SlideShare a Scribd company logo
1 of 35
Download to read offline
1. Tecomex Forensics Background
2. Tecomex Forensics Key Services
3. Cybersecurity
4. Digital Forensics
5. Cryptography
6. Cybersecurity & Forensics Training
7. Cybersecurity & Forensics Research
1. Company founded in 2010
2. Premier Security Company in Coventry
3. Fifteen years experience in Cybersecurity
4. Company started trading in 2013
5. Company provides Five key services
1. Cybercurity
2. Digital Forensics
3. Cryptography
4. Cybersecurity and Forensics Training
5. Cybersecurity and Forensics Research
1. Cybersecurity
2. Digital Forensics
3. Cryptography
4. Training
5. Research
1. Phishing Scams (Internet 419!)
2. Spamming
3. Viruses, Worms, Trojans, Malware & Rootkits
4. Distributed denial of service attacks
5. Fraud and Identity theft
6. Intellectual property theft
7. Espionage
8. Cyber-terrorism
9. Child pornography
Now that you know the threats of cyber-
crimes to your corporate network, and
how expensive it is to fix it, the BIG
question is: Are you ready to do
something about it before it becomes too
late? At Tecomex Forensics we can help
you get one step ahead of the HACKERS....
“Penetration testing (PENTEST) is the well
established process of attempting to break into
a computer network from within or outside of
the network by network security experts using
advanced software technology with the sole
purpose of identifying security vulnerabilities
within the network infrastructure. PENTEST is
NEVER done without the express permission of
the network owner(s).”
1. Real-life simulation of hacker attacks
2. Identify threats from within & outside
3. Help find threats before hackers find them!
4. Audit client PC and servers for vulnerabilities
5. Audit OS and applications for vulnerabilities
6. Identify Firewall/Router mis-configurations
7. Deploy important security patches
8. Help implement robust security policies
WHITEBOX PENTEST is done from within the target
network and is done when the security experts are
provided with some useful information about the
network before commencing the PENTEST.
BLACKBOX PENTEST is done from outside the target
network. The security experts start with a zero
knowledge of the network infrastructure and attempt
to break their way into it using advanced tools and
techniques.
GREYBOX PENTEST is the hybrid test. It is done when
the expert pentesters are furnished with partial
information about the target network to be tested.
“Digital Forensics is the globally recognised
scientific process of identifying, extracting,
securing, and evaluating evidence from digital
media from computers and other digital
devices like mobile phones, SATNAVs, digital
cameras, and presenting the digital evidence
in a court of law. Prosecutors and law
enforcement agencies from around the world
routinely use this service to secure conviction
of criminals in court of law.”
At Tecomex we are able to recover all of the above data types
Logical structure of attacked NetworkPhysical structure of attacked Network
Data mining structure
From the data mining
results, our network
security experts are able
to forensically analyse the
nature of attack, which
computers have been
attacked, and the severity
of the attack.
Client
identifies the
severity of
network
attack by
outsiders or
insiders
Client
requests for
emergency
response
from
Tecomex
Forensics
Tecomex
attends site
within 24
hours and
makes
preliminary
appraisal
Tecomex
Forensics
signs NDA
and
commences
Network
Analysis
Tecomex
Forensics
submits
findings and
suggestions
“Satellite Navigation also often shortened as
SATNAV, SAT-NAV, GPS NAV, or GPS-NAV is a
smart navigation device used for route finding.
SATNAV is used for navigation on land, air and
sea. The technology is also used to pinpoint the
exact location of objects in relation to the earth.
A typical Satellite Navigation system is made of
both hardware and software. Because of this, the
SATNAV will always have configuration files that
could be forensically extracted and examined by
an expert.”
Comprehensive range
of user information as
shown here can be
forensically extracted
from SATNAV devices.
We will be able to extract the above information from a
SATNAV device using a combination of tools and techniques,
and tender as evidence which, is acceptable in a court of law.
