SlideShare une entreprise Scribd logo
1  sur  21
IT FORENSIC

 The IT Computer PowerPlugs
                   Forensic is investigatory approach
for finding the evidences, extent of loss & culprits,
when some information security breach has taken
place. Forensic solution, lets examiners acquire data
from a wide variety of devices, unearth potential
evidence with disk level forensic analysis, and craft
comprehensive reports on their findings, all while
maintaining for PowerPoint their evidence.
 Templates the integrity of
IT FORENSIC

   A recent study indicates that over 93%
                 PowerPlugs
of information produced is in digital format.
The same study also noted that 85% of all
criminal, civil, and company violations are
done by means of digital Intrusion.
Templates for PowerPoint
POSSIBILITY OF BREACH OF IT SECURITY


•  Theft of Company Secrets (client or employee lists)
• Employee Sabotage or Terrorism
                     PowerPlugs
• Credit Card Fraud
• Financial Crimes
• Embezzlement (money or information)
• Economic Crimes
• Harassment (sexual)
• Child Pornography
• Major Crimes
•Templates for (short or long-term plans)
   Identity Theft PowerPoint
Nature of Attacks

              Internal        External
                   PowerPlugs

       USB                LAN       Web



             PEN Drives             Mail


Templates for PowerPoint
                                    IM
             External Hard Drives
INTERNAL INTRUSION
Pen Drive Intrusion

                            PowerPlugs
    o Details of all pen drives installed on a system
    o Recorded as per O/S artifacts with timeline
    o Analysis of all pen drives used on different work station on a Network


Local Area Network Intrusion
    o Any suspected user Login Analysis with Victims computer in the Network
  o Artifacts
Templates with regard to different incidents taken place during that log on period
              for PowerPoint
EXTERNAL INTRUSION
     1. Web Intrusion
             Trojan
             Malware
                    PowerPlugs
             Spyware

     2. Mails
             As an Attachment

     3. IM
Templates for PowerPoint
             During communication
             Attachment
PowerPlugs

      Forensic Type
Templates for PowerPoint
IT
Log Forensic:

        To Analyse all kinds of log prepared by the operating system and devices

Artifact Forensic:
                             PowerPlugs
        To Locate and analyse huge number of Artifacts with reference to Chats,
        Communications, Web Browsing and File sharing activites occuring in wide
         range of softwares

Time Line:

        To find out when exactly with date and time any specific event happened on
         the system
Templates for PowerPoint
Forensic Spots:

        All types of foot prints consolidations for any unathorised activity happened
        on the system
IT
Device Incident Forensic:

         Installation / Activation of any External Hardware devices attached to the
          system              PowerPlugs
Reversing Analysis:

         Decoding / Reverse Engineering of any incident/ activity done on any
system

Network Forensic:

         To check and investigate who has logged into the system and when
Templates for PowerPoint
Email Forensic:

         Scanning of all emails
COMMUNICATION
Forensic :

       The Mobile Forensic is for cell phones, Smart phones / Tablets & it
       goes beyond        PowerPlugs
                         standard logical analysis .   Use of advanced
       proprietary protocols and phone APIs makes it possible to pull much
       more data from these devices.

Location Finder :

       Location of the Lost mobile can be found up to a radius of 5 Mtr.
       area location with the help of proprietary software tool.

Interception :
 Templates       for PowerPoint
       Interception of communication of mobile can be done in the real
       time or checked later from the server.
ETHICAL SURVEILLANCE OF SUSPECT

SYSTEM:
       The system of the suspect can be monitored any time
Ethically with the PowerPlugs approval of Law
                      permission and
Enforcement agencies for finding out the evidences and
proofs .


COMMUNICATION DEVICES:
      Smart Phones/Tablets and other such gadgets of the
suspect can also be put on Real Time surveillance with
Templates for PowerPoint
necessary approvals and permissions as per the Law of Land.
COMPUTER FORENSIC PROCESS MODEL

    Plan         Aquire         Extract         Analyse         Report
1. Plan
                             PowerPlugs
          A computer forensics investigation begins with a well defined plan. A
           right formatted plan save time, increase the amount of relevant data,
          and produce the highest quality results, We work with staff
          investigators and security personnel to identify and target sources of
          evidence, gain an understanding of the case, and apply the proper
          procedures.

