Top Banner
PowerPlugs PowerPlugs Templates for PowerPoint Templates for PowerPoint IT FORENSIC The IT Computer Forensic is investigatory approach for finding the evidences, extent of loss & culprits, when some information security breach has taken place. Forensic solution, lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence.
13
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

IT FORENSIC

The IT Computer Forensic is investigatory approach for finding the evidences, extent of loss & culprits, when some information security breach has taken place. Forensic solution, lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while maintaining the integrity of their evidence.

Page 2: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

IT FORENSIC

A recent study indicates that over 93% of information produced is in digital format. The same study also noted that 85% of all criminal, civil, and company violations are done by means of digital Intrusion.

Page 3: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

POSSIBILITY OF BREACH OF IT SECURITY

• Theft of Company Secrets (client or employee lists)• Employee Sabotage or Terrorism• Credit Card Fraud• Financial Crimes• Embezzlement (money or information)• Economic Crimes• Harassment (sexual)• Child Pornography• Major Crimes• Identity Theft (short or long-term plans)

Page 4: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

Page 5: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

INTERNAL INTRUSION

Pen Drive Intrusion

o Details of all pen drives installed on a system

o Recorded as per O/S artifacts with timeline

o Analysis of all pen drives used on different work station on a Network

Local Area Network Intrusion

o Any suspected user Login Analysis with Victims computer in the Network

o Artifacts with regard to different incidents taken place during that log on period

Page 6: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

EXTERNAL INTRUSION

1. Web Intrusion

Trojan Malware Spyware

2. Mails

As an Attachment

3.IM

During communicationAttachment

Page 7: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

IT SECURITY

Page 8: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

IT

Government agencies need to proactively protect their critical applications, data and processes from external and internal threats throughout their entire life cycle. By taking a comprehensive and integrated approach to application vulnerability management, agencies can measurably improve operational security, mitigate risks, and reduce costs.

Page 9: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

IT

Why we need Security? Security is now a basic requirement because global computing is inherently insecure. Information Security means protecting information from unauthorized access. Information security is a continue process to protect your information. 

Page 10: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

IT

CIA Triangle

• Confidentiality• Integrity• Availability

   Confidentiality

Ensuring that your information remains confidential and remains with only to those who should access that information.

Information IntegrityKnowing that no one has been able to change your information, so you can depend on its accuracy.

AvailabilityMaking sure that your information is available when you need it.

Page 11: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

IT INFRASTRUCTURE

  • Servers

• Routers

• Firewall

• Network

• Web

• Users

Page 12: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

IT SECURITY PROCESS MODEL

  

First Phase Identification of Targets

  System Fingerprinting, Enumeration, Checking the Information Flow  Second Phase   Identification of Vulnerabilities and Potential Risks   Non Destructive Exploitation of found Vulnerabilities   Third Phase   Result Collation and Report Writing   Giving the Final Report to the Client about total health of I T

Infrastructure.   Fourth Phase  Suggestions for smooth & secure IT environment and Business

continuity. Recommendation of Industry Best Solutions to maintain secure environment to deal with future Threats and Challenges.

Page 13: It security forensic

PowerPlugsPowerPlugs

Templates for PowerPointTemplates for PowerPoint

THANK YOU