© All rights reserved Institute od Forensics & ICT Security
New student deal: up to 40% off | Sign up now to get courses for as low as $230.0 each. New users only.
In this current generation, Digital information is everywhere – in our homes and businesses, our financial institutions, and our critical infrastructure. We use and store data via pervasive cloud computing, network applications, social media, and mobile devices, as well as in our computers and tablets.
This information often gets vulnerable to compromise– copying, modification, deletion, or disclosure – by malware, viruses, etc.
You need a good understanding of the issues and technologies underlying the protection of computer systems and data as part of expected due diligence. Get insights on how to protect your information assets through our monthly Forensics and Cyber security News letter
Online communication involves two people or organizations doing business through messages sent over an internet connection. The expectation is that nobody is listening to the traffic on that connection. And messages are encrypted so that interceptors...... This article also covers Cybersecurity BCP/DR Planning therefore download it to find out more
How safe is your information and pictures? Have you ever paused to think what would happen in the event that your phone got hacked? Or lost and the information on it accessed? Those handheld gadgets that take up a big percentage of most peoples’ lives providing access to entertainment, communication, health information, commercial services, among others are more of a threat to you than you can ever
Cybersecurity - what’s going to happen next? Everyone wants to know, and no one can know for certain, despite armies of analysts and datacenters of machine intelligence. As we enter the 2nd half of this year, it behooves the Institute of Forensics and ICT Security (IFIS) to alert you about the cyber-attacks that may happen before the end of the year.
You cannot solve a problem by running from it. Yet, this is what most top honchos and senior IT managers in most businesses in Uganda are doing: refuse to accept that cybercrime is a problem that needs urgent attention.
This issue focuses on the third leg of the Fraud Triangle: Rationalisation Rationalization is the third leg of the fraud triangle and is considered a necessary component of crime before it takes place. It is part of the motivation for the crime.
This issue focuses on the second leg of the Fraud Triangle: Opportunity. A person will be tempted to commit crime if S/he perceives that they can do it without being caught. Employees will violate their trust in areas where they have general information and technical skills:
After witnessing the most expensive election, our economy has been left very thirsty with most government departments requesting for supplementary budgets many months remaining to the end of the financial year..