SlideShare a Scribd company logo
1 of 64
Download to read offline
Catching
Insider
Data Theft
with
Stochastic Forensics
Jonathan Grier
Confidentiality
To preserve client confidentiality,
case information (names, places, dates, and
settings) has been omitted or altered.
The data and techniques presented
have not been altered.
Can you find the data thief?
Harlan Carvey, Windows Forensic Analysis, 2009
Harlan Carvey, Windows Forensic Analysis, 2009
No Artifacts = No Forensics
Harlan Carvey, Windows Forensic Analysis, 2009
No Artifacts = No Forensics???
Access timestamps updates during:
Routine access
Access timestamps updates during:
Copying a folder Routine access
Copying Folders Routine Access
Nonselective
All subfolders and files accessed
Selective
Temporally continuous Temporally irregular
Recursive Random order
Directory accessed
before its files
Files can be accessed
without directory
COPIED
NOT COPIED
“slap-your-head-and-say-'doh-wish-I'd-thought-of-that’”
-- an anonymous reviewer
No Artifacts
Yes Forensics
Not so fast...
1. Timestamps are overwritten very quickly
2. There are other nonselective, recursive
. activities (besides copying)
Not so fast...
1. Timestamps are overwritten very quickly
Can we use this method months later?
On a heavily used system?
Won’t most of the timestamps have
been overwritten?
Not so fast...
1. Timestamps are overwritten very quickly
Can we use this method months later?
On a heavily used system?
Won’t most of the timestamps have
been overwritten?
YES!
YES!
Not
really!
Two observations:
1. Timestamps values can increase,
but never decrease.
2. A lot of files just collect dust.
Most activity is on a minority of files.
Farmer & Venema, Forensic Discovery, 2005
At tcopying:
• All files have access_timestamp = tcopying
At tcopying:
• All files have access_timestamp = tcopying
Several weeks later:
• All files have access_timestamp ≥ tcopying
At tcopying:
• All files have access_timestamp = tcopying
Several weeks later:
• All files have access_timestamp ≥ tcopying
• Many files still have access_timestamp = tcopying
After 300 days of simulated activity
Histogram of access timestamps
Copying creates a
cutoff cluster
cutoff – No file has timestamp < tcluster
cluster – Many files have timestamp = tcluster
Aren’t there other recursive access patterns besides copying?
Affirming the
consequent
A ⟶ B doesn’t prove B ⟶	A.
The absence of a cutoff
cluster can disprove
copying, but the existence
can’t prove copying.
Perhaps they ran grep.
Indeed, there are!
vs.Affirming the
consequent
A ⟶ B doesn’t prove B ⟶	A.
Abductive reasoning
An unusual observation
supports inferring a
likely cause.
The absence of a cutoff
cluster can disprove
copying, but the existence
can’t prove copying.
Who’s trying to prove anything?
Investigate! One clue leads to
another until the case unravels.
Perhaps they ran grep.
Indeed!
Check if grep is installed,
if they’ve ever run it
before, or after, on any
folder.
Check why they were still in
the building at 11 PM.
Farmer & Venema, Forensic Discovery, 2005
An actual investigation...
Part II:
Now for the real
world...
NOISE
OpenSolaris cp command source code
Notice anything?
Notice anything?
OpenSolaris cp command source code
writefile() function
Is all lost
(on Windows at least)
?
a Directory
is also
a File!
Filter...
NOISE
ACCURACY?
ACCURACY?
Who needs
Part III:
Applying
Stochastic
Forensics
Eyeball?
Filter
&
Plot
Filter
1. By folder
Filter
1. By folder
2. Directories versus Files
Filter
1. By folder
2. Directories versus Files
3. Permissions
Filter
1. By folder
2. Directories versus Files
3. Permissions
4. Other
Plot
Our visual cognition is
amazingly robust
Ploticus: http://ploticus.sourceforge.net
Interpret
&
Advance
No Cluster?
Strong evidence
of no copying
Found Cluster?
1. Check control folders
2. Search for causes
3. Fingerprint it
Found Cluster?
A cluster defines a tight
window of opportunity.
Use it to propel the
investigation forward.
Part IV:
Forensic
Hacking
hack v.
Exploring the inner
workings of something
by using it in a way its
creators never imagined.
Look at the
Surviving Data

