Lecture

Cybersecurity: Digital Forensics and Attribution

Description

This lecture covers the cyber-kill chain process, digital forensics, attribution challenges, and case studies like the RUAG cyber espionage case. It emphasizes the importance of security at all levels, the use of digital forensics in criminal investigations, and the challenges of attribution in cybersecurity.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (36)
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Servers: Security and Privacy
Explores server security, privacy, attacks, blockchains, encryption, and defense strategies against cyber threats.
IT Security Challenges
Explores IT security challenges, Object Storage systems, website management transition, network security deployment, and project portfolio management at EPFL.
Malware: Botnets
Explores botnets, networks of compromised hosts controlled by a single entity, and defense strategies against them, highlighting the impact of malicious software.
Cybersecurity: Vulnerabilities and Exploits
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.
Show more