Enviar pesquisa
Carregar
File000155
•
1 gostou
•
587 visualizações
Desmond Devendran
Seguir
Tecnologia
Vista de apresentação de diapositivos
Denunciar
Compartilhar
Vista de apresentação de diapositivos
Denunciar
Compartilhar
1 de 28
Baixar agora
Baixar para ler offline
Recomendados
File000159
File000159
Desmond Devendran
File000154
File000154
Desmond Devendran
File000158
File000158
Desmond Devendran
File000161
File000161
Desmond Devendran
File000165
File000165
Desmond Devendran
File000146
File000146
Desmond Devendran
File000145
File000145
Desmond Devendran
SEO2India - Cyber crime
SEO2India - Cyber crime
SEO2India - Devang Barot - SEO2India
Recomendados
File000159
File000159
Desmond Devendran
File000154
File000154
Desmond Devendran
File000158
File000158
Desmond Devendran
File000161
File000161
Desmond Devendran
File000165
File000165
Desmond Devendran
File000146
File000146
Desmond Devendran
File000145
File000145
Desmond Devendran
SEO2India - Cyber crime
SEO2India - Cyber crime
SEO2India - Devang Barot - SEO2India
Cyber crime law libreoffice
Cyber crime law libreoffice
solomon24
Law of-cybercrime
Law of-cybercrime
shiela mae dupa
Cybercrime law legality report
Cybercrime law legality report
Jonan Momo
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
Darius Whelan
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
Mohammed Mahfouz Alhassan
Computer misuse and criminal law
Computer misuse and criminal law
Zaheer Irshad
National framework for digital forensics bangladesh context
National framework for digital forensics bangladesh context
Bank Alfalah Limited
Cybercrime
Cybercrime
Mayank Garg
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
sohaildanish
A Tale of One City
A Tale of One City
Felicia Nelson
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Muhammad Zubair
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz new
eyavagal
Traditional problem associated with cyber crime
Traditional problem associated with cyber crime
vishalgohel12195
Chapter14
Chapter14
SUNY Ulster
Computer crime
Computer crime
Uc Man
Computer crime
Computer crime
Vinil Patel
Computer crime
Computer crime
Anika Rahman Orin
Computer Crimes
Computer Crimes
Ivy Rose Recierdo
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Ethisphere
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
armaexen
Tech Topic Privacy
Tech Topic Privacy
netapprad
Hacking
Hacking
thajmohammed
Mais conteúdo relacionado
Mais procurados
Cyber crime law libreoffice
Cyber crime law libreoffice
solomon24
Law of-cybercrime
Law of-cybercrime
shiela mae dupa
Cybercrime law legality report
Cybercrime law legality report
Jonan Momo
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
Darius Whelan
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
Mohammed Mahfouz Alhassan
Computer misuse and criminal law
Computer misuse and criminal law
Zaheer Irshad
National framework for digital forensics bangladesh context
National framework for digital forensics bangladesh context
Bank Alfalah Limited
Cybercrime
Cybercrime
Mayank Garg
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
sohaildanish
A Tale of One City
A Tale of One City
Felicia Nelson
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Muhammad Zubair
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz new
eyavagal
Traditional problem associated with cyber crime
Traditional problem associated with cyber crime
vishalgohel12195
Chapter14
Chapter14
SUNY Ulster
Computer crime
Computer crime
Uc Man
Computer crime
Computer crime
Vinil Patel
Computer crime
Computer crime
Anika Rahman Orin
Computer Crimes
Computer Crimes
Ivy Rose Recierdo
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Ethisphere
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
armaexen
Mais procurados
(20)
Cyber crime law libreoffice
Cyber crime law libreoffice
Law of-cybercrime
Law of-cybercrime
Cybercrime law legality report
Cybercrime law legality report
Prosecuting Cybercrime and Regulating the Web
Prosecuting Cybercrime and Regulating the Web
Computer and Cyber forensics, a case study of Ghana
Computer and Cyber forensics, a case study of Ghana
Computer misuse and criminal law
Computer misuse and criminal law
National framework for digital forensics bangladesh context
National framework for digital forensics bangladesh context
Cybercrime
Cybercrime
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
A Tale of One City
A Tale of One City
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz new
Traditional problem associated with cyber crime
Traditional problem associated with cyber crime
Chapter14
Chapter14
Computer crime
Computer crime
Computer crime
Computer crime
Computer crime
Computer crime
Computer Crimes
Computer Crimes
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Clash of Compliance: Global Anti-Corruption Considerations When Foreign Laws ...
