SlideShare une entreprise Scribd logo
1  sur  29
Firoze Zia Hussain Former Superintendent of Police Pondicherry [email_address] 00919910333249
06/06/09
[object Object],[object Object],[object Object],06/06/09
The Ultimate  Weapon …..Cyber Warfare Command and Control Costs Economy of Scale Time Skills Competitive Weapons of  1990’s Collaboration, Communities of  Interest Competitive Weapons of 2000 Speed Economy of Skill  Speed Openness Collaboration Trust
06/06/09
Digital  Investigation 06/06/09
Cyber Weapons ,[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
What Is Electronic Evidence? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
ELECTRONIC Crime Scene Investigations  ,[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
Managing Digital Evidence  in the 21st Century ,[object Object],06/06/09
06/06/09
Digital Forensics ,[object Object],[object Object],[object Object],06/06/09
Global initiatives-  California High-Technology Crime Task Forces ,[object Object],[object Object],[object Object],06/06/09
Email Tracing and Prosecutorial Enforcement Tool  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
  How email works Computer Forensic Examiner ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
Child Pornography Cases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
Hacking Case ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
Cyber InvestigationSoftware/Tools  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
ONTRACK Data Recovery-Forensics  ,[object Object],[object Object],[object Object],[object Object],06/06/09
ENCASE Cyber Forensic Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
Mobile  Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
EnCase® Legal Hold  ,[object Object],[object Object],[object Object],06/06/09
Image Scan Training ,[object Object],[object Object],[object Object],[object Object],06/06/09
RCFL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
Emerging Requirements New Initiatives Required ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09
INTEGRATED CYBER SECURITY  APPROACH STAFF TRAINING CYBER SECURITY  CENTRES INTEGRATION RECRUITMENT METHODOLOGY  ON SITE OFF SITE  TRAINING HARDWARE &  SOFTWARE SHARING OF  CRIME DATA MULTI  DISCIPLINARY/ DIVERSITY APTITUDE TEST CONTINUOUS GLOBAL APPROACH DIGITAL EVIDENSE COLLECTIONN High Tech  Crimes Task Force LEGISLATION/ ENFORCEMENT PROSECUTION/ FUNCTIONAL CONSULTANTS FOR INTEGRATION CYBER SECURITY COMPETENCY MATRIX
TRAINING  CYBER SECURITY investigation GLOBAL INTEGRATION LEGISLATION CASE Management PUBLIC PRIVATE PARTNERSHIPS Strategy &   Planning PROSECUTION
PUBLIC AWARENESS IN CYBER SECURITY INTEGRATION ACTIVITY THE –  VITAL LINK
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],06/06/09

Contenu connexe

Tendances

Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
gueste0d962
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
anilinvns
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
Jacqueline Fick
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
Sagar Rahurkar
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
Kranthi
 

Tendances (20)

Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
I want to be a cyber forensic examiner
I want to be a cyber forensic examinerI want to be a cyber forensic examiner
I want to be a cyber forensic examiner
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Chfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays WorldChfi V3 Module 01 Computer Forensics In Todays World
Chfi V3 Module 01 Computer Forensics In Todays World
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Ce hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handlingCe hv6 module 57 computer forensics and incident handling
Ce hv6 module 57 computer forensics and incident handling
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 

Similaire à Cyber Security 1215

computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
ssuser2bf502
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
satyabwati
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
Cell Site Analysis (CSA)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
BRNSSPublicationHubI
 

Similaire à Cyber Security 1215 (20)

Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
Akcomputerforensics 130222081008-phpapp02-140809110602-phpapp02
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
76 s201924
76 s20192476 s201924
76 s201924
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
computer forensics by amritanshu kaushik
computer forensics by amritanshu kaushikcomputer forensics by amritanshu kaushik
computer forensics by amritanshu kaushik
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
A Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic EvidencesA Review on Recovering and Examining Computer Forensic Evidences
A Review on Recovering and Examining Computer Forensic Evidences
 
Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...
Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...
Computer Forensics Resources offers Remote Live Data Forensic Acquisition if ...
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 

