SlideShare a Scribd company logo
Security Technology Forum - CSI 	Security Technology forum will operate to provide a knowledge sharing forum and also provide a platform for  research in emerging technology in the area of Security for Members of CSI.  Vision is to make India safe and secure by use of technology. Mission is to enable Indian technology professionals to understand world class security technology by effectively developing and sharing knowledge assets and best practices.
Contents of the Interaction Concept of Forensic  Need & Purpose of Forensic  Computer Forensic  Role of IT for Forensic  Data Collection / Mining Tools Data Analysis & Reporting  Fraud Detection & Auditing
Forensics – Forensic Science Forensic science (often shortened to forensics) is the application of a broad spectrum of sciences to answer questions of interest to a legal system. This may be in relation to a crime or a civil action. Besides its relevance to a legal system, more generally forensics encompasses the accepted scholarly or scientific methodology and norms under which the facts regarding an event, or an artifact, or some other physical item (such as a corpse) are ascertained as being the case. In that regard the concept is related to the notion of authentication, whereby an interest outside of a legal form exists in determining whether an object is what it purports to be, or is alleged as being.
Computer Forensic The goal of computer forensics is to explain the current state of a digital artifact. The term digital artifact can include a computer system, a storage medium (such as a hard disk or CD-ROM), an electronic document (e.g. an email message or JPEG image) or even a sequence of packets moving over a computer network. The field of computer forensics also has sub branches within it such as firewall forensics, network forensics, database forensics and mobile device forensics.
Simplified Understanding Forensic = Postmortem Computer forensics involves the  preservation,  identification,  extraction,  documentation,  and interpretation of computer media  for evidentiary and/or root cause analysis Recovering Information the naked eye can no longer see.
Need for Computer Forensic Techniques Evidence might be required for a wide range of computer crimes and misuses. The Need for deploying Computer forensic can be  In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).  To recover data in the event of a hardware or software failure.  To analyze a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did.  To gather evidence against an employee that an organization wishes to terminate.  To gain information about how computer systems work for the purpose of debugging, performance optimization, or reverse-engineering.
Reasons For Evidence Wide range of computer crimes and misuses Non-Business Environment: evidence collected by Federal, State and local authorities for crimes relating to:  Theft of trade secrets Fraud Extortion Industrial espionage Position of pornography SPAM investigations Virus/Trojan distribution Homicide investigations Intellectual property breaches Unauthorized use of personal information Forgery Perjury
Reasons For Evidence (cont) Computer related crime and violations include a range of activities including: Business Environment:  Theft of or destruction of intellectual property Unauthorized activity Tracking internet browsing habits Reconstructing Events Inferring intentions Selling company bandwidth Wrongful dismissal claims Sexual harassment Software Piracy
Who Uses Computer Forensics? Criminal Prosecutors Rely on evidence obtained from a computer to prosecute suspects and use as evidence Civil Litigations Personal and business data discovered on a computer can be used in fraud, divorce, harassment, or discrimination cases Insurance Companies Evidence discovered on computer can be  used to mollify costs (fraud, worker’s compensation, arson, etc) Private Corporations Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases
Steps Of Computer Forensics According to many professionals, Computer Forensics is a four (4) step process Acquisition Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices Identification This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites
Steps Of Computer Forensics (cont) According to many professionals, Computer Forensics is a four (4) step process Evaluation Evaluating the information/data recovered to  determine if and how it could be used again the suspect for employment termination or prosecution in court Presentation This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws
Handling Information Information and data being sought after and collected in the investigation must be properly handled Volatile Information Network Information Communication between system and the network Active Processes Programs and daemons currently active on the system Logged-on Users Users/employees currently using system Open Files Libraries in use; hidden files; Trojans (rootkit) loaded in system
Handling Information (cont) Non-Volatile Information configuration settings system files  registry settings that are available after reboot Accessed through drive mappings from system This information should investigated and reviewed from a backup copy
Anti-Forensics Software that limits and/or corrupts evidence that could be collected by an investigator Performs data hiding and distortion (HPA & Logic Bombs) Exploits limitations of known and used forensic tools Works both on Windows and LINUX based systems In place prior to or post system acquisition
Evidence Processing Guidelines  Steps of processing evidence  Step 1: Shut down the computer Considerations must be given to volatile information Prevents remote access to machine and destruction of evidence (manual or ant-forensic software) Step 2: Document the Hardware Configuration of The System Note everything about the computer configuration prior to re-locating
Evidence Processing Guidelines (cont) Step 3: Transport the Computer System to A Secure Location Do not leave the computer unattended unless it is locked in a secure location Step 4: Make Bit Stream Backups of Hard Disks and Floppy Disks Step 5: Mathematically Authenticate Data on All Storage Devices Must be able to prove that you did not alter any of the evidence after the computer came into your possession Step 6: Document the System Date and Time Step 7: Make a List of Key Search Words Step 8: Evaluate the Windows Swap File
Evidence Processing Guidelines (cont) Step 9: Evaluate File Slack File slack is a data storage area of which most computer users are unaware; a source of significant security leakage. Step 10: Evaluate Unallocated Space (Erased Files) Step 11: Search Files, File Slack and Unallocated Space for Key Words Step 12: Document File Names, Dates and Times Step 13: Identify File, Program and Storage Anomalies Step 14: Evaluate Program Functionality Step 15: Document Your Findings Step 16: Retain Copies of Software Used
Methods deployed Discovering Data on Computer System Recovering deleted, encrypted, or damaged file information Monitoring live activity Detecting violations of corporate policy
Fraud A fraud is an intentional deception made for personal gain or to damage another individual.  The specific legal definition varies by legal jurisdiction. Fraud is a crime, and is also a civil law violation.  Many hoaxes are fraudulent, although those not made for personal gain are not technically frauds. Defrauding people of money is presumably the most common type of fraud
Fraud – Fast Facts ,[object Object]
  Use of deception & misrepresentation to obtain        	an unjust advantage ,[object Object]
 It is estimated that there has been accelerated growth in economic misappropriation;
 Corporate fraud swing to theft of intellectual property and IT- related incidents;
 About 42 per cent of the cases in India, it was possible to make recoveries from the perpetrator;
Theft, loss of or attack on information are the biggest concerns to companies .,[object Object]
 High staff turnover, implanting of  personnel are the most recurrent cause of exposure to fraud;
 Imperative effect of globalization;
 Increased merger and acquisition between companies.												CONTINUED……

