Why a career in cybersecurity? Part 1
CYBER SECURITY

Why a career in cybersecurity? Part 1

Diploma in Cyber Security and Forensics pioneer class at Institute of Forensics & ICT Security on 12th August 2019 orientation talk by Mustapha B Mugisa. A career in cybersecurity offers unlimited opportunities across industries and countries. Governments and multinational companies alike have open opportunities for expert cybersecurity researchers, bug hunters and true professionals who don’t…

Active Network Forensics Solution
Blog

Active Network Forensics Solution

The main challenge faced during computer related investigations is the lack of sufficient evidence to pin point which device on the network was used to perpetuate the crime. A computer network consists of devices each of which produces log files of its own. These devices include PCs, Servers, routers and firewalls. PC’s are a great…

What is Computer Forensics?
COMPUTER SECURITY

What is Computer Forensics?

Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly…

Why Mobile Forensics?
COMPUTER SECURITY

Why Mobile Forensics?

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. Mobile devices can be used to save several types of personal information such as contacts, photos, calendars and notes, SMS and MMS messages. Mobile phone forensic examinations will provide a…

FRAUD MANAGEMENT

Forensics investigations in Uganda

Forensics investigations is a step by step tracing for dots in a digital equipment to establish where the missing link is. Unlike traditional forensics, digital evidence acquisition can be a difficult process of wading through information in an attempt to discover activities that, in many cases, the perpetrators have taken steps to destroy. Attackers are…