another application of mind mapping automation in security logs analysis

26
New application of Mind Mapping automation in information security log analysis - AdwCleaner Image courtesy of Stuart Miles / FreeDigitalPhotos.net

Upload: infoseg

Post on 29-Nov-2014

467 views

Category:

Technology


1 download

DESCRIPTION

Example of the application of Mind Mapping automation to the analysis of security log files. Analysis of AdwCleaner log files.

TRANSCRIPT

Page 1: Another application of Mind Mapping automation in security logs analysis

New application of Mind Mapping automation in information security log analysis - AdwCleaner Image courtesy of Stuart Miles

/ FreeDigitalPhotos.net

Page 3: Another application of Mind Mapping automation in security logs analysis

AdwCleaner

This is a free software to find and remove:

• Adware

• PUP / LPI

• Toolbars

• Highjackers

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 4: Another application of Mind Mapping automation in security logs analysis

AdwCleaner

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 5: Another application of Mind Mapping automation in security logs analysis

Problem: Laptop infected with Nation Zoom

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 6: Another application of Mind Mapping automation in security logs analysis

Report generated by AdwCleaner

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 7: Another application of Mind Mapping automation in security logs analysis

Mind Mapping version of the report

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 8: Another application of Mind Mapping automation in security logs analysis

Header

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 9: Another application of Mind Mapping automation in security logs analysis

Services

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 10: Another application of Mind Mapping automation in security logs analysis

Folders

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 11: Another application of Mind Mapping automation in security logs analysis

Files

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 12: Another application of Mind Mapping automation in security logs analysis

Direct Access

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 13: Another application of Mind Mapping automation in security logs analysis

Registry

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 14: Another application of Mind Mapping automation in security logs analysis

Browsers

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 15: Another application of Mind Mapping automation in security logs analysis

APPLICATION OF FILTERS

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 16: Another application of Mind Mapping automation in security logs analysis

NATION ZOOM

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 17: Another application of Mind Mapping automation in security logs analysis

Nation Zoom related information

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 18: Another application of Mind Mapping automation in security logs analysis

Filtered Mind Map after callouts and relationship have been added

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 19: Another application of Mind Mapping automation in security logs analysis

NCH SOFTWARE Another possible problem

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 20: Another application of Mind Mapping automation in security logs analysis

Folders and Files

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 21: Another application of Mind Mapping automation in security logs analysis

Registry and Direct Access

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 22: Another application of Mind Mapping automation in security logs analysis

ELEMENTS RELATED TO A USER

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 23: Another application of Mind Mapping automation in security logs analysis

Files and Browsers

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 24: Another application of Mind Mapping automation in security logs analysis

Direct Access

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 25: Another application of Mind Mapping automation in security logs analysis

Image courtesy of Stuart Miles / FreeDigitalPhotos.net

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 26: Another application of Mind Mapping automation in security logs analysis

Contact Information

José M. Guerrero

[email protected]

Slideshare Presentations

Linkedin profile

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml