Professional Documents
Culture Documents
Session
Outcome
Frauds
“Wheeler-dealer” attitude
Divorce/family problems
Irritability, suspiciousness or defensiveness
Addiction problems
Refusal to take vacations
The Digital
world
around us
Social Media
Gadgets &
Gizmos
Compute &
Communicate
Economic
Offences
No Dacoity
No Guns
New Age
Frauds!
The group
collapsed in April
2013, causing an
estimated loss of
INR 200–300 billion
(US$4–6 billion to
over 1.7 million
depositors
Digitized Document
Fraud
Fake food
coupon racket
busted, 4 held
in Mumbai,
damage 30
Lakhs
Original
S1
S2
S1 S2
P2 P2
Laser Laser
Original
Laser
Laser Printer
Inkjet
Laser Inkjet
FIVE TRENDS
Malware
• Mobile ❑ Automated
Pickpocketing Repackaging
• Mobile botnets
❑ Browser Attacks
• Malvertising
55
❑ Vulnerable Smart
Devices
Pyramid Cyber Security & Forensic
Newer Threats: Could be Embedded
Digital
Forensics
• Applications
– ERP, CRM, SFA, CAD…
• Cloud
– Drop box, Face book, Google Drive etc.
Shivraj Puri
Project
Planning ❹
Report Data
Generation ❼ ❻ Processing
❺
Data Data
Display Analysis
Physical
World
Computer
Forensics
Forensic Write
First Responder Kit Blocker Kit
Forensic Falcon
Forensic Bridges
Hard Disk Doctor
Pyramid Cyber Security & Forensic
FIVE TRENDS
Mobile
Forensics
Oxygen Mobile
Complete Mobile Forensic
Forensic Toolkit
Digital
Forensic
Analysis
Triage Examiner
OnLineDFS Application
Any Location: & Data Store
• Corporate
• Field Location
• Law Enforcement
• Service Provider
• Home Office, Hotel, etc.
Note: Browser interface and System Under Investigation
OnLineDFS application Co-reside Regional
Offices
wired/wireless/mobile
Session 1
Steganography
Cool and Covert
Internet
Firewall Firewall
External
Insider
Recipient
External
Insider
User
Carrier Image
Pyramid Cyber Security & Forensic 113
Add the letter “W” to a 24-bit image file:
W = 01010111 (ASCII)
R G B R G B
Original Altered
1 0 1 1 0 1 1 0 1 0 1 1 0 1 1 1
Original
1 1 1 0 0 1 1 1 Altered
1 1 1 0 0 1 1 0
© 2004-2008 Backbone
Pyramid Security.Com,
Cyber Security Inc. All rights reserved.
& Forensic 117
What is hidden in this image?
Using our Steganography Analysis
Services you will discover this:
High
Performance
Password &
Crypto Analysis
Emails, ediscovery
and Link Analysis
AGNITIO presentation
Can you identify this person?
Enterprise Fraud
Managment
Ins
PO ud
Fra
ide
r
Counter- Identity
Feiting Theft Deposit
Fraud
New
Te Account
Ma le- Phishing
rke
tin it Check
g ed e
r
C us Fraud
Mass
Ab Takeover Smurfing
Account Int
Takeover Fr erne
au
d t
ns …and even when we deploy solutions, we
t io
r a don’t connect them in ways that allow one silo
te
Al Kiting
to know what is happening in another silo
Pyramid Cyber Security & Forensic
▪ Holistic View (Fuse
Services from Multiple Apps)
- Transaction Monitoring & Anti-Money Laundering
- Enterprise Linking
- Visualization
Enterprise
Link Data
Analysis
Email
Retention &
Discovery
Fraud
EDD
AML
Pyramid Cyber Security & Forensic
FIVE TRENDS
Information
Technology Act
Anti Forensics
Information Rights
Management (IRM)
Maya’s
Computer
Information is classified and a policy can be attached to the information
to them
Information
classification
( Optional)
Information
policy
attachment
Maya’s
Computer
Policy definition could be centralized (only done by a central team),
Policy Admin
partially centralized (department level policy management)
Computer
or completely decentralized (user defined)
WHO
people /
Policy
groupsname
& within
description
WHATor
(VIEW, EDIT,
outside
PRINT,
of the )
FORWARD,…
enterprise
Internal Users
External Users
Policy Admin
Computer
Policy definition could be centralized
WHERE
Specific
computers, WHEN
specific date range,
networks,time span, …
only from
the office, …
This user has full control of document
Audit trails capture
authorized activities
AND
unauthorized
attempts
Technology is not an Issue.. World-Class Solutions
Computer &
Mobile Forensic
Acquisition
Analysis &
Reporting
Steganography
Password Recovery
SIEM,IRM
E-Discovery, CDR
Analysis,
Email Investigation
Voice Biometric
Layered Voice
Analysis
Wireless Forensics &
Anlaytics Surveillance
FIVE TRENDS
Challenges and
What to do!