Bandr Siraj Fakiha
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Examining The Forensic Toxicity of Ricin Using Lc/Ms Techniques Bandr Siraj Fakiha
Indian Journal of Forensic Medicine & Toxicology Vol. 14 No. 3 (2020): Indian Journal of Forensic Medicine & Toxicology
Publisher : Institute of Medico-legal Publications Pvt Ltd

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37506/ijfmt.v14i3.10532

Abstract

As one the naturally occurring toxins, Ricin is classified among the deadliest poisons available. Ricin and Ricinus communis agglutinin (RCA120) are derived from the castor bean plant. Ricin and its related activities can be detected using either mass spectrometric (MS) assay or Liquid Chromatography (LC). Further, the two methods can be to differentiate ricin from RCA120 because it is less toxic of the two. The sequence of Amino acid is identified by monitoring the active ricin using mass spectrometric. This study discusses how LC and MS methods can be applied to quantify, detect, and differentiate ricin from RCA120 in test samples. On the overall, the two methods were applied to tell aside ricin samples from RCA120. The study concluded that mass spectrometry is the most efficient approach in identifying ricin from RCA120.
Effectiveness of Security Incident Event Management (SIEM) System for Cyber Security Situation Awareness Bandr Siraj Fakiha
Indian Journal of Forensic Medicine & Toxicology Vol. 14 No. 4 (2020): Indian Journal of Forensic Medicine & Toxicology
Publisher : Institute of Medico-legal Publications Pvt Ltd

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37506/ijfmt.v14i4.11587

Abstract

Cyber-attacks have always targeted information communication technology systems of various organizations.Intruders and hackers have within their reach, very powerful tools through which they capable to bypassthe existing network security so as to deliver a payload that might have a severe impact on the wholeorganization. Therefore, it has become essential for organizations to develop mechanisms through whichthey can detect a possible cyber threat and then respond accordingly. By establishing cybersecurity situationawareness, organizations will understand what is happening and then respond effectively. The presentstudy evaluated the effectiveness of the Security Incident Event Management (SIEM) system for CyberSecurity Situation Awareness. A Hierarchical Network Security Situation Assessment Model (referred toHNSSAM) which joins Security Incident Event Management (SIEM) system evidence theory fusion ruleswith classified quantitative risk assessment method was applied. Data processing was initially designed soas to collect security data from various sensors. Mechanisms for data verification were then adopted so as toestablish whether SIEM was effective in successfully detecting any form of cyber-attack. Results show thatSIEM tools may be applied by security analysts to gain visibility into the security threats attacking the ITsystems of an organization and then respond appropriately.
Effectiveness of OSForensic in Digital Forensic Investigation to Curb cybercrime Bandr Siraj Fakiha
Indian Journal of Forensic Medicine & Toxicology Vol. 15 No. 3 (2021): Indian Journal of Forensic Medicine & Toxicology
Publisher : Institute of Medico-legal Publications Pvt Ltd

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37506/ijfmt.v15i3.15633

Abstract

With the rapid development and higher level of dependence on new information and technology by various organizations across the world, cybercrime issues are increasing, and there are no technologies that seem flawless in combatting the issue. The use of concepts relating to digital forensic investigation of criminal activities and digital forensics will, therefore, tackle the problem with finding digital evidence in cybercrimes. OSForensics is one of the various digital forensic investigation tools that allows the use of Hash Sets for identifying known safe files in program and operating system files. The tool is essential for identifying suspected files like Trojans, viruses, and hacker scripts. The problem presented in this paper, therefore, entails utilizing combinations of digital forensic investigation of criminal activities and investigation concepts. The paper seeks to establish the effectiveness of OSForensic in Digital Forensic Investigation to curb cybercrime. That is, the capabilities of OSForensics and the accuracy of OSForensics with regards to retrieving and analyzing data from a hard drive in order to investigate and curb cybercrime at the workplace. The researcher investigated a case in which a company security had been threatened by an employee whose contract had recently been terminated. The company suspected that this employee had some serious pictures, locations, and employee details belong to company. The image of the employee’s personal flash was sent to the researcher to help initiate the investigation using OSForensicssoftware so as to establish any evidence that the employee still had pictures, locations, and employee details belong to company. In overall, OSForensic was able to identify company details that the employee was having. The research was able to identify sensitive information about the company that the suspect was having, including the names of the employees, images, company system structure and what seemed to be their respective identification numbers.