Track and measure Social Media and Darknet through

Slides:



Advertisements
Similar presentations
Business Proposal to ETEN. Our Scopes Bring Fring to Chinese Market around the world with our PARTNERs devices Make Fring available EVERYWHERE on all.
Advertisements

Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
SOCIAL MEDIA. TODAY Business Today Social Media Importance What is Social Media Social Media Platforms Facebook & Twitter Accounts.
25 Need-to-Know Facts. Fact 1 Every 2 days we create as much information as we did from the beginning of time until 2003 [Source]Source © 2014 Bernard.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Top Objectives: 1.Increase web traffic and exposure 2.Become definitive authority on Coffee 3.Increase sales to coffee centric Food Service Operators 4.Engage.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
Dell Connected Security Solutions Simplify & unify.
Distribution & Sales Systems 14 th January Distribution & Online Marketing Tools.
Corporate Information Reconnaissance Cell (CIRC).
CONTENT DELIVERY NETWORKS
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Digital Marketing Strategy Fantastic Oceans Goal is to improve brand awareness and generate fundraising via the digital platforms - Facebook, Twitter,
Introduction We are India's leading directional media marketing company enabling SME discovery. Pioneers in discovery of platforms across B2B,B2C & C2C.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
FINDING THE EFFICIENT FRONTIER OF DIGITAL MARKETING NAVIS LEADERSHIP CONFERENCE 2016.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Hadoop in the Wild CMSC 491 Hadoop-Based Distributed Computing Spring 2016 Adam Shook.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
SocialBoards Self-Service, Multichannel Support Ticket Notifications in Microsoft Office 365 Groups Help Customer Care Teams to Provide Better Care OFFICE.
Securing Information Systems
Protect your Digital Enterprise
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Facebook privacy policy
BUILD SECURE PRODUCTS AND SERVICES
Thotwaves Innovations Welcome To SMM & SMO Activity Plan
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
TV Broadcasting What to look for Architecture TV Broadcasting Solution
Munix Overview Customer Profiling, Frequency Analysis, Location Mapping, Movement Analysis, VIP recognition, Time Analysis, and much more …. Internet Gateway.
SOCIAL MEDIA Etimesgut Halk Eğitim Merkezi - Ankara.
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
Agenda About Social Media Nexus Why is Free Wi-Fi important?
Munix Healthcare Customer Profiling, Frequency Analysis, Location Mapping, Movement Analysis, Web Classification, Time Analysis, and much more …. Internet.
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
Discovering Computers 2010: Living in a Digital World Chapter 14
BIG Data 25 Need-to-Know Facts.
Information Technology (IT) Department
Trends in my profession, Information Technology
ICT Communications Lesson 1: Using the Internet and the World Wide Web
Gain powerful insights into your print environment
Scalable Web Apps Target this solution to brand leaders responsible for customer engagement and roll-out of global marketing campaigns. Implement scenarios.
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Securing Information Systems
SocialBoards Self-Service, Multichannel Support Ticket Notifications in Microsoft Office 365 Groups Help Customer Care Teams to Provide Better Care OFFICE.
IS4550 Security Policies and Implementation
Microsoft Azure Platform Powers New Elements Constellation Software Suite to Deliver Invaluable Insights From Your Data for Marketing and Sales MICROSOFT.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
SOCIAL MEDIA Etimesgut Halk Eğitim Merkezi - Ankara.
Social Media and Networking: What it is & why it’s important
ACTi Sales Kit for TV Wall
KNOWLEDGE MANAGEMENT (KM) Session # 34
Technical Capabilities
GCSE OCR 3 A451 Computing Client-server and peer-to-peer networks
Business Intelligence
Digital Marketing Offerings
Digital Marketing Starter Course
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
ABOUT US AN INTELLIGENT, RESULT ORIENTED SYSTEM INTEGRATOR UTILIZING CUTTING EDGE TECHNOLOGIES DEEP EXPERTISE IN DESIGN ,SUPPLY, EXECUTION AND MAINTENANCE.
Information Technology and AISs
Canadian Apartment Properties Real Estate Investment Trust
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Cloud Computing for Wireless Networks
Presentation transcript:

Track and measure Social Media and Darknet through Network Visibility and Threat Intelligence Presented By :- George Ezzat CEO,EliteVAD RCSS Oman 21 Nov 2017