2. Acquire:

Templates for PowerPoint from complete computer forensic
    The Acquisition process ranges
          disk imaging for gathering information from sources in a consistent
          manner.
COMPUTER FORENSIC PROCESS MODEL

3. Extract:

                           PowerPlugs
        To Extract Bit by Bit Data from the Hard Drives & other such places
         by using Best computer forensic software tools is the Backbon of
         any Forensic task.


4. Analyze:
        Even the smallest hard disk drives contain tens of thousands of files.
        Seuritarian uses advanced techniques and tools to isolate only the
        most relevant electronic data. It is not just the Tools or Software
        which gives accurate analysis but the ways and means of extracting
 Templates for PowerPoint Micro level and then corelating and
        and analysing data at the
        consolidating the same for solving the case.
COMPUTER FORENSIC PROCESS MODEL


5. Report:

                         PowerPlugs
       Once the analysis is complete, presenting an understandable,
       defendable, and complete report is key. The ability to defend the
       process and testify to the methodologies used makes our experts
       unrivaled in the field of computer forensics.




Templates for PowerPoint
PowerPlugs

      IT SECURITY
Templates for PowerPoint
IT SECURITY

Corporate and Government agencies need to
                  PowerPlugs
proactively protect their critical applications, data
and processes from external and internal threats
throughout their entire life cycle. By taking a
comprehensive and integrated approach to
application vulnerability management, agencies
can measurably improve operational security,
mitigate risks,PowerPoint costs.
 Templates for and reduce
NEED OF IT SECURITY

IT Security is now PowerPlugs
                   a basic requirement because
global computing is inherently insecure.
Information     Security    means     protecting
information     from     unauthorized   access.
Information security is a continue process to
protect your information.

Templates for PowerPoint
IT SECURITY
CIA Triangle

       • Confidentiality
       • Integrity         PowerPlugs
       • Availability


Confidentiality
      Ensuring that your information remains confidential and
       remains with only to those who should access that information.

Information Integrity
 Templates for PowerPoint able to change your information,
       Knowing that no one has been
        so you can depend on its accuracy.

Availability
       Making sure that your information is available when you need it.
IT INFRASTRUCTURE

  • Servers
                 PowerPlugs
  • Routers

  • Firewall

  • Network

  • Web
Templates for PowerPoint
  • Users
OUR PROCESS MODEL
First Phase
         Identification of Targets
         System Fingerprinting, Enumeration, Checking the Information Flow

Second Phase                  PowerPlugs
       Identification of Vulnerabilities and Potential Risks
       Non Destructive Exploitation of found Vulnerabilities

Third Phase
        Result Collation and Report Writing
        Giving the Final Report to the Client about total health of I T
        Infrastructure.

Fourth Phase
 Templates for for smooth & secure IT environment and Business
       Suggestions PowerPoint
       continuity.
       Recommendation of Industry Best Solutions to maintain secure
       environment to deal with future Threats and Challenges.
PowerPlugs

           THANK YOU

Templates for PowerPoint

Contenu connexe

Tendances

6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...Damir Delija
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumOWASP Khartoum
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draftDamir Delija
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Developmentamiable_indian
 
XBOSoft Mobile Security Webinar with Jon D. Hagar
XBOSoft Mobile Security Webinar with Jon D. HagarXBOSoft Mobile Security Webinar with Jon D. Hagar
XBOSoft Mobile Security Webinar with Jon D. HagarXBOSoft
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics00heights
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 

Tendances (20)

6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...6414 preparation and planning of the development of a proficiency test in the...
6414 preparation and planning of the development of a proficiency test in the...
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
computer forensics
computer forensics computer forensics
computer forensics
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
180 184
180 184180 184
180 184
 
Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
XBOSoft Mobile Security Webinar with Jon D. Hagar
XBOSoft Mobile Security Webinar with Jon D. HagarXBOSoft Mobile Security Webinar with Jon D. Hagar
XBOSoft Mobile Security Webinar with Jon D. Hagar
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Honeypot Essentials
Honeypot EssentialsHoneypot Essentials
Honeypot Essentials
 
