SlideShare a Scribd company logo
1 of 21
Download to read offline
iForensics Prevention Workshops
“Tell me; where is cyberspace? Point out to me exactly where it is. Show me the
billion of airwaves coursing through our bodies and surroundings non-stop 24/7.

You have a website? Reach out and touch it for me. Reach out and pluck a fax
from the air. Or reach out and pluck the photo of your kid that you just sent
grandma out of the air and show it to me.

Where is the Internet? And where are the billions of bits of information sent at
seemingly light speed around the world. Show them to me.

The text message you sent…where did it go and how did it get there? Show me
the software you just downloaded and installed on your computer. Not the
interface that pops up on your computer screen but show me the bits and bytes
that make it work.

It is all AIR!!! It is nothing more than air. Every day we all buy, send and use air
and every day we all do not realize that our lives are changing as new technology
is released and as becomes a major part of our lives.”

And sometimes the air is polluted!
Computer vs. Internet Forensics

The widespread use of computer forensics resulted from the convergence of two
factors: the increasing dependence of law enforcement on computing (as in the
area of fingerprints) and the ubiquity of computers that followed from the
microcomputer revolution. As computer forensics evolved, it was modeled after the
basic investigative methodologies of law enforcement and the security industry that
championed its use. Not surprisingly, computer forensics is about the
"preservation, identification, extraction, documentation and interpretation of
computer data.” In order to accomplish these goals, there are well-defined
procedures, also derived from law enforcement, for acquiring and analyzing the
evidence without damaging it and authenticating the evidence and providing a
chain-of-custody that will hold up in court. The tools for the "search-and-seizure"
side of computer forensics are a potpourri of sophisticated tools that are primarily
focused on the physical side of computing: i.e., tracing and locating computer
hardware, recovering hidden data from storage media, identifying and recovering
hidden data, decrypting files, decompressing data, cracking passwords,
"crowbarring" an operating system (bypassing normal security controls and
permissions), and so forth. For those who are old enough to remember the original
Norton Utilities for DOS think of these modern tools as the original Norton Disk
Editor for DOS on steroids.
Listed below are some common categories and a few examples of computer
forensics toolkits:
File Viewers: Quick View Plus (http://www.jasc.com)
Image Viewers: ThumbsPlus http://www.cerious.com)
Password Crackers: l0phtcrack or LC4 (http://www.atstake.com)
Format-independent Text Search: dtsearch (http://www.dtsearch.com)
Drive Imaging: Norton Utilities' Ghost (http://www.symantec.com)
Complete Computer Forensics Toolkits:
     Forensics Toolkit (http://www.foundstone.com);
     ForensiX (http://www.all.net);
     EnCase Forensic (http://www.encase.com)
Forensic Computer Systems: Forensic-Computers (http://www.forensic-
computers.com)
One of the more full-featured network tools, NetScanTools Pro
(http://www.netscantools.com). Note the abundance of features built into one
product!
Internet Forensics specialist uses many of the same tools and engages in the
same set of practices as the person he/she is investigating. Let me illustrate with
a few examples.

Suppose that you've received some suspicious email, and want to verify the
authenticity of a URL included within. A number of options are available. One
might use a browser to access information from the American Registry for Internet
Numbers (http://www.arin.net). Or one might use any number of OS utilities. But
we'll save ourselves some time and worry, and use a general network appliance,
NetScanTools Pro. We identified the registration, domain name servers, currency
information, etc. for netscantools.com.

Now let's change the scenario slightly. Suppose that we had some hostile intent,
and wanted to ferret out information about some company's network
infrastructure. What tool might we use? You guessed it, NetScanTools Pro. The
point is that the self-same tool is equally useful to the hacker conducting basic
network reconnaissance and the legitimate Internet security specialist who's
trying to determine whether a URL links to a legitimate company or a packet
"booby trap." The point is that, both uses require essentially the same skill sets.
In Internet Forensics it is customarily the case that the forensic specialist
undergoes the same level of education and training as the hacker he or she
seeks to thwart. The difference is one of ethics, not skill. We observed that this
was not true of the perpetrator and investigator in computer forensics.

To drive home the point, look at the other options that NetScanTools Pro provides.
One can use an ICMP "ping" to identify whether a particular network host is online
just as easily as one can use it to identify activity periods in network
reconnaissance or a network topology. One can use a Traceroute to determine
network bottlenecks, or to identify intervening routers and gateways for possible
man-in-the-middle attacks. One can use Port Probe to verify that a firewall is
appropriately configured, or to make a list of vulnerable services on a host that
may be exploited.

Where computer forensics deals with physical things, Internet forensics deals with
the ephemeral. The computer forensics specialist at least has something to seize
and investigate. The Internet forensics specialist only has something to
investigate if the packet filters, firewalls and intrusion detection systems were set
up to anticipate the breach of security. But, if one could always anticipate the
breach, one could always block it. Therein lies the art, and the mystery.
If I've been successful, I've got you thinking about the
fundamental differences between computer forensics
and internet forensics. I think that on careful analysis,
one has to conclude (a) that these are fundamentally
different skills, (b) that in the case of Internet
forensics, the skill sets of the successful perpetrator
and successful investigator are pretty much the same,
and (c) Internet forensics is as much a discipline as its
search-and-seizure counterpart. This validity of these
conclusions may be confirmed in any number of ways.
For the most part the tools-of-the-trade for both hacker
and Internet forensics specialist are the same, though
the occasional extreme case like Dug Song's Dsniff
http://monkey.org/~dugsong/dsniff challenges this
generalization. It's hard for me to imagine a legitimate,
lawful use of Dsniff's "macof" utility that enables the
users to flood switch state tables! But in the main, the
hacker and the Internet Forensics specialist could co-
exist with the same tools and equipment.
Statistics on Internet Fraud

The Internet Crime Complaint Center (IC3), a joint venture of the FBI and the
National White Collar Crime Center found:

Online auction fraud was the most reported type of fraud and accounted for 44.9%
of consumers’ complaints
Non-delivered merchandise and/or payment made up 19.0% of complaints
Check fraud represented 4.9% of complaints
About 70% of the fraud victims were scammed through www (e.g. online auctions)
About 30% of the victims were scammed by emails

Payment Methods

Top methods of payment used by victims of Internet fraud include:

Wire
Credit Card
Bank Debit
Money Order
Check
The average loss for all Internet frauds was $1,500. More than half of these
losses occurred through auctions. So protect yourself from becoming the next
victim of an auction fraud. Read the tips on how to prevent auction frauds from
happening to you.

Tips on How to Prevent Auction Frauds

Learn as much as you can from the seller
Read and examine the feedback on the seller
Check the location of the seller. If the seller is abroad and a problem arises it will
be harder to solve.
Ask if shipping and delivery are included in the price so you receive no
unexpected or additional costs.
Refuse to give the seller your social security number or driver’s license number to
prevent identity theft. In fact get used to saying “no” to information requests on
the Internet.
The Problem
Corporate Espionage is the most cyber-criminal activity
and at the same time, the least protected area of
vulnerability. And it is not being conducted just by
nation-states against USA businesses wither. The Gang
of 10 hacking organizations cost American businesses
an estimated $2-billion every year.

This workshop is designed to identify the main and
common areas of vulnerability and upon completion of
this workshop, a ForensicsNation security consultant will
visit each participating business to do an in depth
analysis of specific vulnerabilities.

We will cover specific areas of intrusion using historical
data and modes of penetration gleamed from
ForensicsNation files. We will take each item defined
below one at a time.
Workshop Contents

Part 1: The hacker subculture and approach
• An overview of the risks and threats
• An insight into the hacker underground
• The anatomy of a hack

Part 2: TCP/IP fundamentals
• TCP/IP and its relevance to hacking
• TCP header, flags and options
• UDP, ICMP and ARP
• Network traffic dump analysis
• Class exercises and lab sessions

Part 3: Reconnaissance techniques
• Selecting a target
• Identifying target hosts and services
• Network mapping techniques
• Fingerprinting and OS determination
• Scanning and stealth techniques
• Class exercises and lab sessions
Part 4: Compromising networks
• Vulnerability cross referencing
• Code auditing and insecure code examples
• Exploiting network services
• Sniffers, backdoors and root kits
• Trojans and session hijacking
• Denial of service attacks
• Trust exploitation and spoofing
• Buffer overflow techniques
• Web page graffiti attacks
• War dialers and dial-in hacking
• Manipulating audit trails and security logs
• Class exercises and lab sessions