1. Waypoints travelled by Marine crafts
2. Directions taken by land-based vehicle
3. The distance of journeys made
4. The time taken to make the journeys
5. Saved favourite locations
6. Saved contact details
7. Phone calls made
At Tecomex Forensics Ltd, we use
powerful SIM Forensics Tools to
extract information from SIM
cards.
Reference: wikepedia.com
“An expert witness, professional witness or judicial
expert is a witness, who by virtue
of education, training, skill, or experience, is
believed to have expertise and
specialised knowledge in a particular subject
beyond that of the average person, sufficient that
others may officially and legally rely upon the
witness's specialised (scientific, technical or other)
opinion about an evidence or fact issue within the
scope of his expertise, referred to as the expert
opinion.”
At Tecomex Forensics Ltd, we are able to
provide Expert Witness service to our clients
from anywhere in the world. The key to our
Expert Witness success is the professional
qualification, immense experience gained in
the field and the use of globally recognised
Digital Forensics tools like Encase and FTK
Forensics. Our charges are flexible, based on
the complexity of the case and the duration it
takes to successfully defend it in the court.
Tecomex
Forensics
identifies the
type of
evidence
that needs
collecting
Tecomex
Forensics
preserves
evidence to
stop it being
changed or
damaged
Tecomex
Forensics
methodically
collects
identical
replica of
evidence
Tecomex
Forensically
analyses
replica of
evidence
using
Forensic
tools
Tecomex
produces a
report of
findings,
which is
acceptable
in any court
of law
After its most talented and loyal staff, the most
important valued assets for any company is its
data. The data of a company can be its customer
database, supplier and transaction database, and
of course its intellectual property, such as its
products designs and inventions. Losing any of
this data under any circumstance could be
immensely costly. In collaboration with our
partners, we provide Data Recovery using the
most advanced technology in the industry.
We can retrieve data
from any of these
Reference: Online source
1. SATNAV memory cards
2. PC/Laptop/Palmtop HDD
3. Mobile phone memory cards
4. Floppy Discs
5. Compact Discs (CD)
6. Digital Versatile Discs (DVD)
7. USB Memory sticks
8. SanDisk Memory Cards
9. Sony Mini Disc
10. Zip and Jaz Disks
11. Digital Camera Memory Cards
12. PDA's (Pocket PC, Palm and Psion)
13. Digital CCTV Systems
Physical data destruction Electronic data destruction
Client
decides
what data
medium
needs
destroying
Client
contacts
Tecomex
Forensics
Tecomex
Forensics
agrees
cost and
signs NDA
Data
medium
securely
passed to
Tecomex
Forensics
Tecomex
Forensics
destroys
data and
proves to
client
Certified Ethical Hacker Hacking Forensics Investigator Network Security Administrator
Licensed Penetration Tester CybersecurityCryptography
1. Certified Ethical Hacker
2. Hacking Forensics Investigator
3. Network Security Administrator
4. Licensed Penetration Tester
5. Public and Secret Key Cryptography
6. Cybersecurity
We are able to provide round the clock training for
private individuals, students, small firms and large
corporations in the above key areas of Cybersecurity.
1. 15 years experience in cybersecurity research
2. Expert in mobile and cloud platforms
3. Expert in Cryptography
4. Expert in designing security protocols
5. Invented the ESKIMO security protocol
6. Specialist in WiFi Security
We are able to enter into mutually beneficial
research partnership in the areas of cybersecurity
and digital forensics.
1. Research technology ideas with less risk
2. Saves clients time, money and space
3. Availability of dynamic young talent
4. Potential to market research outcome
5. Potential to develop research outcome into a
viable financial product
6. Potential to gain global fame as
inventors/pioneers of a technology
Client
conceives
research idea
based on
business needs
Client contacts
Tecomex
Forensics with
research
proposals
Tecomex and
Client set up
Research
Collaboration
Review Panel
(RCRP)
RCRP designs
comprehensive
Research
Framework
Research work
as per RCRP
guidelines
implemented
and results
published
Cybersecurity Presentation by Tecomex Forensics Ltd