Idps
IdpsIdps
Idps
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 

En vedette

Aracena Octubre09 - jamon iberico
Aracena Octubre09 - jamon ibericoAracena Octubre09 - jamon iberico
Aracena Octubre09 - jamon ibericoLewis & Carroll
 
‘Begun is Two-Thirds Done’: Giving Flexible Learners A Head Start With A Suit...
‘Begun is Two-Thirds Done’: Giving Flexible Learners A Head Start With A Suit...‘Begun is Two-Thirds Done’: Giving Flexible Learners A Head Start With A Suit...
‘Begun is Two-Thirds Done’: Giving Flexible Learners A Head Start With A Suit...Mark Brown
 
IntroduçãO1
IntroduçãO1IntroduçãO1
IntroduçãO1rogerio
 
Slidesagentesbiolgicos 121030123113-phpapp02
Slidesagentesbiolgicos 121030123113-phpapp02Slidesagentesbiolgicos 121030123113-phpapp02
Slidesagentesbiolgicos 121030123113-phpapp02Jupira Silva
 
Howard gardner apr
Howard gardner aprHoward gardner apr
Howard gardner aprMusicah
 
O Scratch no ensino da programação (Softciências)
O Scratch no ensino da programação (Softciências)O Scratch no ensino da programação (Softciências)
O Scratch no ensino da programação (Softciências)João Sá
 
Special beds for positioning client
Special beds for positioning client Special beds for positioning client
Special beds for positioning client Carmela Domocmat
 
Digital Transformation: The Role of Social in the Enterprise
Digital Transformation: The Role of Social in the EnterpriseDigital Transformation: The Role of Social in the Enterprise
Digital Transformation: The Role of Social in the EnterpriseHootsuite
 

En vedette (20)

Telefonía móvil
Telefonía móvilTelefonía móvil
Telefonía móvil
 
10y ict research-190814
10y ict research-19081410y ict research-190814
10y ict research-190814
 
Almería en corto 2011
Almería en corto 2011 Almería en corto 2011
Almería en corto 2011
 
Insider17
Insider17Insider17
Insider17
 
Augumented Reality trends
Augumented Reality trendsAugumented Reality trends
Augumented Reality trends
 
Aracena Octubre09 - jamon iberico
Aracena Octubre09 - jamon ibericoAracena Octubre09 - jamon iberico
Aracena Octubre09 - jamon iberico
 
Gobierno electronico
Gobierno electronicoGobierno electronico
Gobierno electronico
 
Honey pots
Honey potsHoney pots
Honey pots
 
‘Begun is Two-Thirds Done’: Giving Flexible Learners A Head Start With A Suit...
‘Begun is Two-Thirds Done’: Giving Flexible Learners A Head Start With A Suit...‘Begun is Two-Thirds Done’: Giving Flexible Learners A Head Start With A Suit...
‘Begun is Two-Thirds Done’: Giving Flexible Learners A Head Start With A Suit...
 
Celulares
CelularesCelulares
Celulares
 
IntroduçãO1
IntroduçãO1IntroduçãO1
IntroduçãO1
 
Slidesagentesbiolgicos 121030123113-phpapp02
Slidesagentesbiolgicos 121030123113-phpapp02Slidesagentesbiolgicos 121030123113-phpapp02
Slidesagentesbiolgicos 121030123113-phpapp02
 
Actividad 2 (1)
Actividad 2 (1)Actividad 2 (1)
Actividad 2 (1)
 
Howard gardner apr
Howard gardner aprHoward gardner apr
Howard gardner apr
 
O Scratch no ensino da programação (Softciências)
O Scratch no ensino da programação (Softciências)O Scratch no ensino da programação (Softciências)
O Scratch no ensino da programação (Softciências)
 
Observaciones y entrevistas1
Observaciones y entrevistas1Observaciones y entrevistas1
Observaciones y entrevistas1
 
Tec junho 2013
Tec junho 2013Tec junho 2013
Tec junho 2013
 
Special beds for positioning client
Special beds for positioning client Special beds for positioning client
Special beds for positioning client
 
