SlideShare a Scribd company logo
Mark Lambe  Product Marketing Manager Shenick Network Systems Emulation Strategies to test Cyber terrorism defense Effective Internet Data and Attack
The real Crime is Ignorance ,[object Object],[object Object],[object Object],[object Object],[object Object],NAME & EMAIL ADDRESS! 10.1.0.82 Extortion of money Interest in Russian Brides 10.1.0.82 Potential Crime Data Collected IP Address
Network Vulnerabilities ,[object Object],[object Object],[object Object],[object Object]
Visible vs Invisible Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Visible Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A visible network threat is one in which a network or device on the network is targeted for some unlawful gain or reason of exploitation.
Invisible Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A map image may easily be embedded under an ordinary, everyday image and added to image sharing websites such as flickr, Youtube, etc.
Security - The Price of Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The three-way relationship between application performance, QoS settings and network load is  highly complex, non-linear and very fluid, as a  small increase in application traffic can have a disastrous affect on application performance.
Performance Issues ,[object Object],[object Object],[object Object]
Emulate the crime ,[object Object],[object Object],Stateful traffic Emulation – the representation of real traffic flows and user activities!
Per flow Challenge ,[object Object],[object Object],[object Object],[object Object],[object Object],Out of the 1,000,000s of daily emails / uploads, can the security system identify the one possible illegal flow with an illegal attachment  correctly?
Attack the stack ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Test for the Invisible ,[object Object],[object Object],[object Object],[object Object],[object Object]
diversifEye ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Sample features Overview
Thank You! Award Winning Test & Monitoring Solutions Industry Associations

More Related Content

What's hot

Matthias Vallentin - Towards Interactive Network Forensics and Incident Respo...
Matthias Vallentin - Towards Interactive Network Forensics and Incident Respo...Matthias Vallentin - Towards Interactive Network Forensics and Incident Respo...
Matthias Vallentin - Towards Interactive Network Forensics and Incident Respo...
boundary_slides
 
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKSEFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
cscpconf
 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
ijfls
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET Journal
 
Network forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wireNetwork forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wire
casheeew
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
chris zlatis
 
Practical Network Security
Practical Network SecurityPractical Network Security
Practical Network Security
Sudarsun Santhiappan
 
Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...Videoguy
 
online investigation
online investigationonline investigation
online investigationfortune777
 
A017510102
A017510102A017510102
A017510102
IOSR Journals
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
Pre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the networkPre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the network
TELKOMNIKA JOURNAL
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
Ben Rothke
 
Internets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on ServersInternets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on Servers
IRJET Journal
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
martinvoelk
 
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSLATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
IJCNCJournal
 
Day4
Day4Day4
Day4
Jai4uk
 

What's hot (20)

Matthias Vallentin - Towards Interactive Network Forensics and Incident Respo...
Matthias Vallentin - Towards Interactive Network Forensics and Incident Respo...Matthias Vallentin - Towards Interactive Network Forensics and Incident Respo...
Matthias Vallentin - Towards Interactive Network Forensics and Incident Respo...
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKSEFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
 
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSDDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
 
Network forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wireNetwork forensics - Follow the Bad Rabbit down the wire
Network forensics - Follow the Bad Rabbit down the wire
 
Entropy and denial of service attacks
Entropy and denial of service attacksEntropy and denial of service attacks
Entropy and denial of service attacks
 
Practical Network Security
Practical Network SecurityPractical Network Security
Practical Network Security
 
Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...
 
Core Values Decision Sept
Core Values Decision SeptCore Values Decision Sept
Core Values Decision Sept
 
online investigation
online investigationonline investigation
online investigation
 
A017510102
A017510102A017510102
A017510102
 
285 288
285 288285 288
285 288
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Pre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the networkPre-filters in-transit malware packets detection in the network
Pre-filters in-transit malware packets detection in the network
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
 
Internets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on ServersInternets Manage Communication Procedure and Protection that Crash on Servers
Internets Manage Communication Procedure and Protection that Crash on Servers
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSLATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
 
Day4
Day4Day4
Day4
 

Viewers also liked

Telepresence Interoperability Testing
Telepresence Interoperability TestingTelepresence Interoperability Testing
Telepresence Interoperability Testing
Shenick Network Systems
 
Optical instruments
Optical instrumentsOptical instruments
Optical instruments
Romel Villarubia
 
About Shenick
About ShenickAbout Shenick
Shenick Product Overview
Shenick Product OverviewShenick Product Overview
Shenick Product Overview
Shenick Network Systems
 
Apresentacao sessoes mz
Apresentacao sessoes mzApresentacao sessoes mz
Apresentacao sessoes mzDiogo Gomes
 
Aprendi pitch deck-3min-v03
Aprendi pitch deck-3min-v03Aprendi pitch deck-3min-v03
Aprendi pitch deck-3min-v03michaelburk
 
WORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila NarejoWORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila Narejo
♚ MBT- Khalid ♞
 
Video Traffic Management
Video Traffic ManagementVideo Traffic Management
Video Traffic Management
Shenick Network Systems
 