More Related Content

What's hot

Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-SweepingPaul Andrews
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Amitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectAmitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectA Singh
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011shawn_merdinger
 
Network troubleshooting
Network troubleshootingNetwork troubleshooting
Network troubleshootingSkillspire LLC
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCompute Forensics
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulipTheMindSmith
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksAlan Percy
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...Felipe Prado
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyDavid Rogers
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesLancope, Inc.
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET Journal
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursMotherGuardians
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesICFECI
 

What's hot (20)

Digital forensic
Digital forensicDigital forensic
Digital forensic
 
TSCM : Bug-Sweeping
TSCM : Bug-SweepingTSCM : Bug-Sweeping
TSCM : Bug-Sweeping
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Amitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_ProjectAmitabh Singh_Technology_Business_Case_Investigation_Project
Amitabh Singh_Technology_Business_Case_Investigation_Project
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
Weaponizing the Nokia N900 -- TakeDownCon, Dallas, 2011
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Network troubleshooting
Network troubleshootingNetwork troubleshooting
Network troubleshooting
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
CF-Computer-Forensic-Services
CF-Computer-Forensic-ServicesCF-Computer-Forensic-Services
CF-Computer-Forensic-Services
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulip
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
 
Phone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden historyPhone Hacking: A lucrative, but largely hidden history
Phone Hacking: A lucrative, but largely hidden history
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
Computer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics servicesComputer forensics investigation and digital forensics services
Computer forensics investigation and digital forensics services
 

Similar to Cybersecurity Presentation by Tecomex Forensics Ltd

DFG Demo
DFG DemoDFG Demo
DFG Demodfgroup
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxDaniyaHuzaifa
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxssuser2bf502
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1}{it -Boy
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxrichardnorman90310
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptxAlAsad4
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 

Similar to Cybersecurity Presentation by Tecomex Forensics Ltd (20)

DFG Demo
DFG DemoDFG Demo
DFG Demo
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Sabate chap2 lab1
Sabate chap2 lab1Sabate chap2 lab1
Sabate chap2 lab1
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptx
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Cybersecurity Presentation by Tecomex Forensics Ltd

