8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
1/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
2/34
mailto:[email protected]:[email protected]://www.enisa.europa.eu/8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
3/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
4/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
5/34
http://bits.blogs.nytimes.com/2011/04/28/hackers-claim-to-have-playstation-users-card-data/?_r=0http://bits.blogs.nytimes.com/2011/04/28/hackers-claim-to-have-playstation-users-card-data/?_r=0http://arstechnica.com/security/2012/07/hacking-duo-charged-for-amazon-ddos/8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
6/34
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32002L0058:EN:NOThttp://www.paterva.com/web6/products/maltego.php8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
7/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
8/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
9/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
10/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
11/34
http://t.co/9b9fEe8MUvhttps://twitter.com/AnonOpsLegion/status/3524882344141127698/9/2019 Identifying and Handling Cyber-crime Traces Toolset
12/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
13/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
14/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
15/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
16/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
17/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
18/34
http://www.paterva.com/web6/products/download.php8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
19/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
20/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
21/34
http://www.paterva.com/web6/documentation/index.php8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
22/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
23/34
https://dev.twitter.com/apps/new8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
24/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
25/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
26/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
27/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
28/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
29/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
30/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
31/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
32/34
8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
33/34
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32002L0058:EN:NOThttp://bits.blogs.nytimes.com/2011/04/28/hackers-claim-to-have-playstation-users-card-data/?_r=0http://bits.blogs.nytimes.com/2011/04/28/hackers-claim-to-have-playstation-users-card-data/?_r=0http://arstechnica.com/security/2012/07/hacking-duo-charged-for-amazon-ddos/8/9/2019 Identifying and Handling Cyber-crime Traces Toolset
34/34