Part 5: Windows Applied Hacking
• Windows components, Domains and structures
• Remote information gathering
• Scanning and banner checking
• Selecting services to attack
• Enumerating Windows information
• Windows hacking techniques
• Recent Windows vulnerabilities
• Class exercises and lab sessions
Part 6: Windows effective countermeasures
• User account policies and group allocations
• File and directory permissions
• File and print shares
• Hardening the registry
• Domains and trust relationships
• Securing network services
• Windows antivirus strategies
• Windows and Internet security
• Windows auditing and security logs
• Windows service packs and hot fixes
• Class exercises and lab sessions

Part 7: Unix applied hacking
• Unix components
• Unix variants
• Remote and local information gathering
• Scanning and fingerprinting
• Selecting services to attack
• Unix hacking techniques
• Recent Unix vulnerabilities
• Class exercises and lab sessions
Part 8: Unix effective countermeasures
• Unix password and group files
• User account and password controls
• Controlling command line access
• File and directory permissions
• SUID and SGID controls
• Crontab security
• Network and trust relationships
• Securing network services
• Unix antivirus strategies
• Unix and Internet security
• Unix auditing and security logs
• Unix security patches
• Class exercises and lab sessions

Part 9: Network security strategies
• Risk management and AS/NZS 4360
• Security management and AS/NZS 7799
• Developing a practical security strategy
• Physical security and environmental controls
• Personnel security and awareness training
• Firewall risks and strategies
• Intrusion detection system risks and strategies
• An overview of ecommerce security issues
• An overview of wireless security issues
• An overview of PBX security issues
• An overview of intrusion analysis techniques
• An overview of forensics procedures
• An overview of IT contingency planning
• Class exercises and lab sessions

Part 10: Advanced Security Techniques
•Inventory of Authorized and Unauthorized Devices
•Inventory of Authorized and Unauthorized Software
•Secure Configurations for Hardware and Software on Laptops, Workstations,
and Servers
•Continuous Vulnerability Assessment and Remediation
•Malware Defenses
•Application Software Security
•Wireless Device Control
•Data Recovery Capability
•Security Skills Assessment and Appropriate Training to Fill Gaps
•Secure Configurations for Network Devices such as Firewalls, Routers, and
Switches
•Limitation and Control of Network Ports, Protocols, and Services
•Controlled Use of Administrative Privileges
•Boundary Defense
•Maintenance, Monitoring, and Analysis of Security Audit Logs
•Controlled Access Based on the Need to Know
•Account Monitoring and Control
•Data Loss Prevention
•Incident Response Capability
•Secure Network Engineering
•Penetration Tests and Red Team Exercises

Bonus: Retina® Network Security Scanner from eEye.com

Recognized as the best scanner on the market in terms of speed, ease of use,
non-intrusiveness and advanced scanning capabilities
ForensicsNation Protection Catalog

We have taken the guess work out of
identifying good quality products and the best
prices by publishing our own catalog for your
convenience.

All of the products contained in our catalog
are used by ForensicsNation everyday.

Download your FREE catalog and begin
protecting yourself and your loved ones
Today.

Go here for your FREE download:
http://www.filefactory.com/f/04629606960c
0da3/
Our Gift to You…

Never in the course of history has the title of
this book become so real, “You Can Run But
You Cannot Hide!”

With today’s technology, investigators of all
types can now track your whereabouts in a
way that simple astounds you.

Learn all about cyber-forensics and the
resources that we use to conduct all of our
investigations

Go here for your FREE download:
http://www.filefactory.com/f/04629606960c
0da3/
Privacy is a right!

Your right to privacy is being eroded daily.
But this particular right can have dire
consequences for those that choose to
ignore it.

Remaining private and staying off the grid
protects you and your loved ones from all
sorts of cyber-crime. And the name of this
game is PROTECTION!

Most of the resources offered in this book are
free so study this information carefully.

