SlideShare a Scribd company logo
1 of 1
Download to read offline
Nowadays, due to the sophistication of adversarial attack vectors, techniques, and tactics, it is
increasingly becoming challenging, if not difficult, to deter persistent threats in real-real time
Some of these threats for Forensic Analysis includes, but are not limited to:
Advanced Persistent Threats
Lack of Due Diligence
Inaccessibility of Services
Weak Credential Information
Liabilities of Shared System
Exploitation of Cloud Services
Malicious Insiders and Outsiders
Random Data Loss and Theft
Account hijacking and Data breaches Denial of service (DoS) / Distributed DoS
Susceptible points of System / Software
Uncertain APIs and Software Application
GOAL: Pick a minimum of three from the above list and assume that it have had happened to
your organization. How could you conduct a comprehensive forensic analysis and how could you
prevent it from happening in the future. Feel free to add different attributes which you deem is
necessary for your project. You may also want to consider following the five known steps in
digital forensics: Detection Identify and collect the data, Storage Securely store the collected
data against interference, Investigation Analyze and reconstruct the data to attain conclusion,
Reporting Record the information of reconstructed data, Visualization Present the overall
evidences from conclusion
RULES:
1. Your strategy/plan must be attainable and yet realistic
SUBMISSION:
Identifies actual and potential issues/risks

More Related Content

Similar to Nowadays, due to the sophistication of adversarial attack vectors, t.pdf

knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA SensePost
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxronak56
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
SENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxSENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxVatsalPatel147291
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptxlochanrajdahal
 
How to Protect Data in Your iOS Application
How to Protect Data in Your iOS ApplicationHow to Protect Data in Your iOS Application
How to Protect Data in Your iOS ApplicationWiley
 
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...maximumnetworks
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...Precise Testing Solution
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityDavid Zaizar
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention ToolsSplitty
 
4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptx4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptxAMIRHAMZA18953
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxhealdkathaleen
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 

Similar to Nowadays, due to the sophistication of adversarial attack vectors, t.pdf (20)

knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA knowthyself : Internal IT Security in SA
knowthyself : Internal IT Security in SA
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Research Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docxResearch Paper on STRIDEPresented By.docx
Research Paper on STRIDEPresented By.docx
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
SENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxSENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptx
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
How to Protect Data in Your iOS Application
How to Protect Data in Your iOS ApplicationHow to Protect Data in Your iOS Application
How to Protect Data in Your iOS Application
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...
Threat Intelligence Making your Bespoke Security Operations Centre Work for Y...
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptx4. Forensic Investigation Techniques By Neil Hare Brown.pptx
4. Forensic Investigation Techniques By Neil Hare Brown.pptx
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 

More from aliracreations

One unit of A is made of three units of B, one unit of C, and two un.pdf
One unit of A is made of three units of B, one unit of C, and two un.pdfOne unit of A is made of three units of B, one unit of C, and two un.pdf
One unit of A is made of three units of B, one unit of C, and two un.pdfaliracreations
 
One of the methods that astronomer use to detect the presence of pla.pdf
One of the methods that astronomer use to detect the presence of pla.pdfOne of the methods that astronomer use to detect the presence of pla.pdf
One of the methods that astronomer use to detect the presence of pla.pdfaliracreations
 
One of the important uses of portfolio management tools isa. to .pdf
One of the important uses of portfolio management tools isa. to .pdfOne of the important uses of portfolio management tools isa. to .pdf
One of the important uses of portfolio management tools isa. to .pdfaliracreations
 
One common result of phospholipid signaling pathways downstream of G.pdf
One common result of phospholipid signaling pathways downstream of G.pdfOne common result of phospholipid signaling pathways downstream of G.pdf
One common result of phospholipid signaling pathways downstream of G.pdfaliracreations
 
Once you have completed your Exploratory research you have decided t.pdf
Once you have completed your Exploratory research you have decided t.pdfOnce you have completed your Exploratory research you have decided t.pdf
Once you have completed your Exploratory research you have decided t.pdfaliracreations
 
Once you have your list, respond to the followingList the current.pdf
Once you have your list, respond to the followingList the current.pdfOnce you have your list, respond to the followingList the current.pdf
Once you have your list, respond to the followingList the current.pdfaliracreations
 
One day, Alex got tired of climbing in a gym and decided to take a v.pdf
One day, Alex got tired of climbing in a gym and decided to take a v.pdfOne day, Alex got tired of climbing in a gym and decided to take a v.pdf
One day, Alex got tired of climbing in a gym and decided to take a v.pdfaliracreations
 
On November 1, 2021 a company sign a $200,000.12 percent six-month n.pdf
On November 1, 2021 a company sign a $200,000.12 percent six-month n.pdfOn November 1, 2021 a company sign a $200,000.12 percent six-month n.pdf
On November 1, 2021 a company sign a $200,000.12 percent six-month n.pdfaliracreations
 
On January 1, Year 2, Kincaid Companys Accounts Receivable and the .pdf
On January 1, Year 2, Kincaid Companys Accounts Receivable and the .pdfOn January 1, Year 2, Kincaid Companys Accounts Receivable and the .pdf
On January 1, Year 2, Kincaid Companys Accounts Receivable and the .pdfaliracreations
 
On January 1, 2021, Daniel Corp. acquired 80 of the voting common s.pdf
On January 1, 2021, Daniel Corp. acquired 80 of the voting common s.pdfOn January 1, 2021, Daniel Corp. acquired 80 of the voting common s.pdf
On January 1, 2021, Daniel Corp. acquired 80 of the voting common s.pdfaliracreations
 
On December 31, Year 3, Mueller Corp. acquired 80 of the outstandin.pdf
On December 31, Year 3, Mueller Corp. acquired 80 of the outstandin.pdfOn December 31, Year 3, Mueller Corp. acquired 80 of the outstandin.pdf
On December 31, Year 3, Mueller Corp. acquired 80 of the outstandin.pdfaliracreations
 
No plagiarism. At least 250 wordsWhat is the relationship be.pdf
No plagiarism. At least 250 wordsWhat is the relationship be.pdfNo plagiarism. At least 250 wordsWhat is the relationship be.pdf
No plagiarism. At least 250 wordsWhat is the relationship be.pdfaliracreations
 
On August 1, 2024, Trico Technologies, an aeronautic electronics com.pdf
On August 1, 2024, Trico Technologies, an aeronautic electronics com.pdfOn August 1, 2024, Trico Technologies, an aeronautic electronics com.pdf
On August 1, 2024, Trico Technologies, an aeronautic electronics com.pdfaliracreations
 
On April 1, Mathis purchased merchandise on account from Reece with .pdf
On April 1, Mathis purchased merchandise on account from Reece with .pdfOn April 1, Mathis purchased merchandise on account from Reece with .pdf
On April 1, Mathis purchased merchandise on account from Reece with .pdfaliracreations
 
On 1 January 2021, Alpha Ltd sold inventory to Beta Ltd for $90 000..pdf
On 1 January 2021, Alpha Ltd sold inventory to Beta Ltd for $90 000..pdfOn 1 January 2021, Alpha Ltd sold inventory to Beta Ltd for $90 000..pdf
On 1 January 2021, Alpha Ltd sold inventory to Beta Ltd for $90 000..pdfaliracreations
 
New York State, county, city, school district, and other government .pdf
New York State, county, city, school district, and other government .pdfNew York State, county, city, school district, and other government .pdf
New York State, county, city, school district, and other government .pdfaliracreations
 
Objective The purpose of this exercise is to create a Linked List d.pdf
Objective The purpose of this exercise is to create a Linked List d.pdfObjective The purpose of this exercise is to create a Linked List d.pdf
Objective The purpose of this exercise is to create a Linked List d.pdfaliracreations
 
nsan davranlar �almasnda, �rg�tsel liderler insanlarn deerleri, tutu.pdf
nsan davranlar �almasnda, �rg�tsel liderler insanlarn deerleri, tutu.pdfnsan davranlar �almasnda, �rg�tsel liderler insanlarn deerleri, tutu.pdf
nsan davranlar �almasnda, �rg�tsel liderler insanlarn deerleri, tutu.pdfaliracreations
 
nsan adaptasyonu genetik, geliimsel, iklimlendirme ve k�lt�rel olmak.pdf
nsan adaptasyonu genetik, geliimsel, iklimlendirme ve k�lt�rel olmak.pdfnsan adaptasyonu genetik, geliimsel, iklimlendirme ve k�lt�rel olmak.pdf
nsan adaptasyonu genetik, geliimsel, iklimlendirme ve k�lt�rel olmak.pdfaliracreations
 
