Sunteți pe pagina 1din 13

IT FORENSIC

The IT Computer PowerPlugs Forensic is investigatory approach for finding the evidences, extent of loss & culprits, when some information security breach has taken place. Forensic solution, lets examiners acquire data from a wide variety of devices, unearth potential evidence with disk level forensic analysis, and craft comprehensive reports on their findings, all while Templates for maintaining thePowerPoint integrity of their evidence.

IT FORENSIC
A recent study indicates that over 93% PowerPlugs of information produced is in digital format. The same study also noted that 85% of all criminal, civil, and company violations are done by means of digital Intrusion.
Templates for PowerPoint

POSSIBILITY OF BREACH OF IT SECURITY

Theft of Company Secrets (client or employee lists) Employee Sabotage or Terrorism PowerPlugs Credit Card Fraud Financial Crimes Embezzlement (money or information) Economic Crimes Harassment (sexual) Child Pornography Major Crimes Templates Identity Theft or long-term plans) for (short PowerPoint

Nature of Attacks
External Internal PowerPlugs
USB LAN Web

PEN Drives

Mail

Templates for PowerPoint


External Hard Drives IM

INTERNAL INTRUSION
Pen Drive Intrusion
o Details of all pen drives installed on a system
o Recorded as per O/S artifacts with timeline o Analysis of all pen drives used on different work station on a Network

PowerPlugs

Local Area Network Intrusion


o Any suspected user Login Analysis with Victims computer in the Network o Artifacts with regard to different incidents taken place during that log on period Templates for PowerPoint

EXTERNAL INTRUSION
1. Web Intrusion Trojan PowerPlugs Malware Spyware 2. Mails As an Attachment 3. IM

Templates for PowerPoint

During communication Attachment

PowerPlugs

IT SECURITY
Templates for PowerPoint

IT
Government agencies need to proactively protect PowerPlugs their critical applications, data and processes from external and internal threats throughout their entire life cycle. By taking a comprehensive and integrated approach to application vulnerability management, agencies can measurably improve operational security, mitigate risks, and reduce costs. Templates for PowerPoint

IT
Why we need Security?

PowerPlugs
Security is now a basic requirement because global computing is inherently insecure. Information Security means protecting information from unauthorized access. Information security is a continue process to protect your information. Templates for PowerPoint

IT
CIA Triangle Confidentiality Integrity Availability

PowerPlugs

Confidentiality Ensuring that your information remains confidential and remains with only to those who should access that information. Information Integrity Knowing that no one has been able to change your information, Templates for PowerPoint so you can depend on its accuracy. Availability Making sure that your information is available when you need it.

IT INFRASTRUCTURE

Servers Routers

PowerPlugs

Firewall
Network

Web Templates for PowerPoint


Users

IT SECURITY PROCESS MODEL


First Phase Identification of Targets System Fingerprinting, Enumeration, Checking the Information Flow Second Phase Identification of Vulnerabilities and Potential Risks Non Destructive Exploitation of found Vulnerabilities Third Phase Result Collation and Report Writing Giving the Final Report to the Client about total health of I T Infrastructure. Fourth Phase Suggestions smooth & secure IT environment and Business Templates for for PowerPoint continuity. Recommendation of Industry Best Solutions to maintain secure environment to deal with future Threats and Challenges.

PowerPlugs

PowerPlugs

THANK YOU
Templates for PowerPoint

S-ar putea să vă placă și