SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
New application of Mind Mapping automation
in information security log analysis - AdwCleaner

Image courtesy of Stuart Miles
/ FreeDigitalPhotos.net
Applications of Mind Mapping automation
in the analysis of security logs
Initial presentation Endpoint Protector

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
AdwCleaner
This is a free software to find and remove:
•
•
•
•

Adware
PUP / LPI
Toolbars
Highjackers

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
AdwCleaner

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Problem: Laptop infected with Nation Zoom

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Report generated by AdwCleaner

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Mind Mapping version of the report

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Header

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Services

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Folders

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Files

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Direct Access

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Registry

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Browsers

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
APPLICATION OF FILTERS

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
NATION ZOOM

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Nation Zoom related information

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Filtered Mind Map after callouts and
relationship have been added

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Another possible problem

NCH SOFTWARE

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Folders and Files

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Registry and Direct Access

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
ELEMENTS RELATED TO A USER

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Files and Browsers

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
Direct Access

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml
(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml

Image courtesy of Stuart Miles
/ FreeDigitalPhotos.net
Contact Information
José M. Guerrero
jm@infoseg.com
Slideshare Presentations
Linkedin profile

(C) Infoseg 2014
http://www.infoseg.com/mi_01_en.shtml

Mais conteúdo relacionado

Semelhante a Another application of Mind Mapping automation in security logs analysis

Semelhante a Another application of Mind Mapping automation in security logs analysis (20)

Applications of Mind Mapping automation in the analysis of information securi...
Applications of Mind Mapping automation in the analysis of information securi...Applications of Mind Mapping automation in the analysis of information securi...
Applications of Mind Mapping automation in the analysis of information securi...
 
Av is dead long live managed endpoint security
Av is dead   long live managed endpoint securityAv is dead   long live managed endpoint security
Av is dead long live managed endpoint security
 
Mind Mapping in Personal Health Record (PHR)
Mind Mapping in Personal Health Record (PHR)Mind Mapping in Personal Health Record (PHR)
Mind Mapping in Personal Health Record (PHR)
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptx
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
 
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
Keynote WFIoT2019 - Data Graph, Knowledge Graphs Ontologies, Internet of Thin...
 
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptxEmphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
Current vacancies August 2014
Current vacancies August 2014Current vacancies August 2014
Current vacancies August 2014
 
New Patch Automation Capabilities in EPM 2020.1
New Patch Automation Capabilities in EPM 2020.1New Patch Automation Capabilities in EPM 2020.1
New Patch Automation Capabilities in EPM 2020.1
 
Minds mechanical
Minds mechanicalMinds mechanical
Minds mechanical
 
ZRT - Pentest Project Management & Report Automation Tool
ZRT - Pentest Project Management & Report Automation ToolZRT - Pentest Project Management & Report Automation Tool
ZRT - Pentest Project Management & Report Automation Tool
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
Current vacancies September 2014
Current vacancies September 2014Current vacancies September 2014
Current vacancies September 2014
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
The 6th Element in the Mobile Application Lifecycle
The 6th Element in the Mobile Application LifecycleThe 6th Element in the Mobile Application Lifecycle
The 6th Element in the Mobile Application Lifecycle
 
The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...The Art of defence: How vulnerabilites help shape security features and mitig...
The Art of defence: How vulnerabilites help shape security features and mitig...
 
Know Your Attacker - Core Security
Know Your Attacker - Core SecurityKnow Your Attacker - Core Security
Know Your Attacker - Core Security
 
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
 
V4I5201571
V4I5201571V4I5201571
V4I5201571
 

Mais de José M. Guerrero

Mais de José M. Guerrero (20)

Mind Mapping and Artificial Intelligence.pdf
Mind Mapping and Artificial Intelligence.pdfMind Mapping and Artificial Intelligence.pdf
Mind Mapping and Artificial Intelligence.pdf
 
Applications of mind mapping to LODLAM
Applications of mind mapping to LODLAMApplications of mind mapping to LODLAM
Applications of mind mapping to LODLAM
 
