Intel® Digital Security Surveillance System Media Performance

Digital security surveillance (DSS) systems are primarily used for security and loss prevention, and they are increasingly being deployed in market segments with more diverse usage models. In retail environments DSS systems are used for business intelligence to improve sales or anonymously analyze purchasing behavior. In transportation DSS systems provide license plate recognition to track traffc violations, and in the government sector DSS devices monitor public areas, such as airport terminals. The link for the article can be found below.

Intel Forensics Curriculum

These days, in cyber forensics, detectives use a vast array of tools to solve crimes. In this project, students delve into the world of criminal investigation and learn how forensic scientists collect, analyze, and process evidence to solve a crime. In preparation for solving a simulated classroom "crime," students engage in deductive reasoning activities and practice math and science forensics labs. Then, using the scientific inquiry process, they collect clues, test and analyze evidence, and draw conclusions to solve the crime.

Top 10 Cyber Security Predictions for 2014 and Beyond (Intel Article)

Certain characteristics of security are as persistent as a metronome and will continue to hold true in the coming year. These are as easy to predict as gravity, and go without saying: malware will increase, vulnerabilities will be discovered, systems will be hacked, patches will be issued, fraud and loss will be rampant, stories will be sensationalized, victims will cry, attackers and defenders will become more skilled, and legislatures will demand action. Let’s venture a deeper look and go beyond those pedestrian predictions.

Digital Forensics Implication

At a basic level, computer forensics is the analysis of information contained within and created with computer systems and computing devices, typically in the interest of figuring out what happened, when it happened, how it happened, and who was involved. This can be for the purpose of performing a root cause analysis of a computer system that had failed or is not operating properly, or to find out who is responsible for misuse of computer systems, or perhaps who committed a crime using a computer system or against a computer system.