Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.

Slides:



Advertisements
Similar presentations
The Internet Information Systems, Intermediate 2.
Advertisements

PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Page 1 / 18 Internet Traffic Monitor IM Page 2 / 18 Outline Product Overview Product Features Product Application Web UI.
Unit 1: Module 1 Objective 10 identify tools used in the entry, retrieval, processing, storage, presentation, transmission and dissemination of information;
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Internet…issues Managing the Internet
Remote mailbox access gateway Software lab project.
Security Guidelines and Management
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Norman SecureSurf Protect your users when surfing the Internet.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Forensic and Investigative Accounting
Computer Concepts 2014 Chapter 7 The Web and .
Cyber Crime & Investigation IT Security Consultant
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Chapter 8 The Internet: A Resource for All of Us.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Types of Electronic Infection
Basic Skills Foundation Computing The early bird may get the worm, but the second mouse gets the cheese.
Decision Group Inc. E-DETECTIVE Decision Group Inc.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group
Instrument for Business, Police, Military, Forensics and Information Investigation Wiretap Technology Revolution!!!
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
Internet Safety Internet Safety LPM
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
E-Detective Network Investigation Toolkit - NIT (2010) Decision Group
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
PEMBINA TRAILS Portal System User Guide Prepared by: Jo-Anne Gibson Acadia Junior High Teacher-Librarian.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Any criminal action perpetrated primarily through the use of a computer.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
Cyberoam - Unified Threat Management Cyberoam Endpoint Data Protection Cyberoam © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Cyberoam.
Main Features of iSafe All-in-One Keylogger Universal keylogger of isafe, Inc. Suitable for home parental control,corporate employee monitoring and cheating.
Forensics Investigation Toolkit (FIT) Offline Raw Data Files Parsing and Reconstruction Tools (Windows) Decision Group
3.1 Types of Servers.
Internet Business Associate v2.0
Instructor Materials Chapter 5 Providing Network Services
3.1 Types of Servers.
Internet and security.
3.1 Types of Servers.
Networking for Home and Small Businesses – Chapter 6
Welcome To : Group 1 VC Presentation
CompTIA Server+ Certification (Exam SK0-004)
Networking for Home and Small Businesses – Chapter 6
Unit# 5: Internet and Worldwide Web
Networking for Home and Small Businesses – Chapter 6
Computer Networks Protocols
Presentation transcript:

Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter to , Hotmail, Web-mail, FTP, IM MSN/ICQ/AOL/Yahoo/QQ, Telnet and Website Browsing such protocol. Protecting business benefits and Promoting office efficiency Sniffer network package Protocol converter Store to database Designed through :

Why Internet Surveillance Needed? Following are results of this : a)Abuse by staff. Indulging in personal related issues over the internet rather than being productive at work. b)Invitation of virus and spam mail c)Cookies with “malicious intent” penetrating the network d)Bandwidth wastage Previously, companies can just use a PROXY and BLOCK OFF Internet sites / applications. Now, with so many no-cost tools of communication available in the Internet, the customers of these companies are demanding that these channels be opened up (like, e mail, Instant Messaging … …).

3 Types Of Companies Need E-Detective : 1.Companies that install E-Detective as a Deterrent, will inform their staffs that Internet activities are being fully monitored. 2.Financial, Banking and Investment Companies such as derivatives, futures, etc, all transactions to be monitored. 3.Companies like marketing, design house, high technologies, which critically need to prevent leakage of data. Staffs communicate with customers or vendors through web-based system need E-Detective to archive data.

What are the staff up to … “Seems normal on the surface …” “What ? Porno site ? Stock trading? E-Shopping ? All are wasting your money!!

E-Detective System Uses Sniffer Technology Use HUB, Mirror port Switch, TAP Copy network packet to E-Detective systems Data acquire Support AD server Work with DHCP Over VLAN … Support Multi Points Data Import

E-Detective is easy to operate … 1.Just use IE Browser login system from local or remote 2.Uses https protocol for security protection 3.Multi password, user’s name and User’s Group for system login control

E-Detective support protocol E-Detective can capture network packet in the LAN and decode (decrypted) raw data into normal and real (POP3, SMTP, IMP4, Web mail, Hot mail), FTP, MSN, ICQ, AOL, YAHOO, QQ, TELNET and URL Browsing such of protocol.

IP address / Computer users’ name Columns : Status,Pc IP, Pc Name, At Least Time, Group, You might also sort the data by above columns by a simply clicking on the title

POP3/SMTP/ Web mail Log POP3, SMTP, Web Mail, Hot Mail Date/Time Sender Receiver CC Attachment Subject Size Source File …

IM-MSN, ICQ, AOL, Yahoo, QQ Log Date-Time IP User Handle Participants Conversation Attach file

FTP Log Date, Time, IP, server IP, password, Action, File name, File Content …

URL Browsing Log URL Address, IP, URL Content

Telnet Log Date Time IP Server IP Size User name Password

Data Back Up Auto Back up Back up Back Up to ISO Format Save to Hard disk Or CD for easily Re-storage or Re-processed

Search Record and Data Mining SEARCH KEY Support By IP, Mail Account, Date, Time, Keyword, Attach file … etc

Report Chart Report Report by Group

Expand storage E-Detective allows expanded storage like NAS, CD Libraries, Tape Storage, etc

E-Detective Model We provide customers with E-Detective in some modules. We challenge all sort of technical designs to meet the need of customers. ModulesPhotoNumber of User’s can monitor Hard disk size CD R/WExpanded storage Structure ED –FX G1 layer ED –FX GYes1 layer ED –FX G - Max 300 G YesSupport1 layer ED –FX Up120 G - Max 300 G YesSupport2 layer

Q & A For more information, please visit E-Detective’s web site We support remote software update (By Internet Connection)

Thank You YOUR Revolutionary Technology for Surveillance and Audit of Internet Activities!!