Nurse is performing a vaginal exan on a patient who is in labor .pdf
Nurse is performing a vaginal exan on a patient who is in labor .pdfNurse is performing a vaginal exan on a patient who is in labor .pdf
Nurse is performing a vaginal exan on a patient who is in labor .pdfaliracreations
 

More from aliracreations (20)

One unit of A is made of three units of B, one unit of C, and two un.pdf
One unit of A is made of three units of B, one unit of C, and two un.pdfOne unit of A is made of three units of B, one unit of C, and two un.pdf
One unit of A is made of three units of B, one unit of C, and two un.pdf
 
One of the methods that astronomer use to detect the presence of pla.pdf
One of the methods that astronomer use to detect the presence of pla.pdfOne of the methods that astronomer use to detect the presence of pla.pdf
One of the methods that astronomer use to detect the presence of pla.pdf
 
One of the important uses of portfolio management tools isa. to .pdf
One of the important uses of portfolio management tools isa. to .pdfOne of the important uses of portfolio management tools isa. to .pdf
One of the important uses of portfolio management tools isa. to .pdf
 
One common result of phospholipid signaling pathways downstream of G.pdf
One common result of phospholipid signaling pathways downstream of G.pdfOne common result of phospholipid signaling pathways downstream of G.pdf
One common result of phospholipid signaling pathways downstream of G.pdf
 
Once you have completed your Exploratory research you have decided t.pdf
Once you have completed your Exploratory research you have decided t.pdfOnce you have completed your Exploratory research you have decided t.pdf
Once you have completed your Exploratory research you have decided t.pdf
 
Once you have your list, respond to the followingList the current.pdf
Once you have your list, respond to the followingList the current.pdfOnce you have your list, respond to the followingList the current.pdf
Once you have your list, respond to the followingList the current.pdf
 
One day, Alex got tired of climbing in a gym and decided to take a v.pdf
One day, Alex got tired of climbing in a gym and decided to take a v.pdfOne day, Alex got tired of climbing in a gym and decided to take a v.pdf
One day, Alex got tired of climbing in a gym and decided to take a v.pdf
 
On November 1, 2021 a company sign a $200,000.12 percent six-month n.pdf
On November 1, 2021 a company sign a $200,000.12 percent six-month n.pdfOn November 1, 2021 a company sign a $200,000.12 percent six-month n.pdf
On November 1, 2021 a company sign a $200,000.12 percent six-month n.pdf
 
On January 1, Year 2, Kincaid Companys Accounts Receivable and the .pdf
On January 1, Year 2, Kincaid Companys Accounts Receivable and the .pdfOn January 1, Year 2, Kincaid Companys Accounts Receivable and the .pdf
On January 1, Year 2, Kincaid Companys Accounts Receivable and the .pdf
 
On January 1, 2021, Daniel Corp. acquired 80 of the voting common s.pdf
On January 1, 2021, Daniel Corp. acquired 80 of the voting common s.pdfOn January 1, 2021, Daniel Corp. acquired 80 of the voting common s.pdf
On January 1, 2021, Daniel Corp. acquired 80 of the voting common s.pdf
 
On December 31, Year 3, Mueller Corp. acquired 80 of the outstandin.pdf
On December 31, Year 3, Mueller Corp. acquired 80 of the outstandin.pdfOn December 31, Year 3, Mueller Corp. acquired 80 of the outstandin.pdf
On December 31, Year 3, Mueller Corp. acquired 80 of the outstandin.pdf
 