Go here for your FREE download:
http://www.filefactory.com/f/04629606960c
0da3/
Corporate Mailing Address:
546 South Main Street
Lock Box 304
Cedar City, Utah 84720
435-249-5600
435-867-1988 Fax
support@neternatives.com
http://ForensicsNation.com

More Related Content

What's hot

Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02Wayne Norris
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crimejung921
 
Computer forensics [pdf library]
Computer forensics [pdf library]Computer forensics [pdf library]
Computer forensics [pdf library]Neyna Nair
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesKislaychd
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Bruce Wolfe
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"abercius24
 
Data breach at Target, demystified.
Data breach at Target, demystified.Data breach at Target, demystified.
Data breach at Target, demystified.Cyphort
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The InternetAdjem
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAnuj Khandelwal
 

What's hot (18)

Computer crime
Computer crimeComputer crime
Computer crime
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
 
Computer forensics [pdf library]
Computer forensics [pdf library]Computer forensics [pdf library]
Computer forensics [pdf library]
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering Techniques
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Data breach at Target, demystified.
Data breach at Target, demystified.Data breach at Target, demystified.
Data breach at Target, demystified.
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
 

Viewers also liked

Doi ca thien thu tieng me cuoi 2
Doi ca thien thu tieng me cuoi 2Doi ca thien thu tieng me cuoi 2
Doi ca thien thu tieng me cuoi 2nguyensnowy
 
עציץ אוויר AIR POT
עציץ אוויר AIR POTעציץ אוויר AIR POT
עציץ אוויר AIR POTavi talman
 
Presentation on content marketing 2012
Presentation on content marketing 2012Presentation on content marketing 2012
Presentation on content marketing 2012Jaigs
 
Genetika mikroba
Genetika mikrobaGenetika mikroba
Genetika mikrobaSerlin Idji
 
ขมิ้นชัน+..
ขมิ้นชัน+..ขมิ้นชัน+..
ขมิ้นชัน+..preeyanuch2
 
Words related with crime[1]
Words related with crime[1]Words related with crime[1]
Words related with crime[1]pilarpsegundo
 

Viewers also liked (8)

Doi ca thien thu tieng me cuoi 2
Doi ca thien thu tieng me cuoi 2Doi ca thien thu tieng me cuoi 2
Doi ca thien thu tieng me cuoi 2
 
עציץ אוויר AIR POT
עציץ אוויר AIR POTעציץ אוויר AIR POT
עציץ אוויר AIR POT
 
Catalogo
CatalogoCatalogo
Catalogo
 
Presentation on content marketing 2012
Presentation on content marketing 2012Presentation on content marketing 2012
Presentation on content marketing 2012
 
Genetika mikroba
Genetika mikrobaGenetika mikroba
Genetika mikroba
 
Magalyu
MagalyuMagalyu
Magalyu
 
ขมิ้นชัน+..
ขมิ้นชัน+..ขมิ้นชัน+..
ขมิ้นชัน+..
 
Words related with crime[1]
Words related with crime[1]Words related with crime[1]
Words related with crime[1]
 

Similar to 03.fnc corporate protect workshop new

Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloJohn Intindolo
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxsmile790243
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital Worldrahulmonikasharma
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsMustapha Mugisa
 

Similar to 03.fnc corporate protect workshop new (20)

Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Project_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_IntindoloProject_Paper_ISSC455_Intindolo
Project_Paper_ISSC455_Intindolo
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 
Ethical hacking1
Ethical hacking1Ethical hacking1
Ethical hacking1
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
hacking
hackinghacking
hacking
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
 

More from forensicsnation

Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshopforensicsnation
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)forensicsnation
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) newforensicsnation
 
06.understanding you workshop
06.understanding you workshop06.understanding you workshop
06.understanding you workshopforensicsnation
 
07.the power of observation workshop
07.the power of observation workshop07.the power of observation workshop
07.the power of observation workshopforensicsnation
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) newforensicsnation
 
00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview newforensicsnation
 
08.body language workshop
08.body language workshop08.body language workshop
08.body language workshopforensicsnation
 

More from forensicsnation (13)

Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshop
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
FNC Forensics Overview
FNC Forensics OverviewFNC Forensics Overview
FNC Forensics Overview
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
06.understanding you workshop
06.understanding you workshop06.understanding you workshop
06.understanding you workshop
 