NLU-MAP. IBM Watson NLU with Mind Mapping automation
NLU-MAP. IBM Watson NLU with Mind Mapping automationNLU-MAP. IBM Watson NLU with Mind Mapping automation
NLU-MAP. IBM Watson NLU with Mind Mapping automation
 
Mapas mentales en Bibliotecología y Medicina. CREATIBI. La Habana 2017
Mapas mentales en Bibliotecología y Medicina. CREATIBI. La Habana 2017Mapas mentales en Bibliotecología y Medicina. CREATIBI. La Habana 2017
Mapas mentales en Bibliotecología y Medicina. CREATIBI. La Habana 2017
 
Mind mapping to visualize complex information generated by IBM Watson
Mind mapping to visualize complex information generated by IBM WatsonMind mapping to visualize complex information generated by IBM Watson
Mind mapping to visualize complex information generated by IBM Watson
 
Hospital Discharge Instructions using Mind Mapping
Hospital Discharge Instructions using Mind MappingHospital Discharge Instructions using Mind Mapping
Hospital Discharge Instructions using Mind Mapping
 
Introducción a la Técnica de Mapas Mentales
Introducción a la Técnica de Mapas MentalesIntroducción a la Técnica de Mapas Mentales
Introducción a la Técnica de Mapas Mentales
 
Automating the conversion of Microsoft Dynamics CRM information into mind maps
Automating the conversion of Microsoft Dynamics CRM information into mind mapsAutomating the conversion of Microsoft Dynamics CRM information into mind maps
Automating the conversion of Microsoft Dynamics CRM information into mind maps
 
Strange ideas usually associated with mind mapping
Strange ideas usually associated with mind mappingStrange ideas usually associated with mind mapping
Strange ideas usually associated with mind mapping
 
Mind Mapping for Health - #IOBMC2015
Mind Mapping for Health - #IOBMC2015Mind Mapping for Health - #IOBMC2015
Mind Mapping for Health - #IOBMC2015
 
Reading and Analyzing Scientific Articles using Mind Mapping
Reading and Analyzing Scientific Articles using Mind MappingReading and Analyzing Scientific Articles using Mind Mapping
Reading and Analyzing Scientific Articles using Mind Mapping
 
Mind Mapping for Health - Master Class - Doctors 2.0 & You - Paris 2015
Mind Mapping for Health - Master Class - Doctors 2.0 & You - Paris 2015Mind Mapping for Health - Master Class - Doctors 2.0 & You - Paris 2015
Mind Mapping for Health - Master Class - Doctors 2.0 & You - Paris 2015
 
SBAR with mind mapping automation
SBAR with mind mapping automationSBAR with mind mapping automation
SBAR with mind mapping automation
 
Inventario para Seguros de Hogar
Inventario para Seguros de HogarInventario para Seguros de Hogar
Inventario para Seguros de Hogar
 
Book "Introduction to the Applications of Mind Mapping in Medicine"
Book "Introduction to the Applications of Mind Mapping in Medicine"Book "Introduction to the Applications of Mind Mapping in Medicine"
Book "Introduction to the Applications of Mind Mapping in Medicine"
 
Drug interactions with Mind Mapping automation
Drug interactions with Mind Mapping automationDrug interactions with Mind Mapping automation
Drug interactions with Mind Mapping automation
 
Mind Mapping automation in the visualization of recipes of a culinary database
Mind Mapping automation in the visualization of recipes of a culinary databaseMind Mapping automation in the visualization of recipes of a culinary database
Mind Mapping automation in the visualization of recipes of a culinary database
 
Medicine labels as Mind Maps
Medicine labels as Mind MapsMedicine labels as Mind Maps
Medicine labels as Mind Maps
 
Mind Mapping automation in the visualization of SAP information
Mind Mapping automation in the visualization of SAP informationMind Mapping automation in the visualization of SAP information
Mind Mapping automation in the visualization of SAP information
 
Mind Mapping automation in Management Reporting applied to a hospital Admissi...
Mind Mapping automation in Management Reporting applied to a hospital Admissi...Mind Mapping automation in Management Reporting applied to a hospital Admissi...
Mind Mapping automation in Management Reporting applied to a hospital Admissi...
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Another application of Mind Mapping automation in security logs analysis