We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySamira Colbourne
Modified about 1 year ago
BOTNETs and the Criminal Underground Presented by: Lee Shields Cyber Crime Intel Team National Intelligence Coordination Centre 1
2 What is a BOTNET?
BOTNET Operators Hacktivists Hacker (the kid next door?!) Organized Crime Groups 3
4 Underground Services
Cyber Crime Skills Computer / Device Forensics COMPFOR, A+ Encase, FTK Network Forensics Protocols Devices Tools / Methodologies Cloud Computing 5
Cyber Crime Skills (Cont’d) Specialized Data Acquisition Volatile Data (RAM) Log files VM’s, Mobile Devices, ICS Specialized Data Analysis RAM Dynamic / Static Malware Analysis Timeline Data Correlation and Visualization 6
Questions? Contact Info: firstname.lastname@example.org 613-843-3397 RCMP Detachments: http://www.rcmp-grc.gc.ca/detach/index-eng.htm 7
Mastering Windows Network Forensics and Investigation Chapter 10: Introduction to Malware.
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Mastering Windows Network Forensics and Investigation Chapter 6: Live Analysis Techniques.
An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader.
Presentation subhead CJ316 Investigating Cyber Crime Unit 9 Seminar Brandon Gregg.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Kerala Police Why Cocon ? What is the purpose of holding such a Conference ?
Malware\Host Analysis for Level 1 Analysts “Decrease exposure time from detection to eradication” Garrett Schubert – EMC Corporation Critical Incident.
The Cyber Defense center and its services portfolio McAfee Professional Services – Foundstone Services.
Chapter 10 E-Commerce Security and Fraud Issues and Protections.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Forensic Analysis Torres, Ricardo. It’s A Matter Of Time Security is a deterrence not a guarantee. “Computer forensics defined: Preservation, identification,
Damien Leake. Definition To examine digital media to identify and analyze information so that it can be used as evidence in court cases Involves many.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
Successful RCMP Strategies to Combat Human Trafficking.
What is FORENSICS? Why do we need Network Forensics? Why it is so important?
Network Forensics. What is it? ► Remote data acquisition (disk capture) ► Remote collection of live systems (memory) ► Traffic acquisition (cables and.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
© Grant Thornton LLP. All rights reserved. Johnny Lee Managing Director Forensic, Investigative and Dispute Services Skip Westfall Managing Director, Forensic.
FILE100% FILE 25%. FILE100% Downloadin g Strategy FILE 40% FILE 10%
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
1 The Threatscape is evolving rapidly A.Prove capabilities? B.Exact revenge? C.Erode our confidence? D.Perpetrate fraud in the background via the contact.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
October 28, 2015 Cyber Security Awareness Update.
SURVEY OF CYBER FORENSICS AND CYBER SECURITY IRA WILSKER July 17, 2014.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
The Digital Forensics Landscape Michael Jones. Digital Forensics To establish: – What was done, by whom, when, and how – Limited consideration of why.
M. W. Mpisi1. 2 Legislative mandate and policy documents Section 205 of the Constitution SAPS Act NCPS NCCS White Paper on Safety and Security, 1998 PRESENTATION.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
SECURE NETWORKS Device detects all network within radius Secure networks require SSID Password ENCRYPTION Translated into code Uses a mathematical Key.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Devices change the picture billion.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
Mastering Windows Network Forensics and Investigation Chapter 17: The Challenges of Cloud Computing and Virtualization.
Cyber Crime in the Digital Age Andy Archibald Head, National Cyber Crime Unit.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 24, 2011.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
How to make your investigation more complete in less time.
Crawford & Company CYBER & Product Liability & Professional Indemnity ‘ Everything you always wanted to know about claims ‘ Mark Vos, Head of GTS CEMEA.
Cyber Services Plc BRIEF SUMMARY Founded in 2015 Founders and members are security veterans with proven international reputation Resources.
Corporate Information Reconnaissance Cell (CIRC).
Whats it all about?. C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
© 2017 SlidePlayer.com Inc. All rights reserved.