07.the power of observation workshop
07.the power of observation workshop07.the power of observation workshop
07.the power of observation workshop
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview new
 
08.body language workshop
08.body language workshop08.body language workshop
08.body language workshop
 

Recently uploaded

Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Recently uploaded (20)

Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

03.fnc corporate protect workshop new

  • 2.
  • 3. “Tell me; where is cyberspace? Point out to me exactly where it is. Show me the billion of airwaves coursing through our bodies and surroundings non-stop 24/7. You have a website? Reach out and touch it for me. Reach out and pluck a fax from the air. Or reach out and pluck the photo of your kid that you just sent grandma out of the air and show it to me. Where is the Internet? And where are the billions of bits of information sent at seemingly light speed around the world. Show them to me. The text message you sent…where did it go and how did it get there? Show me the software you just downloaded and installed on your computer. Not the interface that pops up on your computer screen but show me the bits and bytes that make it work. It is all AIR!!! It is nothing more than air. Every day we all buy, send and use air and every day we all do not realize that our lives are changing as new technology is released and as becomes a major part of our lives.” And sometimes the air is polluted!
  • 4. Computer vs. Internet Forensics The widespread use of computer forensics resulted from the convergence of two factors: the increasing dependence of law enforcement on computing (as in the area of fingerprints) and the ubiquity of computers that followed from the microcomputer revolution. As computer forensics evolved, it was modeled after the basic investigative methodologies of law enforcement and the security industry that championed its use. Not surprisingly, computer forensics is about the "preservation, identification, extraction, documentation and interpretation of computer data.” In order to accomplish these goals, there are well-defined procedures, also derived from law enforcement, for acquiring and analyzing the evidence without damaging it and authenticating the evidence and providing a chain-of-custody that will hold up in court. The tools for the "search-and-seizure" side of computer forensics are a potpourri of sophisticated tools that are primarily focused on the physical side of computing: i.e., tracing and locating computer hardware, recovering hidden data from storage media, identifying and recovering hidden data, decrypting files, decompressing data, cracking passwords, "crowbarring" an operating system (bypassing normal security controls and permissions), and so forth. For those who are old enough to remember the original Norton Utilities for DOS think of these modern tools as the original Norton Disk Editor for DOS on steroids.
  • 5. Listed below are some common categories and a few examples of computer forensics toolkits: File Viewers: Quick View Plus (http://www.jasc.com) Image Viewers: ThumbsPlus http://www.cerious.com) Password Crackers: l0phtcrack or LC4 (http://www.atstake.com) Format-independent Text Search: dtsearch (http://www.dtsearch.com) Drive Imaging: Norton Utilities' Ghost (http://www.symantec.com) Complete Computer Forensics Toolkits: Forensics Toolkit (http://www.foundstone.com); ForensiX (http://www.all.net); EnCase Forensic (http://www.encase.com) Forensic Computer Systems: Forensic-Computers (http://www.forensic- computers.com) One of the more full-featured network tools, NetScanTools Pro (http://www.netscantools.com). Note the abundance of features built into one product!
  • 6. Internet Forensics specialist uses many of the same tools and engages in the same set of practices as the person he/she is investigating. Let me illustrate with a few examples. Suppose that you've received some suspicious email, and want to verify the authenticity of a URL included within. A number of options are available. One might use a browser to access information from the American Registry for Internet Numbers (http://www.arin.net). Or one might use any number of OS utilities. But we'll save ourselves some time and worry, and use a general network appliance, NetScanTools Pro. We identified the registration, domain name servers, currency information, etc. for netscantools.com. Now let's change the scenario slightly. Suppose that we had some hostile intent, and wanted to ferret out information about some company's network infrastructure. What tool might we use? You guessed it, NetScanTools Pro. The point is that the self-same tool is equally useful to the hacker conducting basic network reconnaissance and the legitimate Internet security specialist who's trying to determine whether a URL links to a legitimate company or a packet "booby trap." The point is that, both uses require essentially the same skill sets.
