SlideShare une entreprise Scribd logo
1  sur  15
•
    –
    –

    –

        •
    –
    –
    –
•
•
•
        •

        2
•




    •


    •

–



–

    3
•


–
–

–
–
–

–

–
    4
•




            •
        .
            •
.
            •
    .


            5
•




6
•
•
•


•

•


•

•


    7
•

    •

–
–

    •




    8
Chain of Custody   •
                   •
                   •

                   •

                   •
                   •
                   •


                   •

                   •
                   •
                   •


                   9
•

                                             •

Safe Wiping, steganography,                  •
                              polymorphism

                                             •

                                             •
                                             •

                                             10
Cyber
                                                           Crimes
                                                                •
                        Cyber Gangs                          –
                                                  Botnet     –
                        Privacy & Anonymity                      •
                   Proxy, Encryption                         –
                                                             –
                                Financial Fraud                  •
                                                             –
        Phishing                                             –
                                                                 •
                                                             –

                                                                 11
Cyber Crimes
Impersonation & Identity Theft                   •
                                            –
  Abuse, Trolling & Cyber Stalking               •
                                            –
                                       HTTPS –

            Web defacement                       •
                        Logs                –
                 DDOS                            •
                                            –
                                            –


                                                 12
•
                        •
                    –
Remote Wiping           •
                    –
    Data Recovery       •
                    –
                        •
                        •


                        13
•
                Full Disk Encryption           •
                                          –
                               Wiping          •
                                          –
                                               •
                                        RAID
                                          –
                                          –
Live Response                                  •
                                          –
                                          –
                Logs                           •

                                               14
•

•
•




15

Contenu connexe

En vedette

ملف إنجاز مها
ملف إنجاز مهاملف إنجاز مها
ملف إنجاز مهاumbander123
 
ملف إنجاز المعلم
ملف إنجاز المعلمملف إنجاز المعلم
ملف إنجاز المعلمgma227909
 
مقرر مهارات الدعم الفني نظري Sysaid
مقرر مهارات الدعم الفني نظري Sysaidمقرر مهارات الدعم الفني نظري Sysaid
مقرر مهارات الدعم الفني نظري SysaidTalal ALsahrani
 
ملف الانجاز
ملف الانجازملف الانجاز
ملف الانجازsama1387
 
الأسرار السبعة لنجاح مؤشرات الأداء الرئيسية
الأسرار السبعة لنجاح مؤشرات الأداء الرئيسيةالأسرار السبعة لنجاح مؤشرات الأداء الرئيسية
الأسرار السبعة لنجاح مؤشرات الأداء الرئيسيةIbrahim Neyaz
 
عرض ملف الانجاز الالكتروني والاختبارات الالكترونية
عرض ملف الانجاز الالكتروني والاختبارات الالكترونيةعرض ملف الانجاز الالكتروني والاختبارات الالكترونية
عرض ملف الانجاز الالكتروني والاختبارات الالكترونيةamanialdakhil
 

En vedette (7)

ملف إنجاز مها
ملف إنجاز مهاملف إنجاز مها
ملف إنجاز مها
 
ملف إنجاز المعلم
ملف إنجاز المعلمملف إنجاز المعلم
ملف إنجاز المعلم
 
مقرر مهارات الدعم الفني نظري Sysaid
مقرر مهارات الدعم الفني نظري Sysaidمقرر مهارات الدعم الفني نظري Sysaid
مقرر مهارات الدعم الفني نظري Sysaid
 
ملف الانجاز
ملف الانجازملف الانجاز
ملف الانجاز
 
الأسرار السبعة لنجاح مؤشرات الأداء الرئيسية
الأسرار السبعة لنجاح مؤشرات الأداء الرئيسيةالأسرار السبعة لنجاح مؤشرات الأداء الرئيسية
الأسرار السبعة لنجاح مؤشرات الأداء الرئيسية
 
عرض ملف الانجاز الالكتروني والاختبارات الالكترونية
عرض ملف الانجاز الالكتروني والاختبارات الالكترونيةعرض ملف الانجاز الالكتروني والاختبارات الالكترونية
عرض ملف الانجاز الالكتروني والاختبارات الالكترونية
 
ITIL Ayman Hraghi
ITIL Ayman HraghiITIL Ayman Hraghi
ITIL Ayman Hraghi
 

Similaire à الدعم الفني المقدم من هيئة الاتصالات وتقنية المعلومات

インターネットの形を変えてしまうかも知れないDPI
インターネットの形を変えてしまうかも知れないDPIインターネットの形を変えてしまうかも知れないDPI
インターネットの形を変えてしまうかも知れないDPIgeekpage
 
SDK Datasheet
SDK DatasheetSDK Datasheet
SDK Datasheethanniw79
 
Polaris company Presentation
Polaris company  PresentationPolaris company  Presentation
Polaris company Presentationmoshe_m
 
Polaris Company Presentation
Polaris Company PresentationPolaris Company Presentation
Polaris Company Presentationmoshe_m
 

Similaire à الدعم الفني المقدم من هيئة الاتصالات وتقنية المعلومات (6)

インターネットの形を変えてしまうかも知れないDPI
インターネットの形を変えてしまうかも知れないDPIインターネットの形を変えてしまうかも知れないDPI
インターネットの形を変えてしまうかも知れないDPI
 
אודות JRaise
אודות JRaiseאודות JRaise
אודות JRaise
 
J raise webinar
J raise webinarJ raise webinar
J raise webinar
 
SDK Datasheet
SDK DatasheetSDK Datasheet
SDK Datasheet
 
Polaris company Presentation
Polaris company  PresentationPolaris company  Presentation
Polaris company Presentation
 
Polaris Company Presentation
Polaris Company PresentationPolaris Company Presentation
Polaris Company Presentation
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

الدعم الفني المقدم من هيئة الاتصالات وتقنية المعلومات

  • 1.
  • 2. – – – • – – – • • • • 2
  • 3. • • – – 3
  • 5. • . • . • . 5
  • 8. • – – • 8
  • 9. Chain of Custody • • • • • • • • • • • 9
  • 10. • Safe Wiping, steganography, • polymorphism • • • 10
  • 11. Cyber Crimes • Cyber Gangs – Botnet – Privacy & Anonymity • Proxy, Encryption – – Financial Fraud • – Phishing – • – 11
  • 12. Cyber Crimes Impersonation & Identity Theft • – Abuse, Trolling & Cyber Stalking • – HTTPS – Web defacement • Logs – DDOS • – – 12
  • 13. • – Remote Wiping • – Data Recovery • – • • 13
  • 14. Full Disk Encryption • – Wiping • – • RAID – – Live Response • – – Logs • 14