Tags
djsce
svkm
dr. ramchandra mangrulkar
assdf
ay 2020-21
security
mumbai university
2020-21
advanced security
advanced system security and digital forensics
dr.ramchandra mangrulkar
ay: 2020-21
dr ramchandra mangrulkar
computer engineering
multilevel security
digital forensics
ramchandra mangrulkar
dj
blockchain
web privacy
security breach
module 3
mumbai
attack (non malicious attack)
be
workling example
bell lapdula examples
biba model
bell lapdula model
case study : djsce mumbai
blp model for institute
bell lapdula
access control
be/b.tech/m.tech
cryptography
blockchain computer engineerin
#engineering
#latex
ramchandra
writing
report
research
mustknow
one day workshop
jis university
latex
2020
october 10
cloud based approach
manuscript preparation
research tool
overleaf
image creation tools
image integrity
logical image
partition image
complete disk image
forensics image format
characteristics of forensic duplication tools
types of forensic duplication
forensic duplication
chain of custody
principles of digital evidence
validation and reporting
evidence handling
digital evidences
digital forensics process
objectives of digital forensics
cyber forensics in india
serial fraud investigation office
digital forensics market size by components
milestones in computer forensics
forensic science & forensic scientists
forensics
system time logged-on user(s) open files network i
example
demonstrations
windows
volatile analysisi
windows forensics
implicit
authorization code
authorization grant
client secret
client id
oauth roles
client server authentication issues
oauth 2.0
unique ids
random token
common csrf protections
csrf mitigation
web security
csrf attacks
cross site request forgery (csrf)
suspicious attachments
internet privacy
protecting privacy : tips
mu
facebook security breach
equifax security breach
yahoo security breach
impersonation
malicious files
multiple accounts
internet security
ssl workin
secure socke
http protocol
ssl & tls
https
web attacks
browser attacks
web application security
web browser
web browser and web application security
vii ce
exmpales of buffer overflow
securuty
assf
buffer overflow
system security
secuirty
module 2
os
program
salami and linearization attacks
vii sem
types of malwares
program security
program error
malware statistics 2018
malware
malicious attacks
flaw
failure
erroe
cyber threats 2020
category of malware
bug
security model
practical demonstration of fim
practical demonstration of single sign on
office 365
power automate
power bi
fim example
sso example
federation identity management
single sign on
indirect information flow
direct information flow
clark-wilson
chinese wall model
discretionary access control(dac): cryptographic c
discretionary access control(dac): example
com.amazonaws.services.s3.model class accesscontro
discretionary access control(dac): few concerns
access control list
discretionary access control(dac)
access control policies
control models
defense-in-depth
administrative controls
technical controls
physical controls
defence in depth strategies
recovery and forensics
response
data processing policies
email policies
password policies
acceptable use
encryption policies
5 important data protection policies
message flow confidentiality
content confidentiality:
prevention and detection
data protection
reciprocity of authentication
categories of authentication protocols
authentication protocols
password selection crtiteria
something you are
something you have
something you know
defense strategies
cyber threats and vulnerabilities
statistics of cyber attacks
various attacks
cyber attacks
access control mechanism
solutions
problems
playfair cipher
hill cipher
s-des
stream cipher
block cipher technique
encryption
idea
simplified data encryption standard problem and so
mac
dac
#phd
See more
- Presentations
- Documents
- Infographics