  • 7. In Internet Forensics it is customarily the case that the forensic specialist undergoes the same level of education and training as the hacker he or she seeks to thwart. The difference is one of ethics, not skill. We observed that this was not true of the perpetrator and investigator in computer forensics. To drive home the point, look at the other options that NetScanTools Pro provides. One can use an ICMP "ping" to identify whether a particular network host is online just as easily as one can use it to identify activity periods in network reconnaissance or a network topology. One can use a Traceroute to determine network bottlenecks, or to identify intervening routers and gateways for possible man-in-the-middle attacks. One can use Port Probe to verify that a firewall is appropriately configured, or to make a list of vulnerable services on a host that may be exploited. Where computer forensics deals with physical things, Internet forensics deals with the ephemeral. The computer forensics specialist at least has something to seize and investigate. The Internet forensics specialist only has something to investigate if the packet filters, firewalls and intrusion detection systems were set up to anticipate the breach of security. But, if one could always anticipate the breach, one could always block it. Therein lies the art, and the mystery.
  • 8. If I've been successful, I've got you thinking about the fundamental differences between computer forensics and internet forensics. I think that on careful analysis, one has to conclude (a) that these are fundamentally different skills, (b) that in the case of Internet forensics, the skill sets of the successful perpetrator and successful investigator are pretty much the same, and (c) Internet forensics is as much a discipline as its search-and-seizure counterpart. This validity of these conclusions may be confirmed in any number of ways. For the most part the tools-of-the-trade for both hacker and Internet forensics specialist are the same, though the occasional extreme case like Dug Song's Dsniff http://monkey.org/~dugsong/dsniff challenges this generalization. It's hard for me to imagine a legitimate, lawful use of Dsniff's "macof" utility that enables the users to flood switch state tables! But in the main, the hacker and the Internet Forensics specialist could co- exist with the same tools and equipment.
  • 9. Statistics on Internet Fraud The Internet Crime Complaint Center (IC3), a joint venture of the FBI and the National White Collar Crime Center found: Online auction fraud was the most reported type of fraud and accounted for 44.9% of consumers’ complaints Non-delivered merchandise and/or payment made up 19.0% of complaints Check fraud represented 4.9% of complaints About 70% of the fraud victims were scammed through www (e.g. online auctions) About 30% of the victims were scammed by emails Payment Methods Top methods of payment used by victims of Internet fraud include: Wire Credit Card Bank Debit Money Order Check
  • 10. The average loss for all Internet frauds was $1,500. More than half of these losses occurred through auctions. So protect yourself from becoming the next victim of an auction fraud. Read the tips on how to prevent auction frauds from happening to you. Tips on How to Prevent Auction Frauds Learn as much as you can from the seller Read and examine the feedback on the seller Check the location of the seller. If the seller is abroad and a problem arises it will be harder to solve. Ask if shipping and delivery are included in the price so you receive no unexpected or additional costs. Refuse to give the seller your social security number or driver’s license number to prevent identity theft. In fact get used to saying “no” to information requests on the Internet.
  • 11. The Problem Corporate Espionage is the most cyber-criminal activity and at the same time, the least protected area of vulnerability. And it is not being conducted just by nation-states against USA businesses wither. The Gang of 10 hacking organizations cost American businesses an estimated $2-billion every year. This workshop is designed to identify the main and common areas of vulnerability and upon completion of this workshop, a ForensicsNation security consultant will visit each participating business to do an in depth analysis of specific vulnerabilities. We will cover specific areas of intrusion using historical data and modes of penetration gleamed from ForensicsNation files. We will take each item defined below one at a time.
  • 12. Workshop Contents Part 1: The hacker subculture and approach • An overview of the risks and threats • An insight into the hacker underground • The anatomy of a hack Part 2: TCP/IP fundamentals • TCP/IP and its relevance to hacking • TCP header, flags and options • UDP, ICMP and ARP • Network traffic dump analysis • Class exercises and lab sessions Part 3: Reconnaissance techniques • Selecting a target • Identifying target hosts and services • Network mapping techniques • Fingerprinting and OS determination • Scanning and stealth techniques • Class exercises and lab sessions