About EliteVAD

Introduction EliteVAD is a MEA regional Value Added IT Distributor of best breed edge solutions, covering technology areas of data networking, IT security, virtualization and Data Centre infrastructure. EliteVAD executes the latest outstanding innovations necessary to select the leading edge strategic vendors and technologies that can empower our partners / customers with a real added value. Copyright © 2015 EliteVAD

EliteVAD Added Value Consultancy Services Support Services Pre-Sales Post-Sales Pre-Sales

Digital Forensics | At a Glance Digital Crimes and Frauds are growing exponentially due to high proliferation of Digital Artifacts and communication technologies in our personal and professional lives. What happened? When did it happen? How did it happen? And Who did it? What we offer: Computer Forensics including Software and Hardware Solutions. Mobile Forensics for Phone and PDA Analysis. Network Forensics Solutions. Incidence & emergency response services and solutions. Forensic bit stream imaging of various digital storage devices. Data recovery products. Password recovery Solutions. Steganography detection Solutions. Corrupt operating system data retrieval. Image and Video Analysis & enhancements. Database Forensics. Malware analysis Products.

Types of Forensic Requests Lab Component Network Forensics Media and data Recovery Apple Forensics Malware Analysis Intrusion Analysis Damage Assessments Suspect Examination Tool Analysis Log File Analysis Evidence Search Image and Video Analysis Mobile Devices Forensics Main forensics investigation tools Password Recovery Incidence response Optical Media Investigation Browser Investigation Email Investigation

Forensics Transformation Social Media Forensics Device Forensics Cloud Forensics Network Forensics Dark Net Forensics PC / Mobile Copyright © 2015 EliteVAD

Government Forensic Level

What is a Security Incident Key risk areas :- Brand Reputation, Clients & Customers, Valuation, Financial Loss, Fraud, Physical Security, Intellectual Property Copyright © 2015 EliteVAD

The chart below, from Ponemon Institute, quantifies the average number of data breaches per country or region across the world. Ref:- https://www.helpnetsecurity.com/2017/06/21/average-data-breach-cost/4 Copyright © 2015 EliteVAD

Connecting Dots Real Time/Historical Forensic Investigation Social Networks Mobile no. And More Intelligence Geo Real Time/Historical Forensic Traffic and subscriber correlation DarkNet Intelligence Social Network Tactical details

Technology aggregation network element Target Architecture PREs are deployed in different sites used for internet peering Using Flowsync protocol, minimum bandwidth is used between sites to handle asymmetric traffic. Flowsync requires maximum 5% of the asymmetric traffic as bandwidth between sites This architecture ensures efficient usage of resources on the 3rd party system as only target traffic is mirrored Modem 1st site 2nd site PRE PRE 3rd party system RAN Technology aggregation network element Router Flowsync Wireless Router PRE Internet 3rd site

LiveView Real-time visualization of all traffic call “LiveView” View data by configured hierarchy Example: by Network -> AP -> frequency -> channel Drill down into subscriber and flow level

Darknet Intelligence

Social Network intelligence Solution Social Users’ Activities in all Networks

Business Dimension We provides: Why this is hard: Collect Social Data from all customer touch points – 360° view We provides: Intelligence on Facebook and Twitter social networks Have unique analysis for Arabic and Franco Arab Online solution for people searching , monitoring and Analytics Why this is hard: Massive data (Volume) Different Channels (Velocity) Difficult to break Security for Private data

Product features & work cycle Search By: - Name - Or Mobile - Or Picture - Store public and private data (Friends, posts, replies, Mobile ..etc.) Identify User’s interests - Analyze all public and private posts or tweets - Match mutual friends - Create Black lists and also black posts Monitor Instantaneous real time data - Over huge tunnels of data, OverOTT analysis system can interact to captures required data Integration and interact with Social media - One of best business case to interact with different groups that influence others users behavior or thoughts. Users Tagging

Search over Social Media Search By: Name Or Mobile And Picture By intelligent image processing identify the user that make it the key over all other social media channels Store public and private data (Friends, photos, replies, posts, Mobile, personal information ..etc.) All Search results show Mobile ,, select user for more info. System will auto Categorize/Tag the user (Showing in color) System is storing all data for offline or online use and also ensure run time process as well.

Identify User’s interests Analyze all public and private posts or tweets Match mutual friends Find at least one friend of his who has a public friends list so that we can look at their mutual friends. Match pictures and names on Facebook with similar accounts on twitter or google or LinkedIn. Create Black lists based on user’s behavior Create black posts based on Posts analysis

Thank you Website: www.elitevad.com Email: info@elitevad.com