Posts

Showing posts from May, 2023

Structure of Hair and its Characteristics

Image
Structure of Hair 1. Cuticle The cuticle is the outermost translucent layer of the shaft of the human hair. It is smooth and flat and acts as a protective layer for the hair. The cuticle looks like fish scales or roof tiles. It is an important part of the hair that determines the hair species. 2. Cortex The cortex is the middle layer of the hair which is made up of long thin cells. It consists of long keratin filaments that are held together by disulfide and hydrogen bonds. It also contains the natural hair coloring material (pigment) which is called melanin. It provides stability, elasticity, and a unique color to the hair. 3. Medulla The medulla is the central core of the hair which is composed of soft keratin protein which may be either absent or present. If present, it may be fragmental, interrupted, or continuous. It is absent in some species and does not determine the species of hair. Characteristics of hair to determine the species, race, sex, and site 1. Color The color o

5 Steps to Secure the Crime Scene

Image
Securing the scene of the crime A crime scene has certain physical evidence which forms the basis to link the victim, suspect, and crime scene. Anyone entering the crime scene can contaminate these pieces of evidence which can change the original crime scene.  Thus, it is necessary to secure the crime scene not only from the onlookers, press, etc but also from inexperienced police personnel. 5 steps to secure the crime scene If the victim is dead then its body should not be removed but instead left undisturbed until the proper documentation is done. If the victim is still alive then medical assistance should be provided as soon as possible to save a costly human life. The crime scene should be cordoned off with "crime scene do not cross" tapes or any physical barriers like barricades, vehicles, etc. Once the cordoning is done, two or three officers should be deployed around the barrier to prevent unauthorized entry of people especially curious onlookers. A contamination l

8 Signs of a Computer Security Incident

Image
What is a security incident? A security incident is a breach of sensitive and confidential information stored in a computer system. Following are the signs of security incident. 1. Unusual behavior from privileged user accounts Any unusual behavior of a privileged user account like sending information to another location through the mail, login into the account during non-official hours, frequent login in accounts, etc might be a sign of a security incident. 2. Unauthorized insiders trying to access servers and data Insiders like employees of the company, former employees, etc attempt to access the server and data stored in it. The signs can be requesting access to data that is not related to their jobs, logging in at abnormal times, etc might be some signs of a security incident. 3. Irregular behavior in outgoing traffic Traffic that is leaving the servers abnormally can be a sign of a security incident. This could include uploading large files to the personal cloud, downloading large

Classification of Data in Cybersecurity

Image
What is Data? Data is the raw/discrete information like numbers, binary data, metadata, etc. Different types of data use classified ascending to their type, sensitivity and it's value. Following are the various types of classification of data. Classification of Data 1. Based on sensitivity levels (a) High-sensitive data This includes data that is highly sensitive or important and its leak would have a catastrophic result. For eg, Financial records, intellectual property, and authentication data. This data need to be encrypted while saving on servers and only some administrators should be given permission to access it. (b) Medium-sensitive data This includes data that is moderately sensitive and its leak would not have an extreme or catastrophic result. For eg, email and documents have no confidential data. This data can be encrypted with passwords but generally, it is not necessary and only those documents which contain some sensitive information need to be encrypted. (c) Low-sens