Luz
LuzLuz
Luz
 
Digital Transformation: The Role of Social in the Enterprise
Digital Transformation: The Role of Social in the EnterpriseDigital Transformation: The Role of Social in the Enterprise
Digital Transformation: The Role of Social in the Enterprise
 

Similaire à Securitarian

It security forensic
It security forensicIt security forensic
It security forensicRupesh Verma
 
Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro SofiaCarter4
 
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk
 
How is Python Useful for Cybersecurity in 2024
How is Python Useful for Cybersecurity in 2024How is Python Useful for Cybersecurity in 2024
How is Python Useful for Cybersecurity in 2024riyak40
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breachesSplunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breachesSplunk
 
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...BAINIDA
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTSplunk
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Not Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsNot Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsLaurie Lamberth
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for complianceGreg Hanchin
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for complianceGreg Hanchin
 

Similaire à Securitarian (20)

It security forensic
It security forensicIt security forensic
It security forensic
 
It security
It securityIt security
It security
 
Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro
 
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 
How is Python Useful for Cybersecurity in 2024
How is Python Useful for Cybersecurity in 2024How is Python Useful for Cybersecurity in 2024
How is Python Useful for Cybersecurity in 2024
 
IT forensic
IT forensicIT forensic
IT forensic
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breachesSplunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breaches
 
Web application security measures
Web application security measuresWeb application security measures
Web application security measures
 
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
Big Data Analytics to Enhance Security คุณอนพัทย์ พิพัฒน์กิติบดี Technical Ma...
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
What’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINTWhat’s New: Splunk App for Stream and Splunk MINT
What’s New: Splunk App for Stream and Splunk MINT
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Not Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of ThingsNot Your Father's Platform - How to Connect the Internet of Things
Not Your Father's Platform - How to Connect the Internet of Things
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
 
Splunk for compliance
Splunk for complianceSplunk for compliance
Splunk for compliance
 

