Upload
rupesh-verma
View
64
Download
0
Tags:
Embed Size (px)
DESCRIPTION
1. IT Security 2. VAPT and Threats Analysis 3. Computer Forensics 4. Ethical Hacking (CEH) 5. Communication Security (Smartphone / Tablets) 6. Networks Essentials 7. Introduction to Information security 8. Foot printing and Reconnaissance 9. Scanning Networks 10. Vulnerability Scanning 11. Data Leakage Prevention 12. Trojans and Backdoors 13. Viruses and Worms 14. Sniffers 15. Hacking Web Applications 16. IDS, Firewalls, and Honey pots 17. Cryptography 18. Penetration Testing 19. TSCM (Technical Surveillance Counter Measure)
Citation preview
PowerPlugs
Templates for PowerPoint
IT FORENSIC
The IT Computer Forensic is investigatory approach for finding the evidences, extent of loss & culprits, when some information security breach has taken place. Forensic solution, lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence.
PowerPlugs
Templates for PowerPoint
IT FORENSIC
A recent study indicates that over 93% of information produced is in digital format. The same study also noted that 85% of all criminal, civil, and company violations are done by means of digital Intrusion.
PowerPlugs
Templates for PowerPoint
POSSIBILITY OF BREACH OF IT SECURITY
• Theft of Company Secrets (client or employee lists)• Employee Sabotage or Terrorism• Credit Card Fraud• Financial Crimes• Embezzlement (money or information)• Economic Crimes• Harassment (sexual)• Child Pornography• Major Crimes• Identity Theft (short or long-term plans)
PowerPlugs
Templates for PowerPoint
Nature of AttacksInternal
USB
PEN Drives
External Hard
Drives
LAN
External
Web
IM
PowerPlugs
Templates for PowerPoint
INTERNAL INTRUSION
Pen Drive Intrusion
o Details of all pen drives installed on a system
o Recorded as per O/S artifacts with timeline
o Analysis of all pen drives used on different work station on a Network
Local Area Network Intrusion o Any suspected user Login Analysis with Victims computer in the Network
o Artifacts with regard to different incidents taken place during that log on period
PowerPlugs
Templates for PowerPoint
EXTERNAL INTRUSION
1. Web Intrusion
Trojan Malware Spyware
2. Mails
As an Attachment
3. IM
During communicationAttachment
PowerPlugs
Templates for PowerPoint
Forensic Type
PowerPlugs
Templates for PowerPoint
ITLog Forensic:
To Analyse all kinds of log prepared by the operating system and devices
Artifact Forensic:
To Locate and analyse huge number of Artifacts with reference to Chats, Communications, Web Browsing and File sharing activites occuring in wide range of softwares
Time Line:
To find out when exactly with date and time any specific event happened on the system
Forensic Spots:
All types of foot prints consolidations for any unathorised activity happened on the system
PowerPlugs
Templates for PowerPoint
ITDevice Incident Forensic:
Installation / Activation of any External Hardware devices attached to the system
Reversing Analysis:
Decoding / Reverse Engineering of any incident/ activity done on any system
Network Forensic:
To check and investigate who has logged into the system and when
Email Forensic:
Scanning of all emails
PowerPlugs
Templates for PowerPoint
COMMUNICATION
Forensic :
The Mobile Forensic is for cell phones, Smart phones / Tablets & it goes beyond standard logical analysis . Use of advanced
proprietary protocols and phone APIs makes it possible to pull much more data from these devices.
Location Finder :
Location of the Lost mobile can be found up to a radius of 5 Mtr. area location with the help of proprietary software tool.
Interception :
Interception of communication of mobile can be done in the real time or checked later from the server.
PowerPlugs
Templates for PowerPoint
ETHICAL SURVEILLANCE OF SUSPECT
SYSTEM:The system of the suspect can be monitored any time
Ethically with the permission and approval of Law Enforcement agencies for finding out the evidences and proofs .
COMMUNICATION DEVICES:Smart Phones/Tablets and other such gadgets of the
suspect can also be put on Real Time surveillance with necessary approvals and permissions as per the Law of Land.
PowerPlugs
Templates for PowerPoint
COMPUTER FORENSIC PROCESS MODEL
Plan Aquire Extract Analyse Report
1. PlanA computer forensics investigation begins with a well defined plan. A right formatted plan save time, increase the amount of relevant data, and produce the highest quality results, We work with staff
investigators and security personnel to identify and target sources of evidence, gain an understanding of the case, and apply the proper procedures.
2. Acquire:
The Acquisition process ranges from complete computer forensic disk imaging for gathering information from sources in a consistent manner.
PowerPlugs
Templates for PowerPoint
COMPUTER FORENSIC PROCESS MODEL
3. Extract:
To Extract Bit by Bit Data from the Hard Drives & other such places by using Best computer forensic software tools is the Backbon of any Forensic task.
4. Analyze:Even the smallest hard disk drives contain tens of thousands of files.
Seuritarian uses advanced techniques and tools to isolate only the most relevant electronic data. It is not just the Tools or Software
which gives accurate analysis but the ways and means of extracting and analysing data at the Micro level and then corelating and consolidating the same for solving the case.
PowerPlugs
Templates for PowerPoint
COMPUTER FORENSIC PROCESS MODEL
5. Report:
Once the analysis is complete, presenting an understandable, defendable, and complete report is key. The ability to defend the
process and testify to the methodologies used makes our experts unrivaled in the field of computer forensics.
PowerPlugs
Templates for PowerPoint
IT SECURITY
PowerPlugs
Templates for PowerPoint
IT SECURITY
Corporate and Government agencies need to proactively protect their critical applications, data and processes from external and internal threats throughout their entire life cycle. By taking a comprehensive and integrated approach to application vulnerability management, agencies can measurably improve operational security, mitigate risks, and reduce costs.
PowerPlugs
Templates for PowerPoint
NEED OF IT SECURITY
IT Security is now a basic requirement because global computing is inherently insecure. Information Security means protecting information from unauthorized access. Information security is a continue process to protect your information.
PowerPlugs
Templates for PowerPoint
IT SECURITYCIA Triangle
• Confidentiality• Integrity• Availability
Confidentiality
Ensuring that your information remains confidential and remains with only to those who should access that information.
Information IntegrityKnowing that no one has been able to change your information, so you can depend on its accuracy.
AvailabilityMaking sure that your information is available when you need it.
PowerPlugs
Templates for PowerPoint
IT INFRASTRUCTURE
• Servers
• Routers
• Firewall
• Network
• Web
• Users
PowerPlugs
Templates for PowerPoint
OUR PROCESS MODEL
First Phase Identification of Targets
System Fingerprinting, Enumeration, Checking the Information Flow Second Phase Identification of Vulnerabilities and Potential Risks Non Destructive Exploitation of found Vulnerabilities Third Phase Result Collation and Report Writing Giving the Final Report to the Client about total health of I T
Infrastructure. Fourth Phase Suggestions for smooth & secure IT environment and Business
continuity. Recommendation of Industry Best Solutions to maintain secure environment to deal with future Threats and Challenges.
PowerPlugs
Templates for PowerPoint
THANK YOU