More Related Content

What's hot

4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
JIEMS Akkalkuwa
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
SCREAM138
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
Kabul Education University
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
Neilg42
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
Anyck Turgeon, CFE/GRCP/CEFI/CCIP/C|CISO/CBA
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
OWASP Khartoum
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
Yansi Keim
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
Kathirvel Ayyaswamy
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
Firoze Hussain
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
Sweta Kumari Barnwal
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
Filip Maertens
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Ramesh Ogania
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Sarwar Hossain Rafsan
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
jahanzebmunawar
 

What's hot (20)

4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
Cyber Security 1215
Cyber Security 1215Cyber Security 1215
Cyber Security 1215
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
 

Viewers also liked

Computer forensic
Computer forensicComputer forensic
Computer forensicbhavithd
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesIsaiah Edem
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
Madan Golla
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
Online
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Roberto Ellis
 
A2 Cloning animals
A2 Cloning animalsA2 Cloning animals
A2 Cloning animals
Franklin College, Grimsby
 
Aids direct marketing
Aids direct marketingAids direct marketing
Aids direct marketingAdpr Son
 
Information Gathering Over Twitter
Information Gathering Over TwitterInformation Gathering Over Twitter
Information Gathering Over Twitter
Brian Baskin
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
jkvr100
 
MattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemMattockFS Computer Forensic File-System
MattockFS Computer Forensic File-System
Rob Meijer
 
Forensic Analyst
Forensic AnalystForensic Analyst
Forensic Analyst
BaileyShupe
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collectionFakrul Alam
 
Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene Investigation
Lovable Raisin
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
Chris Harrington
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in englishAqib Memon
 
Lecture1
Lecture1Lecture1
Lecture1rjaeh
 

Viewers also liked (20)

Computer forensic
Computer forensicComputer forensic
Computer forensic
 
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic ExaminersBoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
BoyarMiller - You Lost Me At Gigabyte: Working with Computer Forensic Examiners
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer Forensics in Fighting Crimes
Computer Forensics in Fighting CrimesComputer Forensics in Fighting Crimes
Computer Forensics in Fighting Crimes
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
A2 Cloning animals
A2 Cloning animalsA2 Cloning animals
A2 Cloning animals
 
Aids direct marketing
Aids direct marketingAids direct marketing
Aids direct marketing
 
File000174
File000174File000174
File000174
 
Information Gathering Over Twitter
Information Gathering Over TwitterInformation Gathering Over Twitter
Information Gathering Over Twitter
 
The design of forensic computer workstations
The design of forensic computer workstationsThe design of forensic computer workstations
The design of forensic computer workstations
 