  • 1.
  • 2. 1. Tecomex Forensics Background 2. Tecomex Forensics Key Services 3. Cybersecurity 4. Digital Forensics 5. Cryptography 6. Cybersecurity & Forensics Training 7. Cybersecurity & Forensics Research
  • 3. 1. Company founded in 2010 2. Premier Security Company in Coventry 3. Fifteen years experience in Cybersecurity 4. Company started trading in 2013 5. Company provides Five key services 1. Cybercurity 2. Digital Forensics 3. Cryptography 4. Cybersecurity and Forensics Training 5. Cybersecurity and Forensics Research
  • 4. 1. Cybersecurity 2. Digital Forensics 3. Cryptography 4. Training 5. Research
  • 5. 1. Phishing Scams (Internet 419!) 2. Spamming 3. Viruses, Worms, Trojans, Malware & Rootkits 4. Distributed denial of service attacks 5. Fraud and Identity theft 6. Intellectual property theft 7. Espionage 8. Cyber-terrorism 9. Child pornography
  • 6.
  • 7. Now that you know the threats of cyber- crimes to your corporate network, and how expensive it is to fix it, the BIG question is: Are you ready to do something about it before it becomes too late? At Tecomex Forensics we can help you get one step ahead of the HACKERS....
  • 8. “Penetration testing (PENTEST) is the well established process of attempting to break into a computer network from within or outside of the network by network security experts using advanced software technology with the sole purpose of identifying security vulnerabilities within the network infrastructure. PENTEST is NEVER done without the express permission of the network owner(s).”
  • 9. 1. Real-life simulation of hacker attacks 2. Identify threats from within & outside 3. Help find threats before hackers find them! 4. Audit client PC and servers for vulnerabilities 5. Audit OS and applications for vulnerabilities 6. Identify Firewall/Router mis-configurations 7. Deploy important security patches 8. Help implement robust security policies
  • 10. WHITEBOX PENTEST is done from within the target network and is done when the security experts are provided with some useful information about the network before commencing the PENTEST. BLACKBOX PENTEST is done from outside the target network. The security experts start with a zero knowledge of the network infrastructure and attempt to break their way into it using advanced tools and techniques. GREYBOX PENTEST is the hybrid test. It is done when the expert pentesters are furnished with partial information about the target network to be tested.
  • 11. “Digital Forensics is the globally recognised scientific process of identifying, extracting, securing, and evaluating evidence from digital media from computers and other digital devices like mobile phones, SATNAVs, digital cameras, and presenting the digital evidence in a court of law. Prosecutors and law enforcement agencies from around the world routinely use this service to secure conviction of criminals in court of law.”
  • 12.
  • 13. At Tecomex we are able to recover all of the above data types
  • 14.
  • 15. Logical structure of attacked NetworkPhysical structure of attacked Network Data mining structure From the data mining results, our network security experts are able to forensically analyse the nature of attack, which computers have been attacked, and the severity of the attack.
  • 16. Client identifies the severity of network attack by outsiders or insiders Client requests for emergency response from Tecomex Forensics Tecomex attends site within 24 hours and makes preliminary appraisal Tecomex Forensics signs NDA and commences Network Analysis Tecomex Forensics submits findings and suggestions
  • 17. “Satellite Navigation also often shortened as SATNAV, SAT-NAV, GPS NAV, or GPS-NAV is a smart navigation device used for route finding. SATNAV is used for navigation on land, air and sea. The technology is also used to pinpoint the exact location of objects in relation to the earth. A typical Satellite Navigation system is made of both hardware and software. Because of this, the SATNAV will always have configuration files that could be forensically extracted and examined by an expert.”
  • 18. Comprehensive range of user information as shown here can be forensically extracted from SATNAV devices.
  • 19. We will be able to extract the above information from a SATNAV device using a combination of tools and techniques, and tender as evidence which, is acceptable in a court of law. 1. Waypoints travelled by Marine crafts 2. Directions taken by land-based vehicle 3. The distance of journeys made 4. The time taken to make the journeys 5. Saved favourite locations 6. Saved contact details 7. Phone calls made
  • 20. At Tecomex Forensics Ltd, we use powerful SIM Forensics Tools to extract information from SIM cards.
  • 21. Reference: wikepedia.com “An expert witness, professional witness or judicial expert is a witness, who by virtue of education, training, skill, or experience, is believed to have expertise and specialised knowledge in a particular subject beyond that of the average person, sufficient that others may officially and legally rely upon the witness's specialised (scientific, technical or other) opinion about an evidence or fact issue within the scope of his expertise, referred to as the expert opinion.”
  • 22. At Tecomex Forensics Ltd, we are able to provide Expert Witness service to our clients from anywhere in the world. The key to our Expert Witness success is the professional qualification, immense experience gained in the field and the use of globally recognised Digital Forensics tools like Encase and FTK Forensics. Our charges are flexible, based on the complexity of the case and the duration it takes to successfully defend it in the court.
  • 23. Tecomex Forensics identifies the type of evidence that needs collecting Tecomex Forensics preserves evidence to stop it being changed or damaged Tecomex Forensics methodically collects identical replica of evidence Tecomex Forensically analyses replica of evidence using Forensic tools Tecomex produces a report of findings, which is acceptable in any court of law
  • 24. After its most talented and loyal staff, the most important valued assets for any company is its data. The data of a company can be its customer database, supplier and transaction database, and of course its intellectual property, such as its products designs and inventions. Losing any of this data under any circumstance could be immensely costly. In collaboration with our partners, we provide Data Recovery using the most advanced technology in the industry.
  • 25. We can retrieve data from any of these
  • 27. 1. SATNAV memory cards 2. PC/Laptop/Palmtop HDD 3. Mobile phone memory cards 4. Floppy Discs 5. Compact Discs (CD) 6. Digital Versatile Discs (DVD) 7. USB Memory sticks 8. SanDisk Memory Cards 9. Sony Mini Disc 10. Zip and Jaz Disks 11. Digital Camera Memory Cards 12. PDA's (Pocket PC, Palm and Psion) 13. Digital CCTV Systems
  • 28. Physical data destruction Electronic data destruction
  • 29. Client decides what data medium needs destroying Client contacts Tecomex Forensics Tecomex Forensics agrees cost and signs NDA Data medium securely passed to Tecomex Forensics Tecomex Forensics destroys data and proves to client
  • 30. Certified Ethical Hacker Hacking Forensics Investigator Network Security Administrator Licensed Penetration Tester CybersecurityCryptography
  • 31. 1. Certified Ethical Hacker 2. Hacking Forensics Investigator 3. Network Security Administrator 4. Licensed Penetration Tester 5. Public and Secret Key Cryptography 6. Cybersecurity We are able to provide round the clock training for private individuals, students, small firms and large corporations in the above key areas of Cybersecurity.
  • 32. 1. 15 years experience in cybersecurity research 2. Expert in mobile and cloud platforms 3. Expert in Cryptography 4. Expert in designing security protocols 5. Invented the ESKIMO security protocol 6. Specialist in WiFi Security We are able to enter into mutually beneficial research partnership in the areas of cybersecurity and digital forensics.
  • 33. 1. Research technology ideas with less risk 2. Saves clients time, money and space 3. Availability of dynamic young talent 4. Potential to market research outcome 5. Potential to develop research outcome into a viable financial product 6. Potential to gain global fame as inventors/pioneers of a technology
  • 34. Client conceives research idea based on business needs Client contacts Tecomex Forensics with research proposals Tecomex and Client set up Research Collaboration Review Panel (RCRP) RCRP designs comprehensive Research Framework Research work as per RCRP guidelines implemented and results published