are willing to re-skill themselves for a career in cybersecurity.  It's also expected that the Cybersecurity labour crunch is expected to hit 3.5 million unfilled jobs by the end of 2021, and also the number of open positions will triple over the next five years. This means the career opportunities for cybersecurity professionals are very promising right now. Having said that, clearing a cybersecurity interview is not a simple task as more knowledge is required to become a cybersecurity professional for handling sophisticated threats. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    FORENSICS OF CLOUD MACHINE LEARNING PLATFORM - BASICS

    Play Episode Listen Later Sep 15, 2020 10:47


    Cloud computing changes the traditional characteristics of how data – and potential evidence – are stored and retrieved. In the cloud, evidence can reside in different geo- graphical locations on servers that are shared by multiple customers and that are under the control of different cloud service providers. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    JTAG CHIP-OFF ISP FORENSICS - TOOLS & CHALLENGES

    Play Episode Listen Later Sep 15, 2020 14:02


    In the field of mobile-device forensics, the practices of “chip-off” and “JTAG” ... challenge examiners, creating the requirement for alternative means of data recovery. ... Further, considering that commercial tools most often connect to the device. ISP benefits the examiner who faces the challenges of tightening budgets, yet ... And just like with JTAG and Chip-Off, your agency can still use its current line-up of forensic analysis software to recover that 'smoking gun' piece of evidence. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    MAPPING DIGITAL CRIME WITH CYBER ACTS

    Play Episode Listen Later Sep 15, 2020 21:35


    Cyber crime, or computer-oriented crime, is a crime that involves a computer and a network. ... such intrusions are part of an organized effort by cyber terrorist foreign intelligence services, or other groups to map ... In developing countries, such as the Philippines, laws against cyber crime are weak or sometimes nonexistent. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    ROBOTS SECURITY & BLOCKCHAIN SWARM

    Play Episode Listen Later Sep 15, 2020 6:29


    Swarm robotics is seen as an area where the combination of block chain and AI can benefit the technology. The field consists of several physical robots working together in a “swarm” to perform tasks or operations. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    ARVR & DIGITAL EVIDENCES

    Play Episode Listen Later Sep 15, 2020 9:13


    Permission to make digital or hard copies of all or part of this work for visualization of information in the context of the physical environment. The localized AR annotation and visualization capability. An ... In the current literature, there is variety of virtual reality applications proposed for various forensic science problems. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    MALWARE ANALYSIS USING DEEP EXPLOIT, REMNUX & CUCKOOBOX

    Play Episode Listen Later Sep 2, 2020 5:59


    Malware analysis helps responders understand the extent of a malware-based incident and rapidly identify additional hosts or systems that could be affected. Actionable information from malware analysis can help an organization more effectively mitigate vulnerabilities exploited by malware and help prevent additional compromise. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    ESTABLISHING DIGITAL FORENSICS LABS - INDIA & USA (STANDARDS)

    Play Episode Listen Later Sep 2, 2020 11:15


    Digital forensics investigations have a variety of applications. The most common is to support or refute a hypothesis before criminal or civil courts. Criminal cases involve the alleged breaking of laws that are defined by legislation and that are enforced by the police and prosecuted by the state, such as murder, theft and assault against the person. Civil cases on the other hand deal with protecting the rights and property of individuals (often associated with family disputes) but may also be concerned with contractual disputes between commercial entities where a form of digital forensics referred to as ediscovery may be involved. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    FORENSICS PSYCHOLOGY OF AUTONOMOUS SYSTEMS

    Play Episode Listen Later Sep 2, 2020 6:48


    Forensic psychology is the branch of psychology concerned with the production and application of psychological knowledge and principles within the legal process. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    COMPUTER FORENSICS INTERVIEW QUESTIONS

    Play Episode Listen Later Sep 2, 2020 12:58


    Computer forensics (also known as computer forensic science) is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. ... Evidence from computer forensics investigations is usually subjected to the same guidelines and practices of other digital evidence. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    AUTOMATION OF MALWARE FORENSIC TRIAGE IN SOC

    Play Episode Listen Later Sep 2, 2020 6:17


    Triage is the assessment of a security event to determine if there is a security incident, its priority, and the need for escalation. As it relates to potential malware incidents the purpose of triaging may vary. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    COMPUTER FORENSICS CERTIFICATIONS

    Play Episode Listen Later Jul 30, 2020 14:25


    Cyber security is fast becoming a necessary component to all businesses and agencies. The demand for tech gurus who can solve crimes is growing all the time as hackers from home and abroad seek to crack servers and networks in the United States. Why not work to thwart them with a computer forensics certification? Though this is not an easy credential to add to your resume, it will be worth the hard work and effort when you have the gratification of busting cyber bad guys. You will also qualify for a broad range of jobs and your salary will likely see a dramatic increase, too. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    COMPUTER FORENSICS : MULTIMEDIA & CONTENT FORENSICS

    Play Episode Listen Later Jul 30, 2020 12:16


    Multimedia Forensics includes a set of scientific techniques recently proposed for the analysis of multimedia signals (audio, videos, images) in order to recover probative evidences from them; in particular, such technologies aim to reveal the history of digital contents: ... retrieving information from multimedia signals. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    DATA RECOVERY TOOLS

    Play Episode Listen Later Jul 30, 2020 20:53


    In computing, data recovery is a process of salvaging (retrieving) inaccessible, lost, ... Replacement boards often need this information to effectively recover all of the data.  --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    EVIDENCE COLLECTION & DATA SEIZURE

    Play Episode Listen Later Jul 27, 2020 19:20


    Collection, preservation, and securing evidence is critical from the time it is collected. Completion of chain of custody documentation is also critical. The chain of custody form must contain information about the evidence collected and must remain with the evidence until it is released to law enforcement. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    INTRODUCTION TO MOBILE FORENSICS

    Play Episode Listen Later Jul 16, 2020 29:41


    The mobile forensics process aims to recover digital evidence or relevant data from a mobile device in a way that will preserve the evidence in a forensically sound condition. ... Following correct methodology and guidelines is a vital precondition for the examination of mobile devices to yield good results --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    DIGITAL FORENSICS- HISTORY, PROCESS, TYPES, CHALLENGES

    Play Episode Listen Later Jul 15, 2020 13:06


    Digital Forensics is the preservation, identification, extraction, and documentation of computer evidence which can be used in the court of law Process of Digital forensics includes 1) Identification, 2) Preservation, 3) Analysis, 4) Documentation and, 5) Presentation Different types of Digital Forensics are Disk Forensics, Network Forensics, Wireless Forensics, Database Forensics, Malware Forensics, Email Forensics, Memory Forensics, etc. Digital forensic Science can be used for cases like 1) Intellectual Property theft, 2) Industrial espionage 3) Employment disputes, 4) Fraud investigations. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    Harshita's DForen6 Show (Trailer)

    Play Episode Listen Later Jul 14, 2020 0:48


    --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    AN INTRODUCTION TO COMPUTER FORENSICS

    Play Episode Listen Later Jul 14, 2020 16:00


    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. --- Send in a voice message: https://anchor.fm/harshitasdforen6show/message

    Claim Harshita's DForen6 Show

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel