SlideShare una empresa de Scribd logo
1 de 69
Descargar para leer sin conexión
Ethical Hacking and
C tCountermeasures
Version 6
Module LVModule LV
Preventing Data Loss
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://ap.google.com/
Module Objective
• Data Loss
This module will familiarize you with:
Data Loss
• Causes of Data Loss
• How to Prevent Data Loss
• Impact Assessment for Data Loss Prevention
• Tools to Prevent Data Loss
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Data Loss
Causes of Data LossCauses of Data Loss
How to Prevent Data Loss
Impact Assessment for Data
How to Prevent Data Loss
Loss Prevention
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tools to Prevent Data Loss
Introduction: Data Loss
Data loss refers to the unexpected loss ofData loss refers to the unexpected loss of
data or information
Backup and recovery schemes must
be developed to restore lost data
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Causes of Data Loss
Intentional Action
• Intentional deletion of a file or program
Unintentional Action
• Accidental deletion of a file or program
• Misplacement of CDs or floppies
• Administration errors
P f il lti i d t t b i d t t
Failure
• Power failure, resulting in data not being saved to permanent memory
• Hardware failure, such as a head crash in a hard disk
• A software crash or freeze, resulting in data not being saved
• Software bugs or poor usability, such as not confirming a file delete
d
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
command
• Data corruption, such as filesystem corruption or database corruption
Causes of Data Loss (cont’d)
Disaster Crime
• Natural disaster, earthquake,
flood, tornado, etc.
• Fire
• Theft, hacking, sabotage, etc.
• A malicious act, such as a
worm, virus, hacker, or theft
of physical mediap y
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
How to Prevent Data Loss
Tips to prevent Data loss:
• Back-up critical files: Backup regularly using windows in-built backup
tiliti b k t l
Tips to prevent Data loss:
utilities or use any backup tool
• Run Anti-Virus Program: Install Anti-Virus Software and run them
regularly to cleanup your Computer System from Viruses & Trojans
• Use power surge protectors: A power surge, is one of the most
common occurrences that can damage data and potentially cause a hardcommon occurrences that can damage data and potentially cause a hard
drive failure
• Experience required: Never attempt any operation, like hard drive
installations or hard drive repairs, if you do not have such skills
• Shut down your computer: Always quit programs before shutting
down the computer
• Never shake or remove the covers on hard drives or tapes
• Store your backup data offsite: Use Tape Drives, Compact
Disk(CD),and Floppy Drives to Store your backups
B f di K t d i
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Be aware of your surroundings: Keep your computers and servers in
safest and secure locations
Impact Assessment for Data Loss
PreventionPrevention
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
T l t P t D t LTools to Prevent Data Loss
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Security Platform
BorderWare Security Platform removes the need to deploy a new device to
protect against new messaging applications by integrating Email, IM, and Webprotect against new messaging applications by integrating Email, IM, and Web
security with a single policy and single security platform
It is a content monitoring and filtering tool which prevents data leakage
• Consolidated content monitoring and filtering to prevent data leakage
Benefits:
• Comprehensive, stronger security for Email, IM, and Web
• Reduced time, effort, and costs with a set-and-forget policy management
approach
• On-demand scalability and flexible deployment
M d l h bl i b h h d d dd
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Modular approach enables enterprises to buy what they need now and add
on later
Security Platform: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Check Point Software: Pointsec
Data SecurityData Security
Pointsec data encryption solutions by Check Point provide dataPointsec data encryption solutions by Check Point provide data
protection on laptops, PCs, mobile devices, and removable media
By leveraging a strong and efficient blend of full disk encryption,
access control, port management and removable media encryption, it
delivers a comprehensive data securitydelivers a comprehensive data security
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Pointsec Data Security:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cisco (IronPort)
IronPort delivers high-performance and comprehensive data loss
prevention for data in motionp e e t o o data ot o
It helps organizations to prevent data leaks, enforce compliance, and
protect their brand and reputation
Features:
W b d I t t M i P t ti• Web and Instant Messaging Protection
• Email Encryption
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Cisco (IronPort): Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Content Inspection Appliance
The Code Green Network’s line of Content Inspection Appliances is a solution
for protecting customer data and safeguarding intellectual property
It provides a complete solution for preventing the loss of personal informationIt provides a complete solution for preventing the loss of personal information
across the network
• Monitors, enforces, and audits all popular Internet communication
Features:
, , p p
channels including email, WebMail, IM, FTP, and online collaboration
tools (such as Blogs and Wikis)