New dsp bi tingkatan_2_31_dis_2013_final
New dsp bi tingkatan_2_31_dis_2013_finalNew dsp bi tingkatan_2_31_dis_2013_final
New dsp bi tingkatan_2_31_dis_2013_finalUmagowrie Supramaniam
 
Bidang Pembelajaran 4 NILAI BERKAITAN DENGAN PATRIOTISME
Bidang Pembelajaran 4 NILAI BERKAITAN DENGAN PATRIOTISMEBidang Pembelajaran 4 NILAI BERKAITAN DENGAN PATRIOTISME
Bidang Pembelajaran 4 NILAI BERKAITAN DENGAN PATRIOTISME
Nur Syafiah Dang Rani
 
Form 5 English Language Scheme of Work 2014
Form 5 English Language Scheme of Work 2014Form 5 English Language Scheme of Work 2014
Form 5 English Language Scheme of Work 2014Umagowrie Supramaniam
 
Form 3 English Language Scheme of Work with DSP 2014
Form 3 English Language Scheme of Work with DSP 2014Form 3 English Language Scheme of Work with DSP 2014
Form 3 English Language Scheme of Work with DSP 2014Umagowrie Supramaniam
 
Form 4 English Language Scheme of Work 2014
Form 4 English Language Scheme of Work 2014Form 4 English Language Scheme of Work 2014
Form 4 English Language Scheme of Work 2014Umagowrie Supramaniam
 

Viewers also liked (15)

Telepresence Interoperability Testing
Telepresence Interoperability TestingTelepresence Interoperability Testing
Telepresence Interoperability Testing
 
Optical instruments
Optical instrumentsOptical instruments
Optical instruments
 
About Shenick
About ShenickAbout Shenick
About Shenick
 
Shenick Product Overview
Shenick Product OverviewShenick Product Overview
Shenick Product Overview
 
Apresentacao sessoes mz
Apresentacao sessoes mzApresentacao sessoes mz
Apresentacao sessoes mz
 
Aprendi pitch deck-3min-v03
Aprendi pitch deck-3min-v03Aprendi pitch deck-3min-v03
Aprendi pitch deck-3min-v03
 
The AICPA (UK) FAQs
The AICPA (UK) FAQsThe AICPA (UK) FAQs
The AICPA (UK) FAQs
 
WORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila NarejoWORKSHOP: Performance Effectiveness, by Rahila Narejo
WORKSHOP: Performance Effectiveness, by Rahila Narejo
 
Video Traffic Management
Video Traffic ManagementVideo Traffic Management
Video Traffic Management
 
PF 2015
PF 2015PF 2015
PF 2015
 
New dsp bi tingkatan_2_31_dis_2013_final
New dsp bi tingkatan_2_31_dis_2013_finalNew dsp bi tingkatan_2_31_dis_2013_final
New dsp bi tingkatan_2_31_dis_2013_final
 
Bidang Pembelajaran 4 NILAI BERKAITAN DENGAN PATRIOTISME
Bidang Pembelajaran 4 NILAI BERKAITAN DENGAN PATRIOTISMEBidang Pembelajaran 4 NILAI BERKAITAN DENGAN PATRIOTISME
Bidang Pembelajaran 4 NILAI BERKAITAN DENGAN PATRIOTISME
 
Form 5 English Language Scheme of Work 2014
Form 5 English Language Scheme of Work 2014Form 5 English Language Scheme of Work 2014
Form 5 English Language Scheme of Work 2014
 
Form 3 English Language Scheme of Work with DSP 2014
Form 3 English Language Scheme of Work with DSP 2014Form 3 English Language Scheme of Work with DSP 2014
Form 3 English Language Scheme of Work with DSP 2014
 
Form 4 English Language Scheme of Work 2014
Form 4 English Language Scheme of Work 2014Form 4 English Language Scheme of Work 2014
Form 4 English Language Scheme of Work 2014
 

Similar to Defining Cyber Crime

Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInformation Technology
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJuanita McConnell
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
ForgeRock
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDS
Michael Boman
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
Mihajlo Prerad
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
Jessica Thompson
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
RAVI RAJ
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
Lancope, Inc.
 
Dataviz For Cyber Security
Dataviz For Cyber SecurityDataviz For Cyber Security
Dataviz For Cyber Security
Awalin Sopan
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
Haltdos
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
Barry Greene
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
Universitas Bina Darma Palembang
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
SuhailShaik16
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introductionswang2010
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
Angie Lee
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
APNIC
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
IRJET Journal
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Securitysudip pudasaini
 

Similar to Defining Cyber Crime (20)

Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissance
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDS
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Dataviz For Cyber Security
Dataviz For Cyber SecurityDataviz For Cyber Security
Dataviz For Cyber Security
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
12 types of DDoS attacks
12 types of DDoS attacks12 types of DDoS attacks
12 types of DDoS attacks
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
 
Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 

Defining Cyber Crime

  • 1. Mark Lambe Product Marketing Manager Shenick Network Systems Emulation Strategies to test Cyber terrorism defense Effective Internet Data and Attack
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Thank You! Award Winning Test & Monitoring Solutions Industry Associations