MattockFS Computer Forensic File-System
MattockFS Computer Forensic File-SystemMattockFS Computer Forensic File-System
MattockFS Computer Forensic File-System
 
Forensic Analyst
Forensic AnalystForensic Analyst
Forensic Analyst
 
Electornic evidence collection
Electornic evidence collectionElectornic evidence collection
Electornic evidence collection
 
Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene Investigation
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
File000173
File000173File000173
File000173
 
Communication skills in english
Communication skills in englishCommunication skills in english
Communication skills in english
 
Lecture1
Lecture1Lecture1
Lecture1
 

Similar to Business Intelligence (BI) Tools For Computer Forensic

Computer forensic
Computer forensicComputer forensic
Computer forensic
ibraheem ogundele
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
Shashi Mishra
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
Varun Sehgal
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
Mayank Diwakar
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
Mayank Diwakar
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
Suchita Rawat
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
Surajgroupsvideo
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
Zyxware Technologies
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
ssuser2bf502
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
DaniyaHuzaifa
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
Gnanavi2
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
rahulmonikasharma
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
AliAshraf68199
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
newbie2019
 

Similar to Business Intelligence (BI) Tools For Computer Forensic (20)

Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptxcomputer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 

More from Dhiren Gala

Big Data for Retail
Big Data for RetailBig Data for Retail
Big Data for Retail
Dhiren Gala
 
Microsoft SQL Server 2012
Microsoft SQL Server 2012 Microsoft SQL Server 2012
Microsoft SQL Server 2012
Dhiren Gala
 
MAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel TreeMAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel Tree
Dhiren Gala
 
XBRL on SaaS Platform
XBRL on SaaS PlatformXBRL on SaaS Platform
XBRL on SaaS Platform
Dhiren Gala
 
Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)
Dhiren Gala
 
Compliance to Compete
Compliance to CompeteCompliance to Compete
Compliance to Compete
Dhiren Gala
 
XBRL Overview
XBRL OverviewXBRL Overview
XBRL Overview
Dhiren Gala
 
An Introduction To XBRL
An Introduction To XBRLAn Introduction To XBRL
An Introduction To XBRL
Dhiren Gala
 
XBRL Presentation
XBRL PresentationXBRL Presentation
XBRL Presentation
Dhiren Gala
 
Financial Consolidation Management
Financial Consolidation ManagementFinancial Consolidation Management
Financial Consolidation Management
Dhiren Gala
 
Experiments with Social Media & Networking
Experiments with Social Media & NetworkingExperiments with Social Media & Networking
Experiments with Social Media & Networking
Dhiren Gala
 
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial ConsolidationBest Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Dhiren Gala
 
KPI Dashboard for Port Terminals
KPI Dashboard for Port TerminalsKPI Dashboard for Port Terminals
KPI Dashboard for Port Terminals
Dhiren Gala
 
Business Intelligence in Logistics
Business Intelligence in LogisticsBusiness Intelligence in Logistics
Business Intelligence in Logistics
Dhiren Gala
 
Business Intelligence in Pharma
Business Intelligence in PharmaBusiness Intelligence in Pharma
Business Intelligence in Pharma
Dhiren Gala
 
Marketing Analytics with Business Intelligence
Marketing Analytics with Business IntelligenceMarketing Analytics with Business Intelligence
Marketing Analytics with Business Intelligence
Dhiren Gala
 
BI at work for Port Operations
BI at work for Port OperationsBI at work for Port Operations
BI at work for Port Operations
Dhiren Gala
 
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Dhiren Gala
 
India's first Business Intelligence (BI)
India's first Business Intelligence (BI)India's first Business Intelligence (BI)
India's first Business Intelligence (BI)
Dhiren Gala
 
Business Intelligence (BI) for Manufacturing
Business Intelligence (BI) for ManufacturingBusiness Intelligence (BI) for Manufacturing
Business Intelligence (BI) for Manufacturing
Dhiren Gala
 

More from Dhiren Gala (20)

Big Data for Retail
Big Data for RetailBig Data for Retail
Big Data for Retail
 
Microsoft SQL Server 2012
Microsoft SQL Server 2012 Microsoft SQL Server 2012
Microsoft SQL Server 2012
 
MAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel TreeMAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel Tree
 
XBRL on SaaS Platform
XBRL on SaaS PlatformXBRL on SaaS Platform
XBRL on SaaS Platform
 
Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)
 
Compliance to Compete
Compliance to CompeteCompliance to Compete
Compliance to Compete
 
XBRL Overview
XBRL OverviewXBRL Overview
XBRL Overview
 
An Introduction To XBRL
An Introduction To XBRLAn Introduction To XBRL
An Introduction To XBRL
 
