7/29/2019 It Security Forensic, Securitarian
1/13
PowerPlugs
Templates for PowerPoint
IT FORENSIC
The IT Computer Forensic is investigatory approach
for finding the evidences, extent of loss & culprits,
when some information security breach has taken
place. Forensic solution, lets examiners acquire datafrom a wide variety of devices, unearth potential
evidence with disk level forensic analysis, and craft
comprehensive reports on their findings, all while
maintaining the integrity of their evidence.
7/29/2019 It Security Forensic, Securitarian
2/13
PowerPlugs
Templates for PowerPoint
IT FORENSIC
A recent study indicates that over 93%
of information produced is in digital format.
The same study also noted that 85% of allcriminal, civil, and company violations are
done by means of digital Intrusion.
7/29/2019 It Security Forensic, Securitarian
3/13
PowerPlugs
Templates for PowerPoint
POSSIBILITY OF BREACH OF IT SECURITY
Theft of Company Secrets (client or employee lists) Employee Sabotage or Terrorism
Credit Card Fraud
Financial Crimes
Embezzlement (money or information)
Economic Crimes
Harassment (sexual)
Child Pornography
Major Crimes
Identity Theft (short or long-term plans)
7/29/2019 It Security Forensic, Securitarian
4/13
PowerPlugs
Templates for PowerPoint
Nature of Attacks
Internal
USB
PEN Drives
External Hard Drives
LAN
External
Web
IM
7/29/2019 It Security Forensic, Securitarian
5/13
PowerPlugs
Templates for PowerPoint
INTERNAL INTRUSION
Pen Drive Intrusion
o Details of all pen drives installed on a system
o Recorded as per O/S artifacts with timeline
o Analysis of all pen drives used on different work station on a Network
Local Area Network Intrusion
o Any suspected user Login Analysis with Victims computer in the Network
o Artifacts with regard to different incidents taken place during that log on period
7/29/2019 It Security Forensic, Securitarian
6/13
PowerPlugs
Templates for PowerPoint
EXTERNAL INTRUSION
1. Web IntrusionTrojan
Malware
Spyware
2. Mails
As an Attachment
3. IM
During communication
Attachment
7/29/2019 It Security Forensic, Securitarian
7/13
PowerPlugs
Templates for PowerPoint
IT SECURITY
7/29/2019 It Security Forensic, Securitarian
8/13
PowerPlugs
Templates for PowerPoint
IT
Government agencies need to proactively protect
their critical applications, data and processes from
external and internal threats throughout their
entire life cycle. By taking a comprehensive andintegrated approach to application vulnerability
management, agencies can measurably improve
operational security, mitigate risks, and reduce
costs.
7/29/2019 It Security Forensic, Securitarian
9/13
PowerPlugs
Templates for PowerPoint
IT
Why we need Security?
Security is now a basic requirement because
global computing is inherently insecure.
Information Security means protectinginformation from unauthorized access.
Information security is a continue process to
protect your information.
7/29/2019 It Security Forensic, Securitarian
10/13
PowerPlugs
Templates for PowerPoint
IT
CIA Triangle
Confidentiality
Integrity
Availability
Confidentiality
Ensuring that your information remains confidential and
remains with only to those who should access that information.
Information Integrity
Knowing that no one has been able to change your information,
so you can depend on its accuracy.
Availability
Making sure that your information is available when you need it.
7/29/2019 It Security Forensic, Securitarian
11/13
PowerPlugs
Templates for PowerPoint
IT INFRASTRUCTURE
Servers
Routers
Firewall
Network
Web
Users
7/29/2019 It Security Forensic, Securitarian
12/13
PowerPlugs
Templates for PowerPoint
IT SECURITY PROCESS MODEL
First Phase
Identification of Targets
System Fingerprinting, Enumeration, Checking the Information Flow
Second Phase
Identification of Vulnerabilities and Potential Risks
Non Destructive Exploitation of found Vulnerabilities
Third PhaseResult Collation and Report Writing
Giving the Final Report to the Client about total health of I T
Infrastructure.
Fourth Phase
Suggestions for smooth & secure IT environment and Business
continuity.
Recommendation of Industry Best Solutions to maintain secure
environment to deal with future Threats and Challenges.
7/29/2019 It Security Forensic, Securitarian
13/13
PowerPlugs
Templates for PowerPoint
THANK YOU