IT forensic
Upcoming SlideShare
Loading in...5
×
 

IT forensic

on

  • 320 views

1. IT Security ...

1. IT Security
2. VAPT and Threats Analysis
3. Computer Forensics
4. Ethical Hacking (CEH)
5. Communication Security (Smartphone / Tablets)
6. Networks Essentials
7. Introduction to Information security
8. Foot printing and Reconnaissance
9. Scanning Networks
10. Vulnerability Scanning
11. Data Leakage Prevention
12. Trojans and Backdoors
13. Viruses and Worms
14. Sniffers
15. Hacking Web Applications
16. IDS, Firewalls, and Honey pots
17. Cryptography
18. Penetration Testing
19. TSCM (Technical Surveillance Counter Measure)

Statistics

Views

Total Views
320
Views on SlideShare
320
Embed Views
0

Actions

Likes
0
Downloads
20
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    IT forensic IT forensic Document Transcript

    • SecuritarianFORENSICINFORMATION TECHNOLOGY[Type the author name] 2013
    • Table of ContentsIT FORENSIC .............................................................................................................................................. 3Possibility of breach of security ................................................................................................................ 3Nature of Attacks...................................................................................................................................... 3 Internal Intrusion ................................................................................................................................... 3 External Intrusion .................................................................................................................................. 4FORENSIC ................................................................................................................................................. 4Forensic Type ............................................................................................................................................ 5Forensic Forensic Process Model .............................................................................................................. 6Our Services .............................................................................................................................................. 7 Securitarian Confidential Material 2
    • IT FORENSIC The IT Computer Forensic is investigatory approach for finding the evidences,extent of loss & culprits, when some information security breach has taken place.Forensic solution, lets examiners acquire data from a wide variety of devices, unearthpotential evidence with disk level forensic analysis, and craft comprehensive reports ontheir findings, all while maintaining the integrity of their evidence. A recent study indicates that over 93% of information produced is in digital format.The same study also noted that 85% of all criminal, civil, and company violations aredone by means of digital Intrusion.POSSIBILITY OF BREACH OF IT SECURITY • Theft of Company Secrets (client or employee lists) • Employee Sabotage or Terrorism • Credit Card Fraud • Financial Crimes • Embezzlement (money or information) • Economic Crimes • Harassment (sexual) • Child Pornography • Major Crimes • Identity Theft (short or long-term plans) Nature of Attacks o Internal  USB  PEN Drives  External Hard Drives  LAN o External  Web  Mail  IMINTERNAL INTRUSIONPen Drive Intrusion o Details of all pen drives installed on a system o Recorded as per O/S artifacts with timeline Securitarian Confidential Material 3
    • o Analysis of all pen drives used on different work station on a NetworkLocal Area Network Intrusion o Any suspected user Login Analysis with Victims computer in the Network o Artifacts with regard to different incidents taken place during that log on period EXTERNAL INTRUSION 1. Web Intrusion  Trojan  Malware  Spyware 2. Mails As an Attachment 3. IM  During communication  AttachmentForensic  Onsite search & acquisition of digital/electronic evidence and custody  Filtration and consolidation of data including emails and files  Law Firm consultations including defence strategies Corporate investigations  Expert witness service Computer security, hacker tracking and in-house protection  Computer Forensic Audits to comply with the Sarbannes Oxley Act or as a part of Information Security Audits  Fraud Investigations  Computer forensics including forensic analysis of all file systems  Email investigations- tracking of malicious / threatening e-mail senders  Establishment of computer forensic labs Creation of incident response teams (IRT)  Forensic bit stream imaging of various digital storage devices  Training in detection and analysis of digital evidence Intellectual property theft investigations/ Source code theft investigations Securitarian Confidential Material 4
    • Forensic TypeLog Forensic: To Analyse all kinds of log prepared by the operating system and devicesArtifact Forensic: To Locate and analyse huge number of Artifacts with reference to Chats, Communications, Web Browsing and File sharing activites occuring in wide range of softwaresTime Line: To find out when exactly with date and time any specific event happened on the systemForensic Spots: All types of foot prints consolidations for any unathorised activity happened on the systemDevice Incident Forensic: Installation / Activation of any External Hardware devices attached to the systemReversing Analysis: Decoding / Reverse Engineering of any incident/ activity done on any systemNetwork Forensic: To check and investigate who has logged into the system and whenEmail Forensic: Scanning of all emails Securitarian Confidential Material 5
    • COMPUTER FORENSIC PROCESS MODEL Plan Aquire Extract Analyse Report1. Plan A computer forensics investigation begins with a well defined plan. A rightformatted plan save time, increase the amount of relevant data,and produce the highestquality results, We work with staff investigators and security personnel to identify andtarget sources of evidence, gain an understanding of the case, and apply the properprocedures.2. Acquire: The Acquisition process ranges from complete computer forensic diskimaging for gathering information from sources in a consistent manner.3. Extract: To Extract Bit by Bit Data from the Hard Drives & other such places by using Bestcomputer forensic software tools is the Backbon of any Forensic task.4. Analyze: Even the smallest hard disk drives contain tens of thousands of files. Seuritarian uses advanced techniques and tools to isolate only the most relevantelectronic data. It is not just the Tools or Software which gives accurate analysis butthe ways and means of extracting and analysing data at the Micro level and thencorelating and consolidating the same for solving the case.5. Report: Once the analysis is complete, presenting an understandable, defendable, andcomplete report is key. The ability to defend the process and testify to themethodologies used makes our experts unrivaled in the field of computerforensics. Securitarian Confidential Material 6
    • We offer following services:  Computer Forensics including forensic analysis of all file systems  Mobile Forensics for Phone and PDA Analysis  Network Forensics  Incidence & emergency response services  Forensic bit stream imaging of various digital storage devices  Data recovery  Deleted file recovery  Password recovery  Steganography detection  Inappropriate & pornogrpahic content detection & Analysis  Comprehensive search with in hard disks, networks and storage devices  Physical and logical media analysis  Corrupt operating system data retrieval  Voice matching and biometric analysis  Video Analysis & enhancements  Email investigations- tracking of malicious or threatening e-mail senders  Email database analysis  On site acquisition of digital/electronic evidence and custody maintenance  Filtration and consolidation of data including emails and files  Hacker tracking and protection  Digital Fraud Investigations  ediscovery  Content analysis Securitarian Confidential Material 7