XBRL Presentation
XBRL PresentationXBRL Presentation
XBRL Presentation
 
Financial Consolidation Management
Financial Consolidation ManagementFinancial Consolidation Management
Financial Consolidation Management
 
Experiments with Social Media & Networking
Experiments with Social Media & NetworkingExperiments with Social Media & Networking
Experiments with Social Media & Networking
 
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial ConsolidationBest Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
 
KPI Dashboard for Port Terminals
KPI Dashboard for Port TerminalsKPI Dashboard for Port Terminals
KPI Dashboard for Port Terminals
 
Business Intelligence in Logistics
Business Intelligence in LogisticsBusiness Intelligence in Logistics
Business Intelligence in Logistics
 
Business Intelligence in Pharma
Business Intelligence in PharmaBusiness Intelligence in Pharma
Business Intelligence in Pharma
 
Marketing Analytics with Business Intelligence
Marketing Analytics with Business IntelligenceMarketing Analytics with Business Intelligence
Marketing Analytics with Business Intelligence
 
BI at work for Port Operations
BI at work for Port OperationsBI at work for Port Operations
BI at work for Port Operations
 
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
 
India's first Business Intelligence (BI)
India's first Business Intelligence (BI)India's first Business Intelligence (BI)
India's first Business Intelligence (BI)
 
Business Intelligence (BI) for Manufacturing
Business Intelligence (BI) for ManufacturingBusiness Intelligence (BI) for Manufacturing
Business Intelligence (BI) for Manufacturing
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Business Intelligence (BI) Tools For Computer Forensic

