{"id":2987,"date":"2016-05-20T11:37:31","date_gmt":"2016-05-20T21:37:31","guid":{"rendered":"http:\/\/westoahu.hawaii.edu\/cyber\/?page_id=2987"},"modified":"2020-02-14T12:57:05","modified_gmt":"2020-02-14T22:57:05","slug":"forensic-analysis","status":"publish","type":"page","link":"https:\/\/westoahu.hawaii.edu\/cyber\/cscc\/forensic-analysis\/","title":{"rendered":"Forensic Analysis"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2987\" class=\"elementor elementor-2987\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-33fbee57 _col-1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33fbee57\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d84b4c5\" data-id=\"7d84b4c5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4110857e elementor-widget elementor-widget-heading\" data-id=\"4110857e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Forensic Analysis<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1da3500c elementor-widget elementor-widget-text-editor\" data-id=\"1da3500c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The purpose of this section is to provide useful information on current malware issues\/attacks. This includes phishing attacks, spyware, adware and more. This section also provides weekly executive summaries about current incidents happening both locally and globally. Lastly this section talks about collecting digital evidence for investigations.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ccddf54 elementor-widget elementor-widget-heading\" data-id=\"7ccddf54\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Subsections<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e8d671 elementor-widget elementor-widget-text-editor\" data-id=\"4e8d671\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul>\n  <li><a href=\"http:\/\/westoahu.hawaii.edu\/cyber\/index.php\/category\/forensics-weekly-executive-summmaries\/\">Forensics Weekly Executive Summaries<\/a><\/li>\n  <li><a aria-label=\"best practices for collecting digital evidence either for a civil or criminal case\" href=\"http:\/\/westoahu.hawaii.edu\/cyber\/index.php\/forensic-investigations\/\">Forensic Investigations<\/a><\/li>\n<\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b2bf997 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2bf997\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4facb21e\" data-id=\"4facb21e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Forensic Analysis The purpose of this section is to provide useful information on current malware issues\/attacks. This includes phishing attacks, spyware, adware and more. This section also provides weekly executive summaries about current incidents happening both locally and globally. Lastly this section talks about collecting digital evidence for investigations. Subsections Forensics Weekly Executive Summaries Forensic &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/westoahu.hawaii.edu\/cyber\/cscc\/forensic-analysis\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Forensic Analysis&#8221;<\/span><\/a><\/p>\n","protected":false},"author":17,"featured_media":0,"parent":1572,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-2987","page","type-page","status-publish","hentry","entry"],"acf":[],"_links":{"self":[{"href":"https:\/\/westoahu.hawaii.edu\/cyber\/wp-json\/wp\/v2\/pages\/2987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/westoahu.hawaii.edu\/cyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/westoahu.hawaii.edu\/cyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/westoahu.hawaii.edu\/cyber\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/westoahu.hawaii.edu\/cyber\/wp-json\/wp\/v2\/comments?post=2987"}],"version-history":[{"count":7,"href":"https:\/\/westoahu.hawaii.edu\/cyber\/wp-json\/wp\/v2\/pages\/2987\/revisions"}],"predecessor-version":[{"id":9405,"href":"https:\/\/westoahu.hawaii.edu\/cyber\/wp-json\/wp\/v2\/pages\/2987\/revisions\/9405"}],"up":[{"embeddable":true,"href":"https:\/\/westoahu.hawaii.edu\/cyber\/wp-json\/wp\/v2\/pages\/1572"}],"wp:attachment":[{"href":"https:\/\/westoahu.hawaii.edu\/cyber\/wp-json\/wp\/v2\/media?parent=2987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}