Plus de Firoze Hussain

Plus de Firoze Hussain (20)

Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Catalogue march 2013
Catalogue march 2013Catalogue march 2013
Catalogue march 2013
 
Homsec 2013
Homsec 2013Homsec 2013
Homsec 2013
 
totem Catalogue Sept 2012
totem Catalogue Sept 2012totem Catalogue Sept 2012
totem Catalogue Sept 2012
 
totem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety securitytotem Catalogue Sept 2012 safety security
totem Catalogue Sept 2012 safety security
 
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...Epc  Design Implementation Safety Security  Totem International Ltd Ceo  Firo...
Epc Design Implementation Safety Security Totem International Ltd Ceo Firo...
 
Catalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality managementCatalogue 2012 safety security and power quality management
Catalogue 2012 safety security and power quality management
 
3rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 20113rd Annual Cloud Computing Summit 2011
3rd Annual Cloud Computing Summit 2011
 
Catalogue 19 sept11
Catalogue 19 sept11Catalogue 19 sept11
Catalogue 19 sept11
 
totem int Online Catalogue Sept11
totem int Online Catalogue Sept11totem int Online Catalogue Sept11
totem int Online Catalogue Sept11
 
Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)Totem cloud rfid solutions (3)
Totem cloud rfid solutions (3)
 
Online Catalogue 9 July2011
Online Catalogue 9 July2011Online Catalogue 9 July2011
Online Catalogue 9 July2011
 
Africa 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security PdfAfrica 24 6 2011 Port Security Pdf
Africa 24 6 2011 Port Security Pdf
 
Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)Totem Cloud Rfid Solutions (3)
Totem Cloud Rfid Solutions (3)
 
24 6 2011 Port Security
24 6 2011 Port Security24 6 2011 Port Security
24 6 2011 Port Security
 
16 Page Catalogue 7 June11
16 Page Catalogue 7 June1116 Page Catalogue 7 June11
16 Page Catalogue 7 June11
 
Kerala Ti C 9.3.11
Kerala  Ti C 9.3.11Kerala  Ti C 9.3.11
Kerala Ti C 9.3.11
 
16 Catalogue 24 Mar11
16 Catalogue  24 Mar1116 Catalogue  24 Mar11
16 Catalogue 24 Mar11
 
Ecil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitorEcil totem coal ash moisture content monitor
Ecil totem coal ash moisture content monitor
 
PPE & Welding Accessories 2011
PPE & Welding Accessories 2011PPE & Welding Accessories 2011
PPE & Welding Accessories 2011
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

Cyber Security 1215

  • 1. Firoze Zia Hussain Former Superintendent of Police Pondicherry [email_address] 00919910333249
  • 3.
  • 4. The Ultimate Weapon …..Cyber Warfare Command and Control Costs Economy of Scale Time Skills Competitive Weapons of 1990’s Collaboration, Communities of Interest Competitive Weapons of 2000 Speed Economy of Skill Speed Openness Collaboration Trust
  • 7.
  • 8.
  • 9.
  • 10.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. INTEGRATED CYBER SECURITY APPROACH STAFF TRAINING CYBER SECURITY CENTRES INTEGRATION RECRUITMENT METHODOLOGY ON SITE OFF SITE TRAINING HARDWARE & SOFTWARE SHARING OF CRIME DATA MULTI DISCIPLINARY/ DIVERSITY APTITUDE TEST CONTINUOUS GLOBAL APPROACH DIGITAL EVIDENSE COLLECTIONN High Tech Crimes Task Force LEGISLATION/ ENFORCEMENT PROSECUTION/ FUNCTIONAL CONSULTANTS FOR INTEGRATION CYBER SECURITY COMPETENCY MATRIX
  • 27. TRAINING CYBER SECURITY investigation GLOBAL INTEGRATION LEGISLATION CASE Management PUBLIC PRIVATE PARTNERSHIPS Strategy & Planning PROSECUTION
  • 28. PUBLIC AWARENESS IN CYBER SECURITY INTEGRATION ACTIVITY THE – VITAL LINK
  • 29.