No plagiarism. At least 250 wordsWhat is the relationship be.pdf
No plagiarism. At least 250 wordsWhat is the relationship be.pdfNo plagiarism. At least 250 wordsWhat is the relationship be.pdf
No plagiarism. At least 250 wordsWhat is the relationship be.pdf
 
On August 1, 2024, Trico Technologies, an aeronautic electronics com.pdf
On August 1, 2024, Trico Technologies, an aeronautic electronics com.pdfOn August 1, 2024, Trico Technologies, an aeronautic electronics com.pdf
On August 1, 2024, Trico Technologies, an aeronautic electronics com.pdf
 
On April 1, Mathis purchased merchandise on account from Reece with .pdf
On April 1, Mathis purchased merchandise on account from Reece with .pdfOn April 1, Mathis purchased merchandise on account from Reece with .pdf
On April 1, Mathis purchased merchandise on account from Reece with .pdf
 
On 1 January 2021, Alpha Ltd sold inventory to Beta Ltd for $90 000..pdf
On 1 January 2021, Alpha Ltd sold inventory to Beta Ltd for $90 000..pdfOn 1 January 2021, Alpha Ltd sold inventory to Beta Ltd for $90 000..pdf
On 1 January 2021, Alpha Ltd sold inventory to Beta Ltd for $90 000..pdf
 
New York State, county, city, school district, and other government .pdf
New York State, county, city, school district, and other government .pdfNew York State, county, city, school district, and other government .pdf
New York State, county, city, school district, and other government .pdf
 
Objective The purpose of this exercise is to create a Linked List d.pdf
Objective The purpose of this exercise is to create a Linked List d.pdfObjective The purpose of this exercise is to create a Linked List d.pdf
Objective The purpose of this exercise is to create a Linked List d.pdf
 
nsan davranlar �almasnda, �rg�tsel liderler insanlarn deerleri, tutu.pdf
nsan davranlar �almasnda, �rg�tsel liderler insanlarn deerleri, tutu.pdfnsan davranlar �almasnda, �rg�tsel liderler insanlarn deerleri, tutu.pdf
nsan davranlar �almasnda, �rg�tsel liderler insanlarn deerleri, tutu.pdf
 
nsan adaptasyonu genetik, geliimsel, iklimlendirme ve k�lt�rel olmak.pdf
nsan adaptasyonu genetik, geliimsel, iklimlendirme ve k�lt�rel olmak.pdfnsan adaptasyonu genetik, geliimsel, iklimlendirme ve k�lt�rel olmak.pdf
nsan adaptasyonu genetik, geliimsel, iklimlendirme ve k�lt�rel olmak.pdf
 
Nurse is performing a vaginal exan on a patient who is in labor .pdf
Nurse is performing a vaginal exan on a patient who is in labor .pdfNurse is performing a vaginal exan on a patient who is in labor .pdf
Nurse is performing a vaginal exan on a patient who is in labor .pdf
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Nowadays, due to the sophistication of adversarial attack vectors, t.pdf

  • 1. Nowadays, due to the sophistication of adversarial attack vectors, techniques, and tactics, it is increasingly becoming challenging, if not difficult, to deter persistent threats in real-real time Some of these threats for Forensic Analysis includes, but are not limited to: Advanced Persistent Threats Lack of Due Diligence Inaccessibility of Services Weak Credential Information Liabilities of Shared System Exploitation of Cloud Services Malicious Insiders and Outsiders Random Data Loss and Theft Account hijacking and Data breaches Denial of service (DoS) / Distributed DoS Susceptible points of System / Software Uncertain APIs and Software Application GOAL: Pick a minimum of three from the above list and assume that it have had happened to your organization. How could you conduct a comprehensive forensic analysis and how could you prevent it from happening in the future. Feel free to add different attributes which you deem is necessary for your project. You may also want to consider following the five known steps in digital forensics: Detection Identify and collect the data, Storage Securely store the collected data against interference, Investigation Analyze and reconstruct the data to attain conclusion, Reporting Record the information of reconstructed data, Visualization Present the overall evidences from conclusion RULES: 1. Your strategy/plan must be attainable and yet realistic SUBMISSION: Identifies actual and potential issues/risks