Another application of Mind Mapping automation in security logs analysis
Upcoming SlideShare
Loading in...5
×
 

Another application of Mind Mapping automation in security logs analysis

on

  • 380 views

Example of the application of Mind Mapping automation to the analysis of security log files. Analysis of AdwCleaner log files.

Example of the application of Mind Mapping automation to the analysis of security log files. Analysis of AdwCleaner log files.

Statistics

Views

Total Views
380
Views on SlideShare
346
Embed Views
34

Actions

Likes
0
Downloads
5
Comments
0

1 Embed 34

http://www.scoop.it 34

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

CC Attribution-NonCommercial LicenseCC Attribution-NonCommercial License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Another application of Mind Mapping automation in security logs analysis Another application of Mind Mapping automation in security logs analysis Presentation Transcript

    • New application of Mind Mapping automation in information security log analysis - AdwCleaner Image courtesy of Stuart Miles / FreeDigitalPhotos.net
    • Applications of Mind Mapping automation in the analysis of security logs Initial presentation Endpoint Protector (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • AdwCleaner This is a free software to find and remove: • • • • Adware PUP / LPI Toolbars Highjackers (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • AdwCleaner (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Problem: Laptop infected with Nation Zoom (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Report generated by AdwCleaner (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Mind Mapping version of the report (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Header (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Services (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Folders (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Files (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Direct Access (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Registry (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Browsers (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • APPLICATION OF FILTERS (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • NATION ZOOM (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Nation Zoom related information (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Filtered Mind Map after callouts and relationship have been added (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Another possible problem NCH SOFTWARE (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Folders and Files (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Registry and Direct Access (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • ELEMENTS RELATED TO A USER (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Files and Browsers (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • Direct Access (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
    • (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml Image courtesy of Stuart Miles / FreeDigitalPhotos.net
    • Contact Information José M. Guerrero jm@infoseg.com Slideshare Presentations Linkedin profile (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml