Presentation is loading. Please wait.

Presentation is loading. Please wait.

Track and measure Social Media and Darknet through

Similar presentations


Presentation on theme: "Track and measure Social Media and Darknet through"— Presentation transcript:

1 Track and measure Social Media and Darknet through
Network Visibility and Threat Intelligence Presented By :- George Ezzat CEO,EliteVAD RCSS Oman 21 Nov 2017

2 About EliteVAD

3 Introduction EliteVAD is a MEA regional Value Added IT Distributor of best breed edge solutions, covering technology areas of data networking, IT security, virtualization and Data Centre infrastructure. EliteVAD executes the latest outstanding innovations necessary to select the leading edge strategic vendors and technologies that can empower our partners / customers with a real added value. Copyright © 2015 EliteVAD

4 EliteVAD Added Value Consultancy Services Support Services Pre-Sales
Post-Sales Pre-Sales

5 Digital Forensics | At a Glance
Digital Crimes and Frauds are growing exponentially due to high proliferation of Digital Artifacts and communication technologies in our personal and professional lives. What happened? When did it happen? How did it happen? And Who did it? What we offer: Computer Forensics including Software and Hardware Solutions. Mobile Forensics for Phone and PDA Analysis. Network Forensics Solutions. Incidence & emergency response services and solutions. Forensic bit stream imaging of various digital storage devices. Data recovery products. Password recovery Solutions. Steganography detection Solutions. Corrupt operating system data retrieval. Image and Video Analysis & enhancements. Database Forensics. Malware analysis Products.

6 Types of Forensic Requests
Lab Component Network Forensics Media and data Recovery Apple Forensics Malware Analysis Intrusion Analysis Damage Assessments Suspect Examination Tool Analysis Log File Analysis Evidence Search Image and Video Analysis Mobile Devices Forensics Main forensics investigation tools Password Recovery Incidence response Optical Media Investigation Browser Investigation Investigation

7 Forensics Transformation
Social Media Forensics Device Forensics Cloud Forensics Network Forensics Dark Net Forensics PC / Mobile Copyright © 2015 EliteVAD

8 Government Forensic Level

9 What is a Security Incident
Key risk areas :- Brand Reputation, Clients & Customers, Valuation, Financial Loss, Fraud, Physical Security, Intellectual Property Copyright © 2015 EliteVAD

10 The chart below, from Ponemon Institute, quantifies the average number of data breaches per country or region across the world. Ref:- Copyright © 2015 EliteVAD

11 Connecting Dots Real Time/Historical Forensic
Investigation Social Networks Mobile no. And More Intelligence Geo Real Time/Historical Forensic Traffic and subscriber correlation DarkNet Intelligence Social Network Tactical details

12 Technology aggregation network element
Target Architecture PREs are deployed in different sites used for internet peering Using Flowsync protocol, minimum bandwidth is used between sites to handle asymmetric traffic. Flowsync requires maximum 5% of the asymmetric traffic as bandwidth between sites This architecture ensures efficient usage of resources on the 3rd party system as only target traffic is mirrored Modem 1st site 2nd site PRE PRE 3rd party system RAN Technology aggregation network element Router Flowsync Wireless Router PRE Internet 3rd site

13 LiveView Real-time visualization of all traffic call “LiveView”
View data by configured hierarchy Example: by Network -> AP -> frequency -> channel Drill down into subscriber and flow level

14 Darknet Intelligence

15 Social Network intelligence Solution
Social Users’ Activities in all Networks

16 Business Dimension We provides: Why this is hard:
Collect Social Data from all customer touch points – 360° view We provides: Intelligence on Facebook and Twitter social networks Have unique analysis for Arabic and Franco Arab Online solution for people searching , monitoring and Analytics Why this is hard: Massive data (Volume) Different Channels (Velocity) Difficult to break Security for Private data

17 Product features & work cycle
Search By: - Name - Or Mobile - Or Picture - Store public and private data (Friends, posts, replies, Mobile ..etc.) Identify User’s interests - Analyze all public and private posts or tweets - Match mutual friends - Create Black lists and also black posts Monitor Instantaneous real time data - Over huge tunnels of data, OverOTT analysis system can interact to captures required data Integration and interact with Social media - One of best business case to interact with different groups that influence others users behavior or thoughts. Users Tagging

18 Search over Social Media
Search By: Name Or Mobile And Picture By intelligent image processing identify the user that make it the key over all other social media channels Store public and private data (Friends, photos, replies, posts, Mobile, personal information ..etc.) All Search results show Mobile ,, select user for more info. System will auto Categorize/Tag the user (Showing in color) System is storing all data for offline or online use and also ensure run time process as well.

19 Identify User’s interests
Analyze all public and private posts or tweets Match mutual friends Find at least one friend of his who has a public friends list so that we can look at their mutual friends. Match pictures and names on Facebook with similar accounts on twitter or google or LinkedIn. Create Black lists based on user’s behavior Create black posts based on Posts analysis

20 Thank you Website: www.elitevad.com


Download ppt "Track and measure Social Media and Darknet through"

Similar presentations


Ads by Google