Securitarian

21
PowerPlugs Templates for PowerPoint IT FORENSIC The IT Computer Forensic is investigatory approach for finding the evidences, extent of loss & culprits, when some information security breach has taken place. Forensic solution, lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence.

description

1. IT Security2. VAPT and Threats Analysis3. Computer Forensics4. Ethical Hacking (CEH)5. Communication Security (Smartphone / Tablets)6. Networks Essentials7. Introduction to Information security8. Foot printing and Reconnaissance9. Scanning Networks10. Vulnerability Scanning11. Data Leakage Prevention12. Trojans and Backdoors13. Viruses and Worms14. Sniffers15. Hacking Web Applications16. IDS, Firewalls, and Honey pots17. Cryptography18. Penetration Testing19. TSCM (Technical Surveillance Counter Measure)

Transcript of Securitarian

Page 1: Securitarian

PowerPlugs

Templates for PowerPoint

IT FORENSIC

The IT Computer Forensic is investigatory approach for finding the evidences, extent of loss & culprits, when some information security breach has taken place. Forensic solution, lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence.

Page 2: Securitarian

PowerPlugs

Templates for PowerPoint

IT FORENSIC

A recent study indicates that over 93% of information produced is in digital format. The same study also noted that 85% of all criminal, civil, and company violations are done by means of digital Intrusion.

Page 3: Securitarian

PowerPlugs

Templates for PowerPoint

POSSIBILITY OF BREACH OF IT SECURITY

• Theft of Company Secrets (client or employee lists)• Employee Sabotage or Terrorism• Credit Card Fraud• Financial Crimes• Embezzlement (money or information)• Economic Crimes• Harassment (sexual)• Child Pornography• Major Crimes• Identity Theft (short or long-term plans)

Page 4: Securitarian

PowerPlugs

Templates for PowerPoint

Nature of AttacksInternal

USB

PEN Drives

External Hard

Drives

LAN

External

Web

Mail

IM

Page 5: Securitarian

PowerPlugs

Templates for PowerPoint

INTERNAL INTRUSION

Pen Drive Intrusion

o Details of all pen drives installed on a system

o Recorded as per O/S artifacts with timeline

o Analysis of all pen drives used on different work station on a Network

Local Area Network Intrusion o Any suspected user Login Analysis with Victims computer in the Network

o Artifacts with regard to different incidents taken place during that log on period

Page 6: Securitarian

PowerPlugs

Templates for PowerPoint

EXTERNAL INTRUSION

1. Web Intrusion

Trojan Malware Spyware

2. Mails

As an Attachment

3. IM

During communicationAttachment

Page 7: Securitarian

PowerPlugs

Templates for PowerPoint

Forensic Type

Page 8: Securitarian

PowerPlugs

Templates for PowerPoint

ITLog Forensic:

To Analyse all kinds of log prepared by the operating system and devices

Artifact Forensic:

To Locate and analyse huge number of Artifacts with reference to Chats, Communications, Web Browsing and File sharing activites occuring in wide range of softwares

Time Line:

To find out when exactly with date and time any specific event happened on the system

Forensic Spots:

All types of foot prints consolidations for any unathorised activity happened on the system

Page 9: Securitarian

PowerPlugs

Templates for PowerPoint

ITDevice Incident Forensic:

Installation / Activation of any External Hardware devices attached to the system

Reversing Analysis:

Decoding / Reverse Engineering of any incident/ activity done on any system

Network Forensic:

To check and investigate who has logged into the system and when

Email Forensic:

Scanning of all emails

Page 10: Securitarian

PowerPlugs

Templates for PowerPoint

COMMUNICATION

Forensic :

The Mobile Forensic is for cell phones, Smart phones / Tablets & it goes beyond standard logical analysis . Use of advanced

proprietary protocols and phone APIs makes it possible to pull much more data from these devices.

Location Finder :

Location of the Lost mobile can be found up to a radius of 5 Mtr. area location with the help of proprietary software tool.