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Semelhante a File000155
Tech Topic Privacy
Tech Topic Privacy
netapprad
Hacking
Hacking
thajmohammed
CS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
CS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
Cyber crime
Cyber crime
dixitas
Cyber Crime
Cyber Crime
Accenture
Cyber crime ppt
Cyber crime ppt
Ritesh Thakur
cyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdf
ArifAhmad83
Cyber Security Training in Office Environment
Cyber Security Training in Office Environment
elijahj01012
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Eric Vanderburg
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
Amity University | FMS - DU | IMT | Stratford University | KKMI International Institute | AIMA | DTU
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Shumail Tariq
Edu 03 assingment
Edu 03 assingment
Aswani34
TSCM Overview for Stakeholders
TSCM Overview for Stakeholders
kevinwetzel
Mis chapter 9
Mis chapter 9
Filmon Habtemichael Tesfai
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
smile790243
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
Raj Goel
02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
Cyber forensic 1
Cyber forensic 1
anilinvns
Data privacy over internet
Data privacy over internet
devashishicai
Semelhante a File000155
(20)
Tech Topic Privacy
Tech Topic Privacy
Hacking
Hacking
CS6004 Cyber Forensics
CS6004 Cyber Forensics
CS6004 Cyber Forensics
CS6004 Cyber Forensics
Cyber crime
Cyber crime
Cyber Crime
Cyber Crime
Cyber crime ppt
Cyber crime ppt
cyber_crime_investigation_ppt.pdf
cyber_crime_investigation_ppt.pdf
Cyber Security Training in Office Environment
Cyber Security Training in Office Environment
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
Edu 03 assingment
Edu 03 assingment
TSCM Overview for Stakeholders
TSCM Overview for Stakeholders
Mis chapter 9
Mis chapter 9
LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
02 fundamental aspects of security
02 fundamental aspects of security
Cyber forensic 1
Cyber forensic 1
Data privacy over internet
Data privacy over internet
Mais de Desmond Devendran
Siam key-facts
Siam key-facts
Desmond Devendran
Siam foundation-process-guides
Siam foundation-process-guides
Desmond Devendran
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
Desmond Devendran
Enterprise service-management-essentials
Enterprise service-management-essentials
Desmond Devendran
Service Integration and Management
Service Integration and Management
Desmond Devendran
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
Desmond Devendran
CHFI 1
CHFI 1
Desmond Devendran
File000176
File000176
Desmond Devendran
File000175
File000175
Desmond Devendran
File000174
File000174
Desmond Devendran
File000173
File000173
Desmond Devendran
File000172
File000172
Desmond Devendran
File000171
File000171
Desmond Devendran
File000170
File000170
Desmond Devendran
File000169
File000169
Desmond Devendran
File000168
File000168
Desmond Devendran
File000167
File000167
Desmond Devendran
File000166
File000166
Desmond Devendran
File000164
File000164
Desmond Devendran
File000163
File000163
Desmond Devendran
Mais de Desmond Devendran
(20)
Siam key-facts
Siam key-facts
Siam foundation-process-guides
Siam foundation-process-guides
Siam foundation-body-of-knowledge
Siam foundation-body-of-knowledge
Enterprise service-management-essentials
Enterprise service-management-essentials
Service Integration and Management
Service Integration and Management
Diagram of iso_22301_implementation_process_en
Diagram of iso_22301_implementation_process_en
CHFI 1
CHFI 1
File000176
File000176
File000175
File000175
File000174
File000174
File000173
File000173
File000172
File000172
File000171
File000171
File000170
File000170
File000169
File000169
File000168
File000168
File000167
File000167
File000166
File000166
File000164
File000164
File000163
File000163
Último
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Principled Technologies
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Último
(20)
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
File000155
1.
Module XLII -
Investigating Computer Data Breaches
2.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Hacker Accesses UF Dental Patient Data Source: http://www.gatorsports.com/ By Nathan Crabbe Published: Thursday, November 13, 2008 at 6:01 a.m. A hacker accessed a University of Florida College of Dentistry computer server containing personal information of more than 344,000 current and former dental patients, UF announced Wednesday. The information included names, addresses, birth dates, Social Security numbers and dental procedure information for patients dating back to 1990. College staff members discovered the breach Oct. 3 while upgrading the server, finding that unauthorized software had been installed on it from a location outside the university. UF officials have no evidence at this time that the hacker used the information for fraudulent purposes, said Melanie Fridl Ross, a spokeswoman for UF's Health Science Center. "It's sort of like someone coming home and finding that their door is open, but it's unclear if any valuables have been taken," she said. FBI and University Police officers are investigating. Letters were mailed Monday to alert 336,234 patients about the breach. The university is seeking addresses for another 8,248 patients with data on the server. A hot line, 1-866-783-5883, has been established for patient questions. Patients can call the hot line to find out exactly what information was contained on the server, Ross said. College of Dentistry Dean Teresa Dolan said the college keeps electronic records of dental procedures, but not on medications or chronic illnesses. The breach involved patient information from the college's clinics on the main UF campus, the east side of Gainesville, and in Hialeah and Jacksonville, she said. Medical identity theft is a growing problem, said Paul Stephens, director of policy and advocacy for the San Diego-based nonprofit Privacy Rights Clearinghouse.
