KAIF™ The problem of secure working in an insecure environment fundamentally raises two specific issues to be addressed. Firstly how to transmit information where the destination is confirmed, and secondly how the data can be masked or encrypted that even if it was intercepted the information cannot be accessed. The two questions therefore are, am I sending this to the correct destination and is, the information secure if it is intercepted or diverted? This problem can be solved using traditional firewalls and intrusion detection systems (IDS) by filtering and authenticating data transmitted across computer networks. Once the safe route to the authenticated destination has been validated KAIF™ is used to analyse the data patterns using machine learning to determine any potential threat. Traditional techniques use encryption techniques to enforce access control, data integrity as well as address data availability issues. Designers of KAIF™ believe this is inadequate as encryption techniques do not account for risk and threats inherent in the pattern of data transferred across a network. KAIF™ applies techniques capable of harnessing intelligent data analysis essential to digital security and forensics analysis for electronic crime attacks, investigation and case analysis. This could range from day to day network security breach, counter‐terrorism surveillance on Internet, online fraud, digital evidence recovery, collection and forensic analysis. KAIF™ uses a set of intelligent algorithms, methods and techniques deployed at operating system level of an ICT infrastructure. KAIF Analytics ™ Learns existing behaviour and predict future behaviour of the system. This system works in conjunction with the risk management component of the software. Context analysis features for extracting meaning from the content of interrelated data and reports.
KAIF Financials ™ The economics of forensics is about the understanding of the resource and cost demands required when conducting an electronic crime investigation. KAIF Financials is a digital forensics advisor and decision support system for costing, analysis and evaluation of resources required in electronic crime investigations ranging from minor to more sophisticated types. It analyses the costs implications of conducting a forensic investigation. It is designed purposely for commercial users in the info-security Industry. The application enables users to input to the system a variety of crime dataset as the domain knowledge within the database of the system. KAIF Law ™ Machine learning heuristic model and case management tool for evaluating digital forensic cases for a court of law. KAIF Law has been designed to complement KAIF Financials as a case management tool.
KAIF Imaging ™ A robust forensics and copyright enforcement tool of bootleg images and photo collections. Protects websites from illegal download of videos and images (Clips). Provides logos of assurance by authenticating genuine from counterfeit images using access control and encryption to prevent modification and non-authorise use of original images. Test system using penetration, vulnerability and breakthrough techniques and strategies to ensure system is robust Design a revenue generation model and strategy for creating repeated sources of revenue from images. Implementing Logos of assurance.
QRADAR-KAIF Integrated platform addresses the continuous increase of growth of data on the Internet, public databases and distributed mobile systems. The system handles and understands complex data set as well as making sense out of meaningless data. QRADAR/KAIF Digital, Security, Forensics, and Incidence Response Software Platform apply techniques capable of harnessing intelligent data analysis capabilities essential for digital security and forensic analysis for electronic crime attacks, investigation and case analysis. This could range from day to day network security breach, counter-terrorism surveillance on Internet, mobility based systems, online fraud, online masking for impersonation and digital evidence recovery, collection and forensic analysis. The system uses a set of intelligent algorithms, methods and techniques deployed at operating system level of an ICT infrastructure to facilitate the discovery and recovery of digital evidence essential for digital security and forensic analysis.