Reconstruct
Previous Data
 This previous data
is our deliverable.
Classical Forensics:
What do I want
to know about?
What behavior
is associated?
How does that
behavior affect
the system?
Measure those
effects.
Draw a
(quantifiable)
inference.
  
Look at the
Surviving Data

Reconstruct
Previous Data
 This previous data
is our deliverable.
Classical Forensics:
Stochastic Forensics:
Leading researchers have called to move from:
“What data can we find?”
To:
“What did this person do?”
Farmer & Venema, Forensic Discovery, 2005
Research Agenda
(i.e. a request for help)
1. Scientific testing
Automate, build corpus, confidence levels, validate
2. Fingerprinting
We can distinguish copying from grep!
3. Probability value
4. What other questions can stochastic forensics address?
Let’s find sloppy questions
and answer them less precisely!
Questions?
Comments?
Want More Info?
Please speak to me,
here at Black Hat
or jdgrier at grierforensics com.

More Related Content

What's hot

Boldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big DataBoldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big Data
boldonjames
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 

What's hot (20)

Boldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big DataBoldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big Data
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market Overview
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows Environment
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
 
Windows forensic
Windows forensicWindows forensic
Windows forensic
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
Threat Hunting Workshop
Threat Hunting WorkshopThreat Hunting Workshop
Threat Hunting Workshop
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
Ceh v5 module 17 physical security
Ceh v5 module 17 physical securityCeh v5 module 17 physical security
Ceh v5 module 17 physical security
 
Developer's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web CryptographyDeveloper's Guide to JavaScript and Web Cryptography
Developer's Guide to JavaScript and Web Cryptography
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Registry forensics
Registry forensicsRegistry forensics
Registry forensics
 
PGP.ppt
PGP.pptPGP.ppt
PGP.ppt
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 

Viewers also liked

Viewers also liked (15)

How To Keep Fraud Far From Your Customer Experience Data
How To Keep Fraud Far From Your Customer Experience DataHow To Keep Fraud Far From Your Customer Experience Data
How To Keep Fraud Far From Your Customer Experience Data
 
FCRA Duties Secure
FCRA Duties SecureFCRA Duties Secure
FCRA Duties Secure
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?
 
Identity Theft Action Log - Canada
Identity Theft Action Log - CanadaIdentity Theft Action Log - Canada
Identity Theft Action Log - Canada
 
War Comes Home: The Excessive Militarization of American Police - Report
War Comes Home: The Excessive Militarization of American Police - ReportWar Comes Home: The Excessive Militarization of American Police - Report
War Comes Home: The Excessive Militarization of American Police - Report
 
Reporter's Recording Guide
Reporter's Recording GuideReporter's Recording Guide
Reporter's Recording Guide
 
KNOW YOUR RIGHTS WHEN ENCOUNTERING LAW ENFORCEMENT
KNOW YOUR RIGHTS WHEN ENCOUNTERING LAW ENFORCEMENTKNOW YOUR RIGHTS WHEN ENCOUNTERING LAW ENFORCEMENT
KNOW YOUR RIGHTS WHEN ENCOUNTERING LAW ENFORCEMENT
 
Financial Crime and You
Financial Crime and YouFinancial Crime and You
Financial Crime and You
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for BusinessDEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
DEBT RELIEF SERVICES & THE TELEMARKETING SALES RULE: A Guide for Business
 