3.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited News: Extortion Used in Prescription Data Breach Source: http://www.washingtonpost.com/ FBI Investigating Threat Against Express Scripts Customers By Brian Krebs Saturday, November 8, 2008; Page D01 One of the nation's largest processors of pharmacy prescriptions said this week that extortionists are threatening to disclose personal and medical information about millions of Americans if the company fails to meet payment demands. St. Louis-based Express Scripts said Thursday that in early October it received a letter that included the names, birth dates, Social Security numbers and, in some cases, prescription data on 75 of its customers. The authors threatened to expose millions of consumer records if the company declined to pay up, Express Scripts said in a statement. Chief executive George Paz said in the statement that Express Scripts has no intention of paying and that his company is working with the FBI to track down those responsible for the scam. Express Scripts is the third-largest U.S. pharmacy benefit management firm, which processes and pays prescription drug claims. Working with more than 1,600 companies, it handles roughly 500 million prescriptions a year for about 50 million Americans. Express Scripts has notified its clients of the threat. Fairfax County Public Schools yesterday sent a letter to employees alerting health-plan participants who use Express Scripts to the breach. "FCPS is deeply concerned about this kind of breach, which could adversely affect our employees," Superintendent Jack D. Dale said in the letter. "We expect and deserve the highest level of security when we entrust our vendors to handle our employees' personal information." The letter was delivered by mail, said company spokesman Steve Littlejohn. He declined to say how much money the extortionists were demanding. He added that the company is trying to determine how the data were stolen. "We know where the data came from by looking at it, but precisely how it was accessed is still part of the investigation," Littlejohn said.
4.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Objective • How Computer Data Breaches Occur • Investigating the Local Machine • Investigating the Network • Countermeasures This module will familiarize you with:
5.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Module Flow How Computer Data Breaches Occur Investigating the Local Machine Investigating the Network Countermeasures
6.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited How Data Breaches Occur
7.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Using the External Memory Devices Data can be stolen using external memory devices External memory devices are available with a capacity of 64 MB to 250 GB USB ports are used to transfer the data External hard disks can be used to copy the complete hard disk data CD/DVD’s are used to burn the important data
8.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Using the Internet • Sending files through email • Sharing files through webhosting services • Uploading files in FTP servers • Transferring files using IMs Internet is used for the breaches listed below:
9.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Using Cell Phones and iPods Mobile phones come with external memory where the data can be stored up to 32GB Data can be carried using such mobile phones iPods are also used to carry important files
10.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Using Malware Malware includes computer viruses, worms, Trojan horses, rootkits, spyware, dishonest adware, and other malicious and unwanted software Trojans and rootkits are used to steal the sensitive data Using malware, attackers can gain access and remotely access the victim’s system
11.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Others Techniques • These techniques can be used to encrypt the information and hide the communication so that it becomes difficult to detect data leakage Cryptography and Steganography techniques: • Attackers or insiders may change the file extensions so that the data files may appear to be some other type of file, for example a .xls extension may be changed to a .jpg extension to hide the data theft Changing the file extension types:
12.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Local Machine
13.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the Registry Editor Registry editor should be checked for any external memory devices used Tools such as USBDeview, MyUSBOnly can be used to check the name, date, and time of external memory devices used
14.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check For CD/DVD Burning Software Check the local machine for any CD/DVD burning software installed Check for the recent projects in such software Collect the information such as data burnt, time, and user
15.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check for Browsing History Web browsers are a vital key for interacting with the Internet Check the local machine’s browsing history Cache may contain the temporary web page files Cookies contain stored database session or some other piece of information Tool ‘Cookie Viewer’ discovers the information that web sites store on the user’s computer
16.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the Downloads Check the local machine download history whether the user has downloaded any FTP clients, IMs, or any other software Using the browsing and downloads history, the information regarding the FTP clients, web hosting services, and IMs are known
17.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the Email History Check for suspicious mail in sent mail history Check the attachments for such email Check the trash for the deleted files
18.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check for Suspicious Software Check the local machine for any mobile drivers installed Check for any data encryption, cryptography, and steganography software Magic Lantern software allows agents to decode the hard to break encrypted data of the criminal suspects
19.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Investigating Network
20.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the Firewall Check the firewall where individual browsing details are logged • Sites visited • Downloads Check the amount of data transferred from a particular IP address Check the router logs
21.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the Mail Server Check the mail server for all the incoming and outgoing emails Open and check the attachments Collect the email IDs where the data is transferred
22.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Check the Printers Check the printer for any data has been taken in the form of print outs
23.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Countermeasures
24.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Countermeasures Create different accounts such as admin, guest, and user to provide limited access Ensure critical data files are backed up and the backups are securely stored in another location Establish policies and procedures for computing and file access Disable the USB ports
25.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Countermeasures (cont’d) Install anti-virus and update it regularly Install Email, USB, and IM monitoring software Implement administrative, physical, and technical controls Train employees to safeguard the data
26.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary Data can be stolen using external memory devices Files can be shared through emails and webhosting services Cryptography and Steganography techniques are used to send the data Cookies contain stored database session or some other piece of information Check the local machine download history whether the user has downloaded any FTP clients, IMs, or any other software Check for any data encryption, cryptography, and steganography software Check the mail server for all the incoming and outgoing mails Create different accounts such as admin, guest, and user to provide limited access
27.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
28.
EC-Council Copyright © by
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Baixar agora