Another application of Mind Mapping automation in security logs analysis

974 views

Published on

Example of the application of Mind Mapping automation to the analysis of security log files. Analysis of AdwCleaner log files.

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Another application of Mind Mapping automation in security logs analysis

  1. 1. New application of Mind Mapping automation in information security log analysis - AdwCleaner Image courtesy of Stuart Miles / FreeDigitalPhotos.net
  2. 2. Applications of Mind Mapping automation in the analysis of security logs Initial presentation Endpoint Protector (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  3. 3. AdwCleaner This is a free software to find and remove: • • • • Adware PUP / LPI Toolbars Highjackers (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  4. 4. AdwCleaner (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  5. 5. Problem: Laptop infected with Nation Zoom (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  6. 6. Report generated by AdwCleaner (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  7. 7. Mind Mapping version of the report (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  8. 8. Header (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  9. 9. Services (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  10. 10. Folders (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  11. 11. Files (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  12. 12. Direct Access (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  13. 13. Registry (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  14. 14. Browsers (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  15. 15. APPLICATION OF FILTERS (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  16. 16. NATION ZOOM (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  17. 17. Nation Zoom related information (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  18. 18. Filtered Mind Map after callouts and relationship have been added (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  19. 19. Another possible problem NCH SOFTWARE (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  20. 20. Folders and Files (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  21. 21. Registry and Direct Access (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  22. 22. ELEMENTS RELATED TO A USER (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  23. 23. Files and Browsers (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  24. 24. Direct Access (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
  25. 25. (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml Image courtesy of Stuart Miles / FreeDigitalPhotos.net
  26. 26. Contact Information José M. Guerrero jm@infoseg.com Slideshare Presentations Linkedin profile (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

×