• Automatically encrypts sensitive email messages according to policy
• Deploys quickly with pre-defined policy templates
D d li i li d i id
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Demonstrates and manages compliance using policy and incident
management capabilities
CrossRoads Systems: DBProtector
It provides database security at a logical business policy level and stops
'authorized misuse' of database informationauthorized misuse of database information
DBProtector provides policy-based intrusion detection, prevention, and
compliance auditing
DBProtector sits in the data path and inspects SQL statements before they reach
the database
• Inspects database activities
Enfo ces sec it policies
Features:
• Enforces security policies
• Alerts on suspicious activities
• Captures audit trails for compliance reporting, security forensics, and
electronic discovery
• Provides separation of duty between security personnel and
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Provides separation of duty between security personnel and
database/network administrators ensuring regulatory compliance
Strongbox DBProtector Architecture
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
DeviceWall
DeviceWall protects data, both on and off the
network by:
• Preventing the transfer of files to or from unauthorized portable
devices
A t ti ll ti d t i d t d d i
network, by:
• Automatically encrypting data copied to approved devices
• Providing complete audit trails of device and file accesses
DeviceWall prevents unwanted data transfer to or from portable
devices such as USB flash drives, iPods, PDAs, and wireless
connections by automatically enforcing security policies
User access can be blocked, limited to read-only, or left unrestricted
according to individual’s security privileges and device type in use
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
g y p g yp
DeviceWall: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
DeviceWall: Reporting
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Exeros Discovery
Exeros Discovery software automates discovery and maintenance of business
rules transformations hidden sensitive data and data inconsistencies acrossrules, transformations, hidden sensitive data, and data inconsistencies across
structured data sources
I i h l f d d i i l h di i lIt uses a unique technology of data-driven mapping to replace the traditional
manual process of analyzing source data and mapping it to another data set
Exeros Discovery has two main components:
• Discovery Studio: A graphical user interface for data analyst to view data,
maps, and transformations discovered by Discovery and to edit, test, and
approve any remaining data maps and business rules
• Discovery Engine: Multiple, scalable, and high-performance engines that
automatically discover business rules transformations sensitive data
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
automatically discover business rules, transformations, sensitive data,
and data inconsistencies
Exeros Discovery: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GFi Software:
GFiEndPointSecurityGFiEndPointSecurity
GFiEndPointSecurity prevents data leakage/theft by controllingy p g / y g
access to portable storage devices with minimal administrative effort
It prevents introduction of malware and unauthorized software on
the network
It gives administrators greater control by allowing to block devices by
class, file extensions, physical port or device ID
It allows administrators to grant temporary device or port access for a
stipulated time-frame
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
stipulated time frame
GFi Software:
GFiEndPointSecurity (cont’d)GFiEndPointSecurity (cont d)
GFI EndPointSecurity allows administrators to activelyGFI EndPointSecurity allows administrators to actively
manage user access and log the activity of:
• Media players, including iPods, Creative Zen, and others
• USB drives, Compact Flash, memory cards, CDs, floppies, and other
portable storage devicesp g
• PDAs, BlackBerry handhelds, mobile phones, smart phones, and
similar communication devices
• Network cards, laptops, and other network connections
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GFiEndPointSecurity:
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GFiEndPointSecurity:
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GFiEndPointSecurity:
Screenshot 3Screenshot 3
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GFI EndPointSecurity
ReportPack: ScreenshotReportPack: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
GuardianEdge Data Protection
PlatformPlatform
GuardianEdge Data Protection Platform consists ofg
GuardianEdge applications for hard disk encryption,
removable storage encryption, and device control
Framework also provides a common infrastructure
and common administration of services
Features:
Whole-disk encryption
Transparent to end-users
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Enterprise-ready
GuardianEdge Data Protection
Platform: FrameworkPlatform: Framework
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ProCurve Identity Driven
Manager (IDM)Manager (IDM)
ProCurve Identity Driven Manager configures security and performancey g g y p
settings based on user, device, location, time, and client system state
IDM provides network administrators with the ability to centrally define and
apply policy-based network access rights that allow network to automatically
adapt to the needs of users and devices as they connect
It allows network administrators to efficiently manage the users and devices