Securitarian

  • 1. IT FORENSIC The IT Computer PowerPlugs Forensic is investigatory approach for finding the evidences, extent of loss & culprits, when some information security breach has taken place. Forensic solution, lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining for PowerPoint their evidence. Templates the integrity of
  • 2. IT FORENSIC A recent study indicates that over 93% PowerPlugs of information produced is in digital format. The same study also noted that 85% of all criminal, civil, and company violations are done by means of digital Intrusion. Templates for PowerPoint
  • 3. POSSIBILITY OF BREACH OF IT SECURITY • Theft of Company Secrets (client or employee lists) • Employee Sabotage or Terrorism PowerPlugs • Credit Card Fraud • Financial Crimes • Embezzlement (money or information) • Economic Crimes • Harassment (sexual) • Child Pornography • Major Crimes •Templates for (short or long-term plans) Identity Theft PowerPoint
  • 4. Nature of Attacks Internal External PowerPlugs USB LAN Web PEN Drives Mail Templates for PowerPoint IM External Hard Drives
  • 5. INTERNAL INTRUSION Pen Drive Intrusion PowerPlugs o Details of all pen drives installed on a system o Recorded as per O/S artifacts with timeline o Analysis of all pen drives used on different work station on a Network Local Area Network Intrusion o Any suspected user Login Analysis with Victims computer in the Network o Artifacts Templates with regard to different incidents taken place during that log on period for PowerPoint
  • 6. EXTERNAL INTRUSION 1. Web Intrusion Trojan Malware PowerPlugs Spyware 2. Mails As an Attachment 3. IM Templates for PowerPoint During communication Attachment
  • 7. PowerPlugs Forensic Type Templates for PowerPoint
  • 8. IT Log Forensic: To Analyse all kinds of log prepared by the operating system and devices Artifact Forensic: PowerPlugs To Locate and analyse huge number of Artifacts with reference to Chats, Communications, Web Browsing and File sharing activites occuring in wide range of softwares Time Line: To find out when exactly with date and time any specific event happened on the system Templates for PowerPoint Forensic Spots: All types of foot prints consolidations for any unathorised activity happened on the system
  • 9. IT Device Incident Forensic: Installation / Activation of any External Hardware devices attached to the system PowerPlugs Reversing Analysis: Decoding / Reverse Engineering of any incident/ activity done on any system Network Forensic: To check and investigate who has logged into the system and when Templates for PowerPoint Email Forensic: Scanning of all emails
  • 10. COMMUNICATION Forensic : The Mobile Forensic is for cell phones, Smart phones / Tablets & it goes beyond PowerPlugs standard logical analysis . Use of advanced proprietary protocols and phone APIs makes it possible to pull much more data from these devices. Location Finder : Location of the Lost mobile can be found up to a radius of 5 Mtr. area location with the help of proprietary software tool. Interception : Templates for PowerPoint Interception of communication of mobile can be done in the real time or checked later from the server.
  • 11. ETHICAL SURVEILLANCE OF SUSPECT SYSTEM: The system of the suspect can be monitored any time Ethically with the PowerPlugs approval of Law permission and Enforcement agencies for finding out the evidences and proofs . COMMUNICATION DEVICES: Smart Phones/Tablets and other such gadgets of the suspect can also be put on Real Time surveillance with Templates for PowerPoint necessary approvals and permissions as per the Law of Land.
  • 12. COMPUTER FORENSIC PROCESS MODEL Plan Aquire Extract Analyse Report 1. Plan PowerPlugs A computer forensics investigation begins with a well defined plan. A right formatted plan save time, increase the amount of relevant data, and produce the highest quality results, We work with staff investigators and security personnel to identify and target sources of evidence, gain an understanding of the case, and apply the proper procedures. 2. Acquire: Templates for PowerPoint from complete computer forensic The Acquisition process ranges disk imaging for gathering information from sources in a consistent manner.
  • 13. COMPUTER FORENSIC PROCESS MODEL 3. Extract: PowerPlugs To Extract Bit by Bit Data from the Hard Drives & other such places by using Best computer forensic software tools is the Backbon of any Forensic task. 4. Analyze: Even the smallest hard disk drives contain tens of thousands of files. Seuritarian uses advanced techniques and tools to isolate only the most relevant electronic data. It is not just the Tools or Software which gives accurate analysis but the ways and means of extracting Templates for PowerPoint Micro level and then corelating and and analysing data at the consolidating the same for solving the case.
  • 14. COMPUTER FORENSIC PROCESS MODEL 5. Report: PowerPlugs Once the analysis is complete, presenting an understandable, defendable, and complete report is key. The ability to defend the process and testify to the methodologies used makes our experts unrivaled in the field of computer forensics. Templates for PowerPoint
  • 15. PowerPlugs IT SECURITY Templates for PowerPoint
  • 16. IT SECURITY Corporate and Government agencies need to PowerPlugs proactively protect their critical applications, data and processes from external and internal threats throughout their entire life cycle. By taking a comprehensive and integrated approach to application vulnerability management, agencies can measurably improve operational security, mitigate risks,PowerPoint costs. Templates for and reduce
  • 17. NEED OF IT SECURITY IT Security is now PowerPlugs a basic requirement because global computing is inherently insecure. Information Security means protecting information from unauthorized access. Information security is a continue process to protect your information. Templates for PowerPoint
  • 18. IT SECURITY CIA Triangle • Confidentiality • Integrity PowerPlugs • Availability Confidentiality Ensuring that your information remains confidential and remains with only to those who should access that information. Information Integrity Templates for PowerPoint able to change your information, Knowing that no one has been so you can depend on its accuracy. Availability Making sure that your information is available when you need it.
  • 19. IT INFRASTRUCTURE • Servers PowerPlugs • Routers • Firewall • Network • Web Templates for PowerPoint • Users
  • 20. OUR PROCESS MODEL First Phase Identification of Targets System Fingerprinting, Enumeration, Checking the Information Flow Second Phase PowerPlugs Identification of Vulnerabilities and Potential Risks Non Destructive Exploitation of found Vulnerabilities Third Phase Result Collation and Report Writing Giving the Final Report to the Client about total health of I T Infrastructure. Fourth Phase Templates for for smooth & secure IT environment and Business Suggestions PowerPoint continuity. Recommendation of Industry Best Solutions to maintain secure environment to deal with future Threats and Challenges.
  • 21. PowerPlugs THANK YOU Templates for PowerPoint