A Review of the Data Broker Collection, Use,and Sale of Consumer Data
A Review of the Data Broker Collection, Use,and Sale of Consumer DataA Review of the Data Broker Collection, Use,and Sale of Consumer Data
A Review of the Data Broker Collection, Use,and Sale of Consumer Data
 
Protecting Privacy From Aerial Surveillance
Protecting Privacy From Aerial SurveillanceProtecting Privacy From Aerial Surveillance
Protecting Privacy From Aerial Surveillance
 
Children's Online Privacy Protection Rule
Children's Online Privacy Protection Rule Children's Online Privacy Protection Rule
Children's Online Privacy Protection Rule
 
Your Reference Guide to EMV Integration:Understanding the Liability Shift
Your Reference Guide to EMV Integration:Understanding the Liability ShiftYour Reference Guide to EMV Integration:Understanding the Liability Shift
Your Reference Guide to EMV Integration:Understanding the Liability Shift
 

Similar to Catching Insider Data Theft with Stochastic Forensics 2012

AntiForensics - Leveraging OS and File System Artifacts.pdf
AntiForensics - Leveraging OS and File System Artifacts.pdfAntiForensics - Leveraging OS and File System Artifacts.pdf
AntiForensics - Leveraging OS and File System Artifacts.pdf
ekobelasting
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
Gnanavi2
 

Similar to Catching Insider Data Theft with Stochastic Forensics 2012 (20)

Post Mortem of a Hacked Website - Wordcamp Sunshine Coast 2016
Post Mortem of a Hacked Website - Wordcamp Sunshine Coast 2016Post Mortem of a Hacked Website - Wordcamp Sunshine Coast 2016
Post Mortem of a Hacked Website - Wordcamp Sunshine Coast 2016
 
Logs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thiefLogs, Logs, Logs - What you need to know to catch a thief
Logs, Logs, Logs - What you need to know to catch a thief
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.ppt
 
DigitalForensics.ppt
DigitalForensics.pptDigitalForensics.ppt
DigitalForensics.ppt
 
Ceic 2012 anti-anti-forensics
Ceic 2012 anti-anti-forensicsCeic 2012 anti-anti-forensics
Ceic 2012 anti-anti-forensics
 
First Responders Course - Session 7 - Incident Scope Assessment [2004]
First Responders Course - Session 7 - Incident Scope Assessment [2004]First Responders Course - Session 7 - Incident Scope Assessment [2004]
First Responders Course - Session 7 - Incident Scope Assessment [2004]
 
AntiForensics - Leveraging OS and File System Artifacts.pdf
AntiForensics - Leveraging OS and File System Artifacts.pdfAntiForensics - Leveraging OS and File System Artifacts.pdf
AntiForensics - Leveraging OS and File System Artifacts.pdf
 
Windows Live Forensics 101
Windows Live Forensics 101Windows Live Forensics 101
Windows Live Forensics 101
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Disk forensics for the lazy and the smart
Disk forensics for the lazy and the smartDisk forensics for the lazy and the smart
Disk forensics for the lazy and the smart
 
Incident Response Automation @ Netflix Q12019
Incident Response Automation @ Netflix Q12019Incident Response Automation @ Netflix Q12019
Incident Response Automation @ Netflix Q12019
 
Logs And Backups
Logs And BackupsLogs And Backups
Logs And Backups
 
Windows IR made easier and faster v1.0
Windows IR made easier and faster v1.0Windows IR made easier and faster v1.0
Windows IR made easier and faster v1.0
 
Cyber Crimes & Cyber Forensics
Cyber Crimes & Cyber ForensicsCyber Crimes & Cyber Forensics
Cyber Crimes & Cyber Forensics
 
Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
 
Hunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forestHunting for the secrets in a cloud forest
Hunting for the secrets in a cloud forest
 
CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)
CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)
CONFidence 2018: Hunting for the secrets in a cloud forest (Paweł Rzepa)
 

More from - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Catching Insider Data Theft with Stochastic Forensics 2012