  • 13. Part 4: Compromising networks • Vulnerability cross referencing • Code auditing and insecure code examples • Exploiting network services • Sniffers, backdoors and root kits • Trojans and session hijacking • Denial of service attacks • Trust exploitation and spoofing • Buffer overflow techniques • Web page graffiti attacks • War dialers and dial-in hacking • Manipulating audit trails and security logs • Class exercises and lab sessions Part 5: Windows Applied Hacking • Windows components, Domains and structures • Remote information gathering • Scanning and banner checking • Selecting services to attack • Enumerating Windows information • Windows hacking techniques • Recent Windows vulnerabilities • Class exercises and lab sessions
  • 14. Part 6: Windows effective countermeasures • User account policies and group allocations • File and directory permissions • File and print shares • Hardening the registry • Domains and trust relationships • Securing network services • Windows antivirus strategies • Windows and Internet security • Windows auditing and security logs • Windows service packs and hot fixes • Class exercises and lab sessions Part 7: Unix applied hacking • Unix components • Unix variants • Remote and local information gathering • Scanning and fingerprinting • Selecting services to attack • Unix hacking techniques • Recent Unix vulnerabilities • Class exercises and lab sessions
  • 15. Part 8: Unix effective countermeasures • Unix password and group files • User account and password controls • Controlling command line access • File and directory permissions • SUID and SGID controls • Crontab security • Network and trust relationships • Securing network services • Unix antivirus strategies • Unix and Internet security • Unix auditing and security logs • Unix security patches • Class exercises and lab sessions Part 9: Network security strategies • Risk management and AS/NZS 4360 • Security management and AS/NZS 7799 • Developing a practical security strategy • Physical security and environmental controls • Personnel security and awareness training • Firewall risks and strategies
  • 16. • Intrusion detection system risks and strategies • An overview of ecommerce security issues • An overview of wireless security issues • An overview of PBX security issues • An overview of intrusion analysis techniques • An overview of forensics procedures • An overview of IT contingency planning • Class exercises and lab sessions Part 10: Advanced Security Techniques •Inventory of Authorized and Unauthorized Devices •Inventory of Authorized and Unauthorized Software •Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers •Continuous Vulnerability Assessment and Remediation •Malware Defenses •Application Software Security •Wireless Device Control •Data Recovery Capability
  • 17. •Security Skills Assessment and Appropriate Training to Fill Gaps •Secure Configurations for Network Devices such as Firewalls, Routers, and Switches •Limitation and Control of Network Ports, Protocols, and Services •Controlled Use of Administrative Privileges •Boundary Defense •Maintenance, Monitoring, and Analysis of Security Audit Logs •Controlled Access Based on the Need to Know •Account Monitoring and Control •Data Loss Prevention •Incident Response Capability •Secure Network Engineering •Penetration Tests and Red Team Exercises Bonus: Retina® Network Security Scanner from eEye.com Recognized as the best scanner on the market in terms of speed, ease of use, non-intrusiveness and advanced scanning capabilities
  • 18. ForensicsNation Protection Catalog We have taken the guess work out of identifying good quality products and the best prices by publishing our own catalog for your convenience. All of the products contained in our catalog are used by ForensicsNation everyday. Download your FREE catalog and begin protecting yourself and your loved ones Today. Go here for your FREE download: http://www.filefactory.com/f/04629606960c 0da3/
  • 19. Our Gift to You… Never in the course of history has the title of this book become so real, “You Can Run But You Cannot Hide!” With today’s technology, investigators of all types can now track your whereabouts in a way that simple astounds you. Learn all about cyber-forensics and the resources that we use to conduct all of our investigations Go here for your FREE download: http://www.filefactory.com/f/04629606960c 0da3/
  • 20. Privacy is a right! Your right to privacy is being eroded daily. But this particular right can have dire consequences for those that choose to ignore it. Remaining private and staying off the grid protects you and your loved ones from all sorts of cyber-crime. And the name of this game is PROTECTION! Most of the resources offered in this book are free so study this information carefully. Go here for your FREE download: http://www.filefactory.com/f/04629606960c 0da3/
  • 21. Corporate Mailing Address: 546 South Main Street Lock Box 304 Cedar City, Utah 84720 435-249-5600 435-867-1988 Fax support@neternatives.com http://ForensicsNation.com