Designing IA for AI - Information Architecture Conference 2024
Cybersecurity Presentation by Tecomex Forensics Ltd
1.
2. 1. Tecomex Forensics Background
2. Tecomex Forensics Key Services
3. Cybersecurity
4. Digital Forensics
5. Cryptography
6. Cybersecurity & Forensics Training
7. Cybersecurity & Forensics Research
3. 1. Company founded in 2010
2. Premier Security Company in Coventry
3. Fifteen years experience in Cybersecurity
4. Company started trading in 2013
5. Company provides Five key services
1. Cybercurity
2. Digital Forensics
3. Cryptography
4. Cybersecurity and Forensics Training
5. Cybersecurity and Forensics Research
7. Now that you know the threats of cyber-
crimes to your corporate network, and
how expensive it is to fix it, the BIG
question is: Are you ready to do
something about it before it becomes too
late? At Tecomex Forensics we can help
you get one step ahead of the HACKERS....
8. “Penetration testing (PENTEST) is the well
established process of attempting to break into
a computer network from within or outside of
the network by network security experts using
advanced software technology with the sole
purpose of identifying security vulnerabilities
within the network infrastructure. PENTEST is
NEVER done without the express permission of
the network owner(s).”
9. 1. Real-life simulation of hacker attacks
2. Identify threats from within & outside
3. Help find threats before hackers find them!
4. Audit client PC and servers for vulnerabilities
5. Audit OS and applications for vulnerabilities
6. Identify Firewall/Router mis-configurations
7. Deploy important security patches
8. Help implement robust security policies
10. WHITEBOX PENTEST is done from within the target
network and is done when the security experts are
provided with some useful information about the
network before commencing the PENTEST.
BLACKBOX PENTEST is done from outside the target
network. The security experts start with a zero
knowledge of the network infrastructure and attempt
to break their way into it using advanced tools and
techniques.
GREYBOX PENTEST is the hybrid test. It is done when
the expert pentesters are furnished with partial
information about the target network to be tested.
11. “Digital Forensics is the globally recognised
scientific process of identifying, extracting,
securing, and evaluating evidence from digital
media from computers and other digital
devices like mobile phones, SATNAVs, digital
cameras, and presenting the digital evidence
in a court of law. Prosecutors and law
enforcement agencies from around the world
routinely use this service to secure conviction
of criminals in court of law.”
12.
13. At Tecomex we are able to recover all of the above data types
14.
15. Logical structure of attacked NetworkPhysical structure of attacked Network
Data mining structure
From the data mining
results, our network
security experts are able
to forensically analyse the
nature of attack, which
computers have been
attacked, and the severity
of the attack.
16. Client
identifies the
severity of
network
attack by
outsiders or
insiders
Client
requests for
emergency
response
from
Tecomex
Forensics
Tecomex
attends site
within 24
hours and
makes
preliminary
appraisal
Tecomex
Forensics
signs NDA
and
commences
Network
Analysis
Tecomex
Forensics
submits
findings and
suggestions
17. “Satellite Navigation also often shortened as
SATNAV, SAT-NAV, GPS NAV, or GPS-NAV is a
smart navigation device used for route finding.
SATNAV is used for navigation on land, air and
sea. The technology is also used to pinpoint the
exact location of objects in relation to the earth.
A typical Satellite Navigation system is made of
both hardware and software. Because of this, the
SATNAV will always have configuration files that
could be forensically extracted and examined by
an expert.”
19. We will be able to extract the above information from a
SATNAV device using a combination of tools and techniques,
and tender as evidence which, is acceptable in a court of law.
1. Waypoints travelled by Marine crafts
2. Directions taken by land-based vehicle
3. The distance of journeys made
4. The time taken to make the journeys
5. Saved favourite locations
6. Saved contact details
7. Phone calls made
20. At Tecomex Forensics Ltd, we use
powerful SIM Forensics Tools to
extract information from SIM
cards.
21. Reference: wikepedia.com
“An expert witness, professional witness or judicial
expert is a witness, who by virtue
of education, training, skill, or experience, is
believed to have expertise and
specialised knowledge in a particular subject
beyond that of the average person, sufficient that
others may officially and legally rely upon the
witness's specialised (scientific, technical or other)
opinion about an evidence or fact issue within the
scope of his expertise, referred to as the expert
opinion.”
22. At Tecomex Forensics Ltd, we are able to
provide Expert Witness service to our clients
from anywhere in the world. The key to our
Expert Witness success is the professional
qualification, immense experience gained in
the field and the use of globally recognised
Digital Forensics tools like Encase and FTK
Forensics. Our charges are flexible, based on
the complexity of the case and the duration it
takes to successfully defend it in the court.
23. Tecomex
Forensics
identifies the
type of
evidence
that needs
collecting
Tecomex
Forensics
preserves
evidence to
stop it being
changed or
damaged
Tecomex
Forensics
methodically
collects
identical
replica of
evidence
Tecomex
Forensically
analyses
replica of
evidence
using
Forensic
tools
Tecomex
produces a
report of
findings,
which is
acceptable
in any court
of law
24. After its most talented and loyal staff, the most
important valued assets for any company is its
data. The data of a company can be its customer
database, supplier and transaction database, and
of course its intellectual property, such as its
products designs and inventions. Losing any of
this data under any circumstance could be
immensely costly. In collaboration with our
partners, we provide Data Recovery using the
most advanced technology in the industry.
27. 1. SATNAV memory cards
2. PC/Laptop/Palmtop HDD
3. Mobile phone memory cards
4. Floppy Discs
5. Compact Discs (CD)
6. Digital Versatile Discs (DVD)
7. USB Memory sticks
8. SanDisk Memory Cards
9. Sony Mini Disc
10. Zip and Jaz Disks
11. Digital Camera Memory Cards
12. PDA's (Pocket PC, Palm and Psion)
13. Digital CCTV Systems
31. 1. Certified Ethical Hacker
2. Hacking Forensics Investigator
3. Network Security Administrator
4. Licensed Penetration Tester
5. Public and Secret Key Cryptography
6. Cybersecurity
We are able to provide round the clock training for
private individuals, students, small firms and large
corporations in the above key areas of Cybersecurity.
32. 1. 15 years experience in cybersecurity research
2. Expert in mobile and cloud platforms
3. Expert in Cryptography
4. Expert in designing security protocols
5. Invented the ESKIMO security protocol
6. Specialist in WiFi Security
We are able to enter into mutually beneficial
research partnership in the areas of cybersecurity
and digital forensics.
33. 1. Research technology ideas with less risk
2. Saves clients time, money and space
3. Availability of dynamic young talent
4. Potential to market research outcome
5. Potential to develop research outcome into a
viable financial product
6. Potential to gain global fame as
inventors/pioneers of a technology
34. Client
conceives
research idea
based on
business needs
Client contacts
Tecomex
Forensics with
research
proposals
Tecomex and
Client set up
Research
Collaboration
Review Panel
(RCRP)
RCRP designs
comprehensive
Research
Framework
Research work
as per RCRP
guidelines
implemented
and results
published