  • 1.
  • 2. Security Technology Forum - CSI Security Technology forum will operate to provide a knowledge sharing forum and also provide a platform for  research in emerging technology in the area of Security for Members of CSI. Vision is to make India safe and secure by use of technology. Mission is to enable Indian technology professionals to understand world class security technology by effectively developing and sharing knowledge assets and best practices.
  • 3. Contents of the Interaction Concept of Forensic Need & Purpose of Forensic Computer Forensic Role of IT for Forensic Data Collection / Mining Tools Data Analysis & Reporting Fraud Detection & Auditing
  • 4. Forensics – Forensic Science Forensic science (often shortened to forensics) is the application of a broad spectrum of sciences to answer questions of interest to a legal system. This may be in relation to a crime or a civil action. Besides its relevance to a legal system, more generally forensics encompasses the accepted scholarly or scientific methodology and norms under which the facts regarding an event, or an artifact, or some other physical item (such as a corpse) are ascertained as being the case. In that regard the concept is related to the notion of authentication, whereby an interest outside of a legal form exists in determining whether an object is what it purports to be, or is alleged as being.
  • 5. Computer Forensic The goal of computer forensics is to explain the current state of a digital artifact. The term digital artifact can include a computer system, a storage medium (such as a hard disk or CD-ROM), an electronic document (e.g. an email message or JPEG image) or even a sequence of packets moving over a computer network. The field of computer forensics also has sub branches within it such as firewall forensics, network forensics, database forensics and mobile device forensics.
  • 6. Simplified Understanding Forensic = Postmortem Computer forensics involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis Recovering Information the naked eye can no longer see.
  • 7. Need for Computer Forensic Techniques Evidence might be required for a wide range of computer crimes and misuses. The Need for deploying Computer forensic can be In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases). To recover data in the event of a hardware or software failure. To analyze a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did. To gather evidence against an employee that an organization wishes to terminate. To gain information about how computer systems work for the purpose of debugging, performance optimization, or reverse-engineering.
  • 8. Reasons For Evidence Wide range of computer crimes and misuses Non-Business Environment: evidence collected by Federal, State and local authorities for crimes relating to: Theft of trade secrets Fraud Extortion Industrial espionage Position of pornography SPAM investigations Virus/Trojan distribution Homicide investigations Intellectual property breaches Unauthorized use of personal information Forgery Perjury
  • 9. Reasons For Evidence (cont) Computer related crime and violations include a range of activities including: Business Environment: Theft of or destruction of intellectual property Unauthorized activity Tracking internet browsing habits Reconstructing Events Inferring intentions Selling company bandwidth Wrongful dismissal claims Sexual harassment Software Piracy
  • 10. Who Uses Computer Forensics? Criminal Prosecutors Rely on evidence obtained from a computer to prosecute suspects and use as evidence Civil Litigations Personal and business data discovered on a computer can be used in fraud, divorce, harassment, or discrimination cases Insurance Companies Evidence discovered on computer can be used to mollify costs (fraud, worker’s compensation, arson, etc) Private Corporations Obtained evidence from employee computers can be used as evidence in harassment, fraud, and embezzlement cases
  • 11. Steps Of Computer Forensics According to many professionals, Computer Forensics is a four (4) step process Acquisition Physically or remotely obtaining possession of the computer, all network mappings from the system, and external physical storage devices Identification This step involves identifying what data could be recovered and electronically retrieving it by running various Computer Forensic tools and software suites
  • 12. Steps Of Computer Forensics (cont) According to many professionals, Computer Forensics is a four (4) step process Evaluation Evaluating the information/data recovered to determine if and how it could be used again the suspect for employment termination or prosecution in court Presentation This step involves the presentation of evidence discovered in a manner which is understood by lawyers, non-technically staff/management, and suitable as evidence as determined by United States and internal laws
  • 13. Handling Information Information and data being sought after and collected in the investigation must be properly handled Volatile Information Network Information Communication between system and the network Active Processes Programs and daemons currently active on the system Logged-on Users Users/employees currently using system Open Files Libraries in use; hidden files; Trojans (rootkit) loaded in system
  • 14. Handling Information (cont) Non-Volatile Information configuration settings system files registry settings that are available after reboot Accessed through drive mappings from system This information should investigated and reviewed from a backup copy
  • 15. Anti-Forensics Software that limits and/or corrupts evidence that could be collected by an investigator Performs data hiding and distortion (HPA & Logic Bombs) Exploits limitations of known and used forensic tools Works both on Windows and LINUX based systems In place prior to or post system acquisition
  • 16. Evidence Processing Guidelines Steps of processing evidence Step 1: Shut down the computer Considerations must be given to volatile information Prevents remote access to machine and destruction of evidence (manual or ant-forensic software) Step 2: Document the Hardware Configuration of The System Note everything about the computer configuration prior to re-locating
  • 17. Evidence Processing Guidelines (cont) Step 3: Transport the Computer System to A Secure Location Do not leave the computer unattended unless it is locked in a secure location Step 4: Make Bit Stream Backups of Hard Disks and Floppy Disks Step 5: Mathematically Authenticate Data on All Storage Devices Must be able to prove that you did not alter any of the evidence after the computer came into your possession Step 6: Document the System Date and Time Step 7: Make a List of Key Search Words Step 8: Evaluate the Windows Swap File
  • 18. Evidence Processing Guidelines (cont) Step 9: Evaluate File Slack File slack is a data storage area of which most computer users are unaware; a source of significant security leakage. Step 10: Evaluate Unallocated Space (Erased Files) Step 11: Search Files, File Slack and Unallocated Space for Key Words Step 12: Document File Names, Dates and Times Step 13: Identify File, Program and Storage Anomalies Step 14: Evaluate Program Functionality Step 15: Document Your Findings Step 16: Retain Copies of Software Used
  • 19. Methods deployed Discovering Data on Computer System Recovering deleted, encrypted, or damaged file information Monitoring live activity Detecting violations of corporate policy
  • 20. Fraud A fraud is an intentional deception made for personal gain or to damage another individual. The specific legal definition varies by legal jurisdiction. Fraud is a crime, and is also a civil law violation. Many hoaxes are fraudulent, although those not made for personal gain are not technically frauds. Defrauding people of money is presumably the most common type of fraud
  • 21.
  • 22.
  • 23. It is estimated that there has been accelerated growth in economic misappropriation;
  • 24. Corporate fraud swing to theft of intellectual property and IT- related incidents;
  • 25. About 42 per cent of the cases in India, it was possible to make recoveries from the perpetrator;
  • 26.
  • 27. High staff turnover, implanting of personnel are the most recurrent cause of exposure to fraud;
  • 28. Imperative effect of globalization;
  • 29. Increased merger and acquisition between companies. CONTINUED……
  • 30.
  • 31. Reacting appropriately to situations where chances of fraud or corruption allegations are found to be high;
  • 32. Providing appropriate training and promulgating relevant codes of conduct to ensure employees and contractors are aware of their responsibilities in combating fraud and corruption; and
  • 33.
  • 34. Build chain of events;
  • 36. Model scenarios.Review existing control system Identify week points regarding information system and e-surveillance. Identify origins and causes of loss Assess fraud risk Develop recommendations for follow-up actions Design compatible business process and policies Training to develop immune with contemporary environment
  • 37. Software for Analysis & Audit of Commercial Data
  • 38.
  • 39.
  • 40. Thank You CA Ashwin Dedhia Director , Solutions MAIA Intelligence