application of mind mapping automation in the analysis of information security log files...
DESCRIPTION
Mind Mapping automation applied to the visualization and analysis of security Log filesTRANSCRIPT
Mind Mapping automation in information security log analysis (III) - Malwarebytes
Image courtesy of cuteimage / FreeDigitalPhotos.net
Applications of Mind Mapping automation in the analysis of security logs
Initial presentation Endpoint Protector
Second presentation AdwCleaner
Third presentation Malwarebytes
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Malwarebytes
To find and remove:
• Anti-malware
• Detects zero hour malware that AV miss
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Malwarebytes
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Malwarebytes.org
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Problem: Laptop infected with Conduit Search
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Report generated by Malwarebytes
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Mind Mapping version of the report
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Information
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Information + link to malwarebytes.org
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Memory processes analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Memory modules analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Registry Keys analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Detail of the Registry Keys analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Registry Values analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Registry Data Elements analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Detail of the Registry Data Elements analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Folders analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Files analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
PUPs analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Detail of PUPs analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Detail of PUPs analysis
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Image courtesy of Stuart Miles / FreeDigitalPhotos.net
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml
Contact Information
José M. Guerrero
Slideshare Presentations
Linkedin profile
(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml