Application of mind mapping automation in the analysis of information security log files Malwarebytes

787 views
627 views

Published on

Mind Mapping automation applied to the visualization and analysis of security Log files

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
787
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Application of mind mapping automation in the analysis of information security log files Malwarebytes

  1. 1. Mind Mapping automation in information security log analysis (III) - Malwarebytes Image courtesy of cuteimage / FreeDigitalPhotos.net
  2. 2. Applications of Mind Mapping automation in the analysis of security logs Initial presentation Endpoint Protector Second presentation AdwCleaner Third presentation Malwarebytes (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  3. 3. Malwarebytes To find and remove: • Anti-malware • Detects zero hour malware that AV miss (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  4. 4. Malwarebytes (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  5. 5. Malwarebytes.org (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  6. 6. Problem: Laptop infected with Conduit Search (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  7. 7. Report generated by Malwarebytes (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  8. 8. Mind Mapping version of the report (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  9. 9. Information (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  10. 10. Information + link to malwarebytes.org (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  11. 11. Memory processes analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  12. 12. Memory modules analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  13. 13. Registry Keys analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  14. 14. Detail of the Registry Keys analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  15. 15. Registry Values analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  16. 16. Registry Data Elements analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  17. 17. Detail of the Registry Data Elements analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  18. 18. Folders analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  19. 19. Files analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  20. 20. PUPs analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  21. 21. Detail of PUPs analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  22. 22. Detail of PUPs analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  23. 23. (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml Image courtesy of Stuart Miles / FreeDigitalPhotos.net
  24. 24. Contact Information José M. Guerrero jm@infoseg.com Slideshare Presentations Linkedin profile (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

×