eSecurity InstituteThe Computer Security ActThe The Computer Security Act was created in 1987 by U.S. Congress in order to enhance security policies surrounding the use of sensitive…Oct 24, 2022Oct 24, 2022
eSecurity InstituteDigital Evidence HandlingWhen attempting to investigate a crime scene it is important that law enforcement personnel follow applicable laws relating to the search…Oct 22, 2022Oct 22, 2022
eSecurity InstituteSarbanes-Oxley Act and Data SecurityThe Sarbanes-Oxley Act of 2002 (SOX) is an Act that was passed by the federal government in 2002 which was designed to protect investors…Oct 21, 2022Oct 21, 2022
eSecurity InstituteHIPAA and Data SecurityHealth Insurance Portability and Accountability Act (HIPAA) is a law within the United States that protects individuals’ privacy rights in…Oct 21, 2022Oct 21, 2022
eSecurity InstituteDetails on the 2021 LinkedIn HackIn June of 2021 LinkedIn was hacked and sensitive data on more than 700 million users was publicly leaked when it was sold on the dark web…Oct 20, 2022Oct 20, 2022
eSecurity InstituteThree Jobs that Use Digital ForensicsIT auditors work within organizations to analyze and update the existing IT and cybersecurity infrastructure. IT auditors look for…Oct 20, 2022Oct 20, 2022
eSecurity InstituteModern Network ForensicsThis article discusses an overview of network forensics, methods and tools. Network devices are constantly storing, sending and receiving…Oct 19, 2022Oct 19, 2022
eSecurity InstituteLegal Concerns With Digital SurveillanceThe Fourth Amendment states “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable…Oct 19, 2022Oct 19, 2022