Forensics Tools for Social Network Security Vishal Almeida, Andrew Karnbad, Palak Shah, & Steve Kim Project Description: We have focused on two primary.

Slides:



Advertisements
Similar presentations
5/30/2012. Provides a method for finding services/data on the Exchange Network – discover data. Supports User Friendly Tools Can automatically collect.
Advertisements

PC Client Training Customer Name © 2010 CYPRESS COMMUNICATIONS, INC. 1.
DMZ (De-Militarized Zone)
Chapter 13 Network Design and Management
Institute of Technology Sligo - Dept of Computing Layer 7 The Application Layer Chapter Review.
A Computation Management Agent for Multi-Institutional Grids
Chapter 12 Network Security.
Slides for Grid Computing: Techniques and Applications by Barry Wilkinson, Chapman & Hall/CRC press, © Chapter 1, pp For educational use only.
+ Team Members Evaluation and Implementation of Web 2.0 Technologies in Support of CReSIS Polar and Cyberinfrastructure Research Projects at Elizabeth.
1 Virtual Forensics Lab Steve Kim (Client) Marilyn Silva Rajeswari Ian Anu Nagpal Anthony Glover 1.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
VCT May 20, 2009 Sapna Blesson Advisor: Dr.Christopher Pollett.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
1 Introduction to OBIEE: Learning to Access, Navigate, and Find Data in the SWIFT Data Warehouse Lesson 2: Logging in and out of OBIEE This course, Introduction.
We use EZProxy, a proxy server software recently bought by OCLC. Proxy server.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Proxy servers By Akshit Y10. What is a proxy server O A proxy server is a computer that offers a computer network service to allow clients to make indirect.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
For more notes and topics visit:
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
EBSCOadmin. Select Change Password Select EBSCOadmin Security.
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Tutorial 1: Getting Started with Adobe Dreamweaver CS4.
Chapter 9: Novell NetWare
Information systems and management in business Dr Ali H Higgi Information systems and management in business Chapter 3 Electronic Business and Business.
An Introduction to IBM Systems Director
CORE 2: Information systems and Databases CENTRALISED AND DISTRIBUTED DATABASES.
CPT 123 [299] Internet Skills Overview of the Internet Session One Class Notes DMWilliamson 1998.
Session 1.  Websites  Mobile Websites  WordPress Security  Reputation Marketing  Coming Soon ◦ Contractor Software ◦ Facebook Pages ◦ Mobile Apps.
Chapter 7 IS630. Project Design  Technical Design & Specification Network and System Architecture & Design Software System Architecture & Design  Database.
Protecting Students on the School Computer Network Enfield High School.
Module 9: Fundamentals of Securing Network Communication.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
To create an Endnote Online account Step 1 : From Library home page, click on Databases tab.
Attack Tool Repository and Player for ISEAGE May06-11 Abstract Today’s world is changing shape as it increases its dependency on computer technology. As.
Johnson Lab Database Senior Design Project Management II Spring 06 Mark Nelson.
Splashtop Whiteboard Setting up your account. Open up Splashtop Whiteboard on your computer Your first time you will need to create a Splashtop Account.
Search Tools and Search Engines Searching for Information and common found internet file types.
INTRODUCTION to MIS 12/24/20151 Introduction To MIS Component Overview.
Attention After changing your internet browser (proxy) settings, you can only access those web sites allowed/directed by KHU Library. In order to browse.
CRS Helpdesk Software Presented By The Systems House Inc.
Module 10: Windows Firewall and Caching Fundamentals.
CPT 499 Internet Skills for Educators Overview of the Internet Session One.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Teachers must identify the site in order to let the students use it.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Module 14: Advanced Topics and Troubleshooting. Microsoft ® Windows ® Small Business Server (SBS) 2008 Management Console (Advanced Mode) Managing Windows.
Interaction classes Record context Custom lookups.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Contents Software components All users in one location:
Understanding The Computer Login Account
Tor Good + Evil.
File Transfer Protocol
NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS
This sprint should be used for focusing on:
An Introduction to Cloud Computing
Serpil TOK, Zeki BAYRAM. Eastern MediterraneanUniversity Famagusta
Firewall.
Module 1: Overview of Systems Management Server 2003
How do I complete an application form?
Client/Server Computing and Web Technologies
Presentation transcript:

Forensics Tools for Social Network Security Vishal Almeida, Andrew Karnbad, Palak Shah, & Steve Kim Project Description: We have focused on two primary areas of concern. 1.Facebook security 2.A tool which will produce a type of IP address and country of origin of an IP address. Project Specifications: Software built on ASP.NET platform will cull various online sources to provide real-time results. Online sources will include TOR nodes, anonymous proxy sites, and country of origin of allocated IP address. Current concerns of Facebook security including user abilities to limit exposure. crawlers by determining the authenticity

Components Built: An ASP.NET program which presents the user with a simple interface to enter in an IP address. Once information is entered a process will query either a local back-end database or cull online sources for matches in the categories listed below. Known TOR (The Onion Router) Clients Anonymous proxies Known Proxy IPs with Country of origin

Outlook of prototype to get type of IP address and country of origin

TOR Network Status Screen Shot

Ways to Facebook Security Facebook is launching one-time passwords to make it secure to use public computers at places like hotels, cafes or airports. The ability to sign out of Facebook remotely is now available to everyone.