The organization's examination in cyber security brings about increasingly secure social orders and incorporates information security, digital forensics and information insurance. Hypotheses and models are gotten from, for instance, information frameworks, computer science, arithmetic, brain science, humanism, business organization and financial aspects.
Read More: Cyber consultant
Information security
Information security (cyber security) is tied in with shielding information and digital administrations from different sorts of dangers, for example, programmer assaults, human blunder and regular marvels that consume. Simultaneously, people, organizations and networks have various necessities and prerequisites for information and administrations to be open, exact and private. Instances of research territories:
Digital forensics
In Digital forensics (IT forensics) we consolidate computer technology, law, forensics and crypto technology. The reason for existing is to make strategies and systems whose utilization can bring about solid digital proof utilized in legitimate procedures, in the examination of information penetrates, or something like that. The exploration depends on current issues in the field. Instances of research zones:
Read More: Cyber consultant
Information security
Information security (cyber security) is tied in with shielding information and digital administrations from different sorts of dangers, for example, programmer assaults, human blunder and regular marvels that consume. Simultaneously, people, organizations and networks have various necessities and prerequisites for information and administrations to be open, exact and private. Instances of research territories:
- Methods for managing information security in businesses
- Models for human behavior in relation to information security
- Evaluation of security in software and applications
- Principles of data protection (personal privacy)
- IT security (logging, access control, intrusion detection, etc.)
- Cyber security, cyber warfare and national strategy development
- information Economy
Digital forensics
In Digital forensics (IT forensics) we consolidate computer technology, law, forensics and crypto technology. The reason for existing is to make strategies and systems whose utilization can bring about solid digital proof utilized in legitimate procedures, in the examination of information penetrates, or something like that. The exploration depends on current issues in the field. Instances of research zones:
- Secure digital evidence, from seizure to trial (process)
- Methodology for tracking criminals and securing evidence on the TOR network
- Techniques for identifying encapsulated data traffic when filtering information
- Development of Swedish terminology in digital forensics
No comments:
Post a Comment