Cyber Crime & Investigation IT Security Consultant

Slides:



Advertisements
Similar presentations
Decision Group Forensics Investigation Toolkit (FIT) Layer 7 Content Reconstruction Tool.
Advertisements

Internet Contracting Estimating and Accounting System ICEAS Multi-Client Software Presented By: I C E A S.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
BalaBit Shell Control Box
E-Detective Series of Products Presentation (2009) Decision Group
Lawful Interception & Packet Forensics Analysis System Casper Kan Chang Decision Group June 2010.
The innovative Voice Logging solution for smaller capacity requirements.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
CONDO MANAGER The Leader in Association Accounting and Management Software Mailing Address: P.O. Box Charlotte, North Carolina Web Site
Introduction to Cyber Crime Investigation Course Conducted in English Institute for Information Industry Decision Group.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Network Forensics and Lawful Interception Total Solutions Provider
Decision Group Inc Contents Introduction and Company Brief Corporate Milestones Globalized Company Solution and Technology Solution Position in.
DECISION GROUP The Pioneer of IT Forensics Taipei, Germany, Hong Kong, Singapore.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
ATM Surveillance Solution. LIST Outline & Key Point 1 Solution 1, 2, 3 2 ATM Surveillance Program – E-MAP 33 Conclusion 44.
Network security policy: best practices
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
DECISION Group Inc.. Decision Group Mediation Device for Internet Access Provider.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
1 Emerging Knowledge-Based Business Models Robert M. Shapiro, CEO Meta Software Corporation.
The Internetworked E-Business Enterprise
Technology and Method behind Cross-border
Market Analysis Decision Group.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Lawful Interception & Packet Forensics Analysis System for Telecom and ISP Special promotion:- EDDC : Off-line Packet Reconstruction & Network Forensics.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
What is FORENSICS? Why do we need Network Forensics?
HCIMA Unit 3 The Internet Revolution and Electronic Tools Next slide.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Decision Group Inc. E-DETECTIVE Decision Group Inc.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group
Mission Statement The mission of NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention,
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
E-Detective Network Investigation Toolkit - NIT (2010) Decision Group
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Policies and Security for Internet Access
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Office of Technical Assistance (OTA)1 Financial Intelligence Unit Development and the application of technology.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group
Critical Security Controls
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
Track and measure Social Media and Darknet through
Aston iTF Hosted on Microsoft Azure Helps Finance Departments Optimize Accounts by Developing Customer Receivables and Outstanding Invoices Partner Logo.
CORPORATE PROFILE JUNE 2016
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Who Uses Encryption? Module 7 Section 3.
Big Red Cloud Offers a Simple Online Accounts Solution for Business Owners and Bookkeepers Hosted on the Powerful Microsoft Azure Platform MICROSOFT AZURE.
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Unit# 5: Internet and Worldwide Web
Beyond FTP & hard drives: Accelerating LAN file transfers
User Guide ©CEFRIO 2018 – PROGRAMME EDNET 1
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Cyber Crime & Investigation IT Security Consultant Presented by: Arnel C. Reyes IT Security Consultant

Fast Growth of Cyber Crime Converged Telecom and Information Technologies Frequent Transnational Communication Highly Organized and Globalized Management of Crime Rings Ineffective Investigation with Joint Effort of Multi-countries

Globalized Cyber Crime Where is the swindler? Cloud Computing = Network Computing Through Internet, computers can cooperate with each other, or services are available more far-reaching...

Globalized Cyber Crime Source: http://www.darkgovernment.com/news/fbi-warning-cyber-threat-bigger-than-ever

Common Cyber Crime Features Criminals Internet Technical Skills Criminal Model Emerging ICT Technologies Internet as primary criminal tools, places, or targets New Converged ICT Technologies High technical skill at all online and network services Predict and profile the characteristics of unknown criminal subjects or offenders

Investigation on Criminals e-Positioning Tracking Monitoring Lawful Intercept Victim & Witness Interview Interrogation Database Lookup Warrant & Confiscation Traditional investigation on criminals is commonly applied in cyber crime events quite often.

Difficulties of Investigation How to Identify Criminal Hard to Conduct Analysis of Large Volume of Data Hard to Track Transnational Communication Hard to Maintain Integrity of Data Hard to Locate Network Route Hard to Identify Anonymity or Dummy Account

Different Investigation Processes

Process Flow for Cyber Investigation Follow-up investigation on related targets & evidence and hunting for clues from other members to combat all gangsters Clues, informer, case claim, daily crime information collection and integration, sourcing Primary Data Sourcing Primary Data Study & Deeper Source Collection Further Investigation Suspects Arrest & Evidence Collection Follow-up Study primary data, cross check databases in Police Department, Google on Internet and confirm crime type in order to prepare investigation Arrest all suspects, confiscate all evidences, check all computers, telephone record, booking record etc... Phone record, lawful intercept, tracking, location positioning, knowledge of crime organization and members

e-Detective Tactical Server Best Tactical Solution for: Network Protocol Decoding and Content Reconstruction Auditing and Record Keeping with ISO 27001, SOX, HIPPA etc… Internet Surveillance/Monitoring & Network Behavior Recording Forensics Analysis and Cyber Investigation E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes and reconstructs various types of Internet traffic. It is commonly used for organization for Internet behavioral monitoring, auditing, record keeping, forensics analysis and investigation as well as for legal and lawful interception by law enforcement agencies (LEA) such as Police Intelligence, Military Intelligence, Cyber Security Department, National Security Agencies, Criminal Investigation Agencies, Counter Terrorism Agencies etc. It also provides compliance solution for many standards or acts like Sarbanes Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA), Gramm–Leach–Bliley Act (GLBA), Securities and Exchange Commission (SEC), National Association Of Securities Dealers (NASD), E-Discovery and many others local customized acts. Internet Surveillance and Forensics Analysis System

Lawful Interception Solution E-Detective system can export reconstructed data and keep this data in NAS/SAN/CD/DVD storage for long term record keeping.

Corporate Interception Solution

HTTPS/SSL Interception Solution INTERNET HTTPS MITM (ED2S) Targeted Users HTTPS traffic needs to be routed or redirected to this MITM system. Gateway Router L3 Core Switch (Re-routing Function) Web/Mail Server HTTPS/SSL 1 2 Target Users

e-Detective is Easy to Operate Just use IE Browser login system from local or remote Uses https protocol for security protection Multi password, user’s name and User’s Group for system login control

e-Detective: Homepage

e-Detective: Email – POP3/SMTP/IMAP

e-Detective: Web Mail (Read)

e-Detective: Web Mail (Sent)

e-Detective: IM/Chat - Yahoo

e-Detective: File Transfer - FTP

e-Detective: File Transfer – P2P

e-Detective: HTTP – Link/Content

e-Detective: HTTP Upload/Download

e-Detective: HTTP Video Stream

e-Detective: Search – Condition/Parameter

e-Detective: Search – Association/Relation

e-Detective: Backup Storage External Storage (SAN/NAS/CD/DVD) for preserving digital assets & for future recovery of DATA (Backup CD Reader SW is provided)

Who Needs e-Detective? Types Of Companies Need E-Detective Aside from Government Companies that install E-Detective as a Deterrent, will inform their staffs that Internet activities are being fully monitored. Financial, Banking and Investment Companies such as derivatives, futures, etc. All transactions to be monitored. Companies like marketing, design house, high technologies, which critically need to prevent leakage of data. Staffs communicate with customers or vendors through web-based system need E-Detective to archive data.

Crackdown on Fraud Rings Europe US China Taiwan Vietnam Thailand Philippines Malaysia Indonesia Africa

Network Forensics and Lawful Interception E-Detective Wireless-Detective E-Detective Decoding Centre Enterprise Data Guard System E-Detective LEMF Centralized Management System Data Retention Management System HTTPS/SSL Interceptor VoIP Detective FIT (Forensics Investigation Toolkit) NIT (Network Investigation Toolkit) Network Packet Forensic Analysis Training Cyber Crime Investigation Training National Security Surveillance Training DECISION GROUP INC.

I hope you find it informative… Thank you!!! I hope you find it informative… Email Me @ a.reyes@tasaheelglobal.com Visit our website @ www.tasaheelglobal.com