1. IT FORENSIC
The IT Computer PowerPlugs
Forensic is investigatory approach
for finding the evidences, extent of loss & culprits,
when some information security breach has taken
place. Forensic solution, lets examiners acquire data
from a wide variety of devices, unearth potential
evidence with disk level forensic analysis, and craft
comprehensive reports on their findings, all while
maintainingfor PowerPoint their evidence.
Templates the integrity of
2. IT FORENSIC
A recent study indicates that over 93%
PowerPlugs
of information produced is in digital format.
The same study also noted that 85% of all
criminal, civil, and company violations are
done by means of digital Intrusion.
Templates for PowerPoint
3. POSSIBILITY OF BREACH OF IT SECURITY
• Theft of Company Secrets (client or employee lists)
• Employee Sabotage or Terrorism
• Credit Card Fraud
PowerPlugs
• Financial Crimes
• Embezzlement (money or information)
• Economic Crimes
• Harassment (sexual)
• Child Pornography
• Major Crimes
•Templates for (short or long-term plans)
Identity Theft PowerPoint
5. INTERNAL INTRUSION
Pen Drive Intrusion
PowerPlugs
o Details of all pen drives installed on a system
o Recorded as per O/S artifacts with timeline
o Analysis of all pen drives used on different work station on a Network
Local Area Network Intrusion
o Any suspected user Login Analysis with Victims computer in the Network
o Artifacts with regard to different incidents taken place during that log on period
Templates for PowerPoint
6. EXTERNAL INTRUSION
1. Web Intrusion
Trojan
Malware
PowerPlugs
Spyware
2. Mails
As an Attachment
3.IM
Templates for PowerPoint
During communication
Attachment
7. PowerPlugs
IT SECURITY
Templates for PowerPoint
8. IT
Government agencies need to proactively protect
PowerPlugs
their critical applications, data and processes from
external and internal threats throughout their
entire life cycle. By taking a comprehensive and
integrated approach to application vulnerability
management, agencies can measurably improve
operational security, mitigate risks, and reduce
costs.
Templates for PowerPoint
9. IT
Why we need Security?
PowerPlugs
Security is now a basic requirement because
global computing is inherently insecure.
Information Security means protecting
information from unauthorized access.
Information security is a continue process to
protect your information.
Templates for PowerPoint
10. IT
CIA Triangle
• Confidentiality
• Integrity PowerPlugs
• Availability
Confidentiality
Ensuring that your information remains confidential and
remains with only to those who should access that
information.
Information Integrity
Templates for PowerPoint
Knowing that no one has been able to change your information,
so you can depend on its accuracy.
Availability
Making sure that your information is available when you need it.
11. IT INFRASTRUCTURE
• Servers
PowerPlugs
• Routers
• Firewall
• Network
•Web
Templates for PowerPoint
• Users
12. IT SECURITY PROCESS MODEL
First Phase
Identification of Targets
System Fingerprinting, Enumeration, Checking the Information Flow
Second Phase PowerPlugs
Identification of Vulnerabilities and Potential Risks
Non Destructive Exploitation of found Vulnerabilities
Third Phase
Result Collation and Report Writing
Giving the Final Report to the Client about total health of I T
Infrastructure.
Fourth Phase
Templates for for smooth & secure IT environment and Business
Suggestions PowerPoint
continuity.
Recommendation of Industry Best Solutions to maintain secure
environment to deal with future Threats and Challenges.