Changes

Online Learning

844 bytes added, 9 years ago
/* Lesson 5 – Digital investigative journalism */
* [[IP forensics]]
* [[Email spoofing]]
We are prone to identify and authenticate email messages by the sender's name and email address. This Lesson will help you analyse and validate the real sender of a received email message.
* [[Data Forensics]]
Just like every email message records the IP address of the server it is sent from, so does every digital document contain details about the time it was created, the device that created it and other useful information.
* [[Profiling]]
In the physical world we are identified by passport to our government and by recognition to our friends. A drivers licence, a social security or tax file number and our reputation serve as distinguishing features of our identity and associations.
* [[Mobile profiling and surveillance]]
You may have heard or already know that mobile telecomunnications are insecure by default. Did you know that your geigraphical location can be pinpointed thanks the phone in your pocket?
* [[Lesson 5 Exercises]]
252
edits