July 18, 2018

Digital Forensic Students Learn Video Forensics

Digital Forensics

This semester the Digital Forensic students are learning video forensics. Keith Swanson, a Forensic Examiner for the Rocky Mountain Information Network, has been sharing his vast wealth of knowledge on video forensics with our students. The class is a perfect fit for our University because we have many other degrees that produce high quality video. Audio and video forensics provide a “real-time ” account of a crime. Video and audio evidence is becoming one of the most prevalent forms of forensic evidence used in both civil and criminal cases. Just look how quickly cell phone video gets posted to the Internet. As the demand for…

12 Network Security “White Hat” Hackers You Should Know

White Hat Hackers

The White Hat Heroes that walk among us are the cyber security experts who are looking for trouble. “White Hat” network security researchers are considered ethical hackers whose discoveries and inventions protect and defend against the underground “Black Hat” hackers. Thank you Network World for getting the word out that there are more than one kind of hacker out there. Robert “RSnake” Hansen Greg Hoglund Dan Kaminsky Zane Lackey Marc Maiffret Charlie Miller HD Moore Joanna Rutkowska Sherri Sparks Joe Stewart Christopher Tarnovsky Dino Dao Zovi Read more in this NetworkWorld article. To learn how to become a “white hat” hacker, go…

CISPA – Cyber Intelligence Sharing and Protection Act of 2011 as of April 16, 2012


There is still much controversy surrounding CISPA. Below is the link to the house bill that is being threatened to be vetoed by President Obama. The bill is aimed to sharing “Cyber Threat Information”. Defining the “Cyber Threat Information” is aimed at unauthorized access and malicious intentions. http://docs.house.gov/billsthisweek/20120423/CPRT-112-HPRT-RU00-HR3523.pdf ‘‘(2) CYBER THREAT INFORMATION — The term ‘cyber threat information’ means information directly pertaining to a vulnerability of, or threat to, a system or network of a government or private entity, including information pertaining to the protection of a system or network from— ‘‘(A) efforts to degrade, disrupt, or destroy such system…