Another application of Mind Mapping automation in security logs analysis

26
New application of Mind Mapping automation in information security log analysis - AdwCleaner Image courtesy of Stuart Miles / FreeDigitalPhotos.net

description

Example of the application of Mind Mapping automation to the analysis of security log files. Analysis of AdwCleaner log files.

Transcript of Another application of Mind Mapping automation in security logs analysis

Page 1: Another application of Mind Mapping automation in security logs analysis

New application of Mind Mapping automation in information security log analysis - AdwCleaner Image courtesy of Stuart Miles

/ FreeDigitalPhotos.net

Page 3: Another application of Mind Mapping automation in security logs analysis

AdwCleaner

This is a free software to find and remove:

• Adware

• PUP / LPI

• Toolbars

• Highjackers

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 4: Another application of Mind Mapping automation in security logs analysis

AdwCleaner

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 5: Another application of Mind Mapping automation in security logs analysis

Problem: Laptop infected with Nation Zoom

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 6: Another application of Mind Mapping automation in security logs analysis

Report generated by AdwCleaner

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 7: Another application of Mind Mapping automation in security logs analysis

Mind Mapping version of the report

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 8: Another application of Mind Mapping automation in security logs analysis

Header

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 9: Another application of Mind Mapping automation in security logs analysis

Services

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 10: Another application of Mind Mapping automation in security logs analysis

Folders

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 11: Another application of Mind Mapping automation in security logs analysis

Files

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 12: Another application of Mind Mapping automation in security logs analysis

Direct Access

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 13: Another application of Mind Mapping automation in security logs analysis

Registry

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 14: Another application of Mind Mapping automation in security logs analysis

Browsers

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 15: Another application of Mind Mapping automation in security logs analysis

APPLICATION OF FILTERS

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 16: Another application of Mind Mapping automation in security logs analysis

NATION ZOOM

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 17: Another application of Mind Mapping automation in security logs analysis

Nation Zoom related information

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 18: Another application of Mind Mapping automation in security logs analysis

Filtered Mind Map after callouts and relationship have been added

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 19: Another application of Mind Mapping automation in security logs analysis

NCH SOFTWARE Another possible problem

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 20: Another application of Mind Mapping automation in security logs analysis

Folders and Files

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 21: Another application of Mind Mapping automation in security logs analysis

Registry and Direct Access

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 22: Another application of Mind Mapping automation in security logs analysis

ELEMENTS RELATED TO A USER

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 23: Another application of Mind Mapping automation in security logs analysis

Files and Browsers

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 24: Another application of Mind Mapping automation in security logs analysis

Direct Access

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 25: Another application of Mind Mapping automation in security logs analysis

Image courtesy of Stuart Miles / FreeDigitalPhotos.net

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 26: Another application of Mind Mapping automation in security logs analysis

Contact Information

José M. Guerrero

[email protected]

Slideshare Presentations

Linkedin profile

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml