Top Banner

of 13

It Security Forensic, Securitarian

Apr 03, 2018

Download

Documents

Rupesh Verma
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/29/2019 It Security Forensic, Securitarian

    1/13

    PowerPlugs

    Templates for PowerPoint

    IT FORENSIC

    The IT Computer Forensic is investigatory approach

    for finding the evidences, extent of loss & culprits,

    when some information security breach has taken

    place. Forensic solution, lets examiners acquire datafrom a wide variety of devices, unearth potential

    evidence with disk level forensic analysis, and craft

    comprehensive reports on their findings, all while

    maintaining the integrity of their evidence.

  • 7/29/2019 It Security Forensic, Securitarian

    2/13

    PowerPlugs

    Templates for PowerPoint

    IT FORENSIC

    A recent study indicates that over 93%

    of information produced is in digital format.

    The same study also noted that 85% of allcriminal, civil, and company violations are

    done by means of digital Intrusion.

  • 7/29/2019 It Security Forensic, Securitarian

    3/13

    PowerPlugs

    Templates for PowerPoint

    POSSIBILITY OF BREACH OF IT SECURITY

    Theft of Company Secrets (client or employee lists) Employee Sabotage or Terrorism

    Credit Card Fraud

    Financial Crimes

    Embezzlement (money or information)

    Economic Crimes

    Harassment (sexual)

    Child Pornography

    Major Crimes

    Identity Theft (short or long-term plans)

  • 7/29/2019 It Security Forensic, Securitarian

    4/13

    PowerPlugs

    Templates for PowerPoint

    Nature of Attacks

    Internal

    USB

    PEN Drives

    External Hard Drives

    LAN

    External

    Web

    Mail

    IM

  • 7/29/2019 It Security Forensic, Securitarian

    5/13

    PowerPlugs

    Templates for PowerPoint

    INTERNAL INTRUSION

    Pen Drive Intrusion

    o Details of all pen drives installed on a system

    o Recorded as per O/S artifacts with timeline

    o Analysis of all pen drives used on different work station on a Network

    Local Area Network Intrusion

    o Any suspected user Login Analysis with Victims computer in the Network

    o Artifacts with regard to different incidents taken place during that log on period

  • 7/29/2019 It Security Forensic, Securitarian

    6/13

    PowerPlugs

    Templates for PowerPoint

    EXTERNAL INTRUSION

    1. Web IntrusionTrojan

    Malware

    Spyware

    2. Mails

    As an Attachment

    3. IM

    During communication

    Attachment

  • 7/29/2019 It Security Forensic, Securitarian

    7/13

    PowerPlugs

    Templates for PowerPoint

    IT SECURITY

  • 7/29/2019 It Security Forensic, Securitarian

    8/13

    PowerPlugs

    Templates for PowerPoint

    IT

    Government agencies need to proactively protect

    their critical applications, data and processes from

    external and internal threats throughout their

    entire life cycle. By taking a comprehensive andintegrated approach to application vulnerability

    management, agencies can measurably improve

    operational security, mitigate risks, and reduce

    costs.

  • 7/29/2019 It Security Forensic, Securitarian

    9/13

    PowerPlugs

    Templates for PowerPoint

    IT

    Why we need Security?

    Security is now a basic requirement because

    global computing is inherently insecure.

    Information Security means protectinginformation from unauthorized access.

    Information security is a continue process to

    protect your information.

  • 7/29/2019 It Security Forensic, Securitarian

    10/13

    PowerPlugs

    Templates for PowerPoint

    IT

    CIA Triangle

    Confidentiality

    Integrity

    Availability

    Confidentiality

    Ensuring that your information remains confidential and

    remains with only to those who should access that information.

    Information Integrity

    Knowing that no one has been able to change your information,

    so you can depend on its accuracy.

    Availability

    Making sure that your information is available when you need it.

  • 7/29/2019 It Security Forensic, Securitarian

    11/13

    PowerPlugs

    Templates for PowerPoint

    IT INFRASTRUCTURE

    Servers

    Routers

    Firewall

    Network

    Web

    Users

  • 7/29/2019 It Security Forensic, Securitarian

    12/13

    PowerPlugs

    Templates for PowerPoint

    IT SECURITY PROCESS MODEL

    First Phase

    Identification of Targets

    System Fingerprinting, Enumeration, Checking the Information Flow

    Second Phase

    Identification of Vulnerabilities and Potential Risks

    Non Destructive Exploitation of found Vulnerabilities

    Third PhaseResult Collation and Report Writing

    Giving the Final Report to the Client about total health of I T

    Infrastructure.

    Fourth Phase

    Suggestions for smooth & secure IT environment and Business

    continuity.

    Recommendation of Industry Best Solutions to maintain secure

    environment to deal with future Threats and Challenges.

  • 7/29/2019 It Security Forensic, Securitarian

    13/13

    PowerPlugs

    Templates for PowerPoint

    THANK YOU