+ All Categories
Home > Technology > Application of mind mapping automation in the analysis of information security log files...

Application of mind mapping automation in the analysis of information security log files...

Date post: 28-Nov-2014
Category:
Upload: infoseg
View: 495 times
Download: 1 times
Share this document with a friend
Description:
Mind Mapping automation applied to the visualization and analysis of security Log files
24
Mind Mapping automation in information security log analysis (III) - Malwarebytes Image courtesy of cuteimage / FreeDigitalPhotos.net
Transcript
Page 1: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Mind Mapping automation in information security log analysis (III) - Malwarebytes

Image courtesy of cuteimage / FreeDigitalPhotos.net

Page 3: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Malwarebytes

To find and remove:

• Anti-malware

• Detects zero hour malware that AV miss

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 4: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Malwarebytes

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 5: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Malwarebytes.org

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 7: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Report generated by Malwarebytes

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 8: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Mind Mapping version of the report

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 9: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Information

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 10: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Information + link to malwarebytes.org

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 11: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Memory processes analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 12: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Memory modules analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 13: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Registry Keys analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 14: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Detail of the Registry Keys analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 15: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Registry Values analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 16: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Registry Data Elements analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 17: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Detail of the Registry Data Elements analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 18: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Folders analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 19: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Files analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 20: Application of mind mapping automation in the analysis of information security log files Malwarebytes

PUPs analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 21: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Detail of PUPs analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 22: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Detail of PUPs analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 23: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Image courtesy of Stuart Miles / FreeDigitalPhotos.net

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 24: Application of mind mapping automation in the analysis of information security log files Malwarebytes

Contact Information

José M. Guerrero

[email protected]

Slideshare Presentations

Linkedin profile

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml


Recommended