1 / 16

Computer Security and forensics

By: Megan Guild and Lauren Moore . Computer Security and forensics. Concept Map . OS Active wear. Computer Security. Computer Forensics. Our Recommendation . Mountain Stream Co. Details. Details. Zone Alarm. Examples. Digital Medix. Examples. Their Questions. Companies.

martha
Télécharger la présentation

Computer Security and forensics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. By: Megan Guild and Lauren Moore Computer Security and forensics

  2. Concept Map OS Active wear Computer Security Computer Forensics Our Recommendation Mountain Stream Co. Details Details Zone Alarm Examples Digital Medix Examples Their Questions Companies

  3. About Mountain Stream Co. • High end bottled water company • Use the purest water from the springs located in Rocky Mountains. • Known for their refreshingly clean taste and earth-friendly production process. • Headed towards becoming the market leader in bottled water.

  4. Questions They Have • How do we go about finding the original tax documents that were created? • Because our company has several departments and nearly 50 computers, how much would computer security and forensics services cost? • Do we need to outsource the computer security and forensics search to a specialized company?

  5. Questions Cont…. • During the computer search process, would the speed and efficiency of our day to day operations be affected significantly? • What are some firms that we could contact to help us in this situation?

  6. Computer Security • Used to protect information from corruption or theft. • Hardware that imposes rules. • Example • http- Unsecure site • https- Secure site

  7. Computer Security Cont…. • Complex and in-depth • Compartmentalize • Security architecture • Plan • Important companies and individuals • Facebook/Myspace?

  8. Computer Forensics • Definition • The Science of locating, extracting and analyzing types of data from different devices, which specialists then interpret to serve as legal evidence. • Deleting data • Once something is saved onto a computer it is difficult to dispose of it.

  9. Common Situations • Unauthorized disclosure of corporate data (by accident or design) • Employee internet abuse • Damage assessment and analysis • Industrial espionage • Criminal fraud and deception cases • More general criminal cases

  10. Computer Forensics Advantages • Provides support • Helps companies recover loss. • Preservation of evidence • Images • Non Investigative purposes

  11. Computer Forensics Disadvantages • Privacy concern • Data lost in recovery process • Costly • Time consuming • Computer Forensics by disk labs

  12. Computer Forensic Companies • Total Recall • Pricing: $897 per drive • Mountain Stream co. $44, 850 • Digital Medix • Pricing: $299-$749 per drive • Other options

  13. Computer Security Companies • McAfee • Pricing: $52 a computer a year • Mountain Stream: $2,600 • Zone Alarm • Pricing: $30 a computer a year • Mountain Stream: $1,500 • Hiring your own team

  14. Our Recommendations • Computer Security • Zone Alarm • Apply to all computers • Computer Forensics • Digital Medix • Only apply to few computers

  15. Sources • http://www.isaca.org/Template.cfm?Section=Home&CONTENTID=27783&TEMPLATE=/ContentManagement/ContentDisplay.cfm • http://en.wikipedia.org/wiki/Computer_security • http://www.wired.com/politics/security/news/2008/01/facebook_phish • http://www.computerforensics1.com/computer-forensic-disadvantage.html • http://www.computerforensics1.com/computer-forensic-advantage.html • http://websearch.about.com/od/dailywebsearchtips/qt/dnt0513.htm • http://www.computerforensicsworld.com/modules.php?name=FAQ&myfaq=yes&id_cat=1&categories=Basic+Questions • http://www.networkworld.com/columnists/2007/071707-johnson.html?fsrc=rss-security • http://shop.mcafee.com/Default.aspx?pid=HOME&CID=MFE-1008 • http://www.totalrecall.com/data_recovery_estimate.html Video • http://www.youtube.com/watch?v=GVbV_onexrM

  16. Questions?

More Related