Interception :

Interception of communication of mobile can be done in the real time or checked later from the server.

Page 11: Securitarian

PowerPlugs

Templates for PowerPoint

ETHICAL SURVEILLANCE OF SUSPECT

SYSTEM:The system of the suspect can be monitored any time

Ethically with the permission and approval of Law Enforcement agencies for finding out the evidences and proofs .

COMMUNICATION DEVICES:Smart Phones/Tablets and other such gadgets of the

suspect can also be put on Real Time surveillance with necessary approvals and permissions as per the Law of Land.

Page 12: Securitarian

PowerPlugs

Templates for PowerPoint

COMPUTER FORENSIC PROCESS MODEL

Plan Aquire Extract Analyse Report

1. PlanA computer forensics investigation begins with a well defined plan. A right formatted plan save time, increase the amount of relevant data, and produce the highest quality results, We work with staff

investigators and security personnel to identify and target sources of evidence, gain an understanding of the case, and apply the proper procedures.

2. Acquire:

The Acquisition process ranges from complete computer forensic disk imaging for gathering information from sources in a consistent manner.

Page 13: Securitarian

PowerPlugs

Templates for PowerPoint

COMPUTER FORENSIC PROCESS MODEL

3. Extract:

To Extract Bit by Bit Data from the Hard Drives & other such places by using Best computer forensic software tools is the Backbon of any Forensic task.

4. Analyze:Even the smallest hard disk drives contain tens of thousands of files.

Seuritarian uses advanced techniques and tools to isolate only the most relevant electronic data. It is not just the Tools or Software

which gives accurate analysis but the ways and means of extracting and analysing data at the Micro level and then corelating and consolidating the same for solving the case.

Page 14: Securitarian

PowerPlugs

Templates for PowerPoint

COMPUTER FORENSIC PROCESS MODEL

5. Report:

Once the analysis is complete, presenting an understandable, defendable, and complete report is key. The ability to defend the

process and testify to the methodologies used makes our experts unrivaled in the field of computer forensics.

Page 15: Securitarian

PowerPlugs

Templates for PowerPoint

IT SECURITY

Page 16: Securitarian

PowerPlugs

Templates for PowerPoint

IT SECURITY

Corporate and Government agencies need to proactively protect their critical applications, data and processes from external and internal threats throughout their entire life cycle. By taking a comprehensive and integrated approach to application vulnerability management, agencies can measurably improve operational security, mitigate risks, and reduce costs.

Page 17: Securitarian

PowerPlugs

Templates for PowerPoint

NEED OF IT SECURITY

 IT Security is now a basic requirement because global computing is inherently insecure. Information Security means protecting information from unauthorized access. Information security is a continue process to protect your information. 

Page 18: Securitarian

PowerPlugs

Templates for PowerPoint

IT SECURITYCIA Triangle

• Confidentiality• Integrity• Availability

   Confidentiality

Ensuring that your information remains confidential and remains with only to those who should access that information.

Information IntegrityKnowing that no one has been able to change your information, so you can depend on its accuracy.

AvailabilityMaking sure that your information is available when you need it.

Page 19: Securitarian

PowerPlugs

Templates for PowerPoint

IT INFRASTRUCTURE

  • Servers

• Routers

• Firewall

• Network

• Web

• Users

Page 20: Securitarian

PowerPlugs

Templates for PowerPoint

OUR PROCESS MODEL

  

First Phase Identification of Targets

  System Fingerprinting, Enumeration, Checking the Information Flow  Second Phase   Identification of Vulnerabilities and Potential Risks   Non Destructive Exploitation of found Vulnerabilities   Third Phase   Result Collation and Report Writing   Giving the Final Report to the Client about total health of I T

Infrastructure.   Fourth Phase  Suggestions for smooth & secure IT environment and Business

continuity. Recommendation of Industry Best Solutions to maintain secure environment to deal with future Threats and Challenges.

Page 21: Securitarian

PowerPlugs

Templates for PowerPoint

THANK YOU