Top Banner

of 34

Identifying and Handling Cyber-crime Traces Toolset

Jun 01, 2018

Download

Documents

Flavio58IT
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    1/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    2/34

    mailto:[email protected]:[email protected]://www.enisa.europa.eu/
  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    3/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    4/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    5/34

    http://bits.blogs.nytimes.com/2011/04/28/hackers-claim-to-have-playstation-users-card-data/?_r=0http://bits.blogs.nytimes.com/2011/04/28/hackers-claim-to-have-playstation-users-card-data/?_r=0http://arstechnica.com/security/2012/07/hacking-duo-charged-for-amazon-ddos/
  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    6/34

    http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32002L0058:EN:NOThttp://www.paterva.com/web6/products/maltego.php
  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    7/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    8/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    9/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    10/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    11/34

    http://t.co/9b9fEe8MUvhttps://twitter.com/AnonOpsLegion/status/352488234414112769
  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    12/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    13/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    14/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    15/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    16/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    17/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    18/34

    http://www.paterva.com/web6/products/download.php
  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    19/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    20/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    21/34

    http://www.paterva.com/web6/documentation/index.php
  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    22/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    23/34

    https://dev.twitter.com/apps/new
  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    24/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    25/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    26/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    27/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    28/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    29/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    30/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    31/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    32/34

  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    33/34

    http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32002L0058:EN:NOThttp://bits.blogs.nytimes.com/2011/04/28/hackers-claim-to-have-playstation-users-card-data/?_r=0http://bits.blogs.nytimes.com/2011/04/28/hackers-claim-to-have-playstation-users-card-data/?_r=0http://arstechnica.com/security/2012/07/hacking-duo-charged-for-amazon-ddos/
  • 8/9/2019 Identifying and Handling Cyber-crime Traces Toolset

    34/34