connecting to their network
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ProCurve Identity Driven
Manager (IDM): ScreenshotManager (IDM): Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ProCurve Identity Driven
Manager (IDM): ScreenshotManager (IDM): Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Imperva: SecureSphere
SecureSphere Database Security Gateway automates activity monitoring,
auditing and protection for Oracle MS-SQL Server DB2 Sybase and Informixauditing, and protection for Oracle, MS SQL Server, DB2, Sybase, and Informix
databases
It automatically creates database usage profiles and security policies that areIt automatically creates database usage profiles and security policies that are
granular down to the query level, for every user and application accessing the
database
The following are the attacks that can be
prevented:
• Unauthorized Access
• Privilege Abuse
• Data Theft
D t D t ti
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Data Destruction
• DB platform/software attacks
SecureSphere Architecture
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Marshal EndPoint
Marshal EndPoint Security solution helps to extend organization's data lossy p g
prevention strategy, by managing and controlling connection of portable
media devices
• Prevention: Prevents the transfer of files to or from unauthorized
Features:
Prevention: Prevents the transfer of files to or from unauthorized
portable devices
• Protection: Automatically encrypts data copied to approved devices
• Visibility: Provides complete visibility of device and file accesses on the
networknetwork
• Flexibility: Provides granular control over who has access to what devices
and for how long
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Novell ZENworks Endpoint
Security ManagementSecurity Management
ZENworks Endpoint Security Management allows administrators to protect
corporate data and assets both inside and outside the corporate securitycorporate data and assets both inside and outside the corporate security
perimeter
It enforces highly customizable storage device security policies that are
t ll d d t ti ll di t ib t d t hicentrally managed, and automatically distributed to users or machines
With ZENworks Endpoint Security Management
you can:
• Control usage of internal optical media and all types of removable storage
devices
• Permit or block access completely or limit the device to read-only access
you can:
• Enforce permissions based on the user's location
• Control the file system, so devices that pose no security threat (such as a
USB mouse) are not disabled
• Provide granular control of specific devices based on serial number
G d l h ll bl i h h ld h b
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Generate reports and alerts when allowable size thresholds have been
exceeded
Novell ZENworks Endpoint
Security Management (cont’d)Security Management (cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Novell ZENworks Endpoint
Security Management (cont’d)Security Management (cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Prism EventTracker
EventTracker is a solution that features real time collection of all the logs,g
secure, tamper-proof and encrypted log storage, and real-time log analysis,
and reporting
EventTracker’s built-in knowledge base enables to gather business
intelligence providing increased security, performance, availability, and
reliability of systems
C ll ti
Features:
• Collection
• Consolidation
• Storage
• Correlation
Analysis & Reporting
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Analysis & Reporting
• Config Control & Change Management
Prism EventTracker: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Proofpoint Messaging Security
GatewayGateway
Proofpoint Messaging Security Gateway provides email security andp g g y y p y
data loss prevention
Data loss prevention platform provides comprehensive protection
against both inbound threats and outbound content security risks
Features:
• Anti-spam, anti-virus, multi-protocol content security, policy-based
encryption, and reporting features
• Integrated email firewall protection
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Virus protection and zero-hour anti-virus defenses
• Prevent leaks of information across multiple protocols
Proofpoint Platform Architecture
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary Dashboard
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
End-user Safe/Block List
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Defiance Data Protection System
Defiance Data Protection System (DPS) continuously safeguards sensitive information
th h t it lif l ith t t d ti d k tthroughout its lifecycle with patented encryption and key management
Incorporation of strong encryption algorithms like 3DES and AES ensures support of
widely accepted industry standards
Patented key management delivers centralized, secure key creation, distribution, andPatented key management delivers centralized, secure key creation, distribution, and
storage
Features:
• Databases are protected by patented column-level encryption to ensure granular control over
security
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
y
• File level encryption protects both structured and unstructured data wherever it may reside
• Storage of encrypted data remains protected and is easily restored when needed
Defiance Data Protection
System: ScreenshotSystem: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Sentrigo: Hedgehog
Hedgehog Enterprise is a database monitoring and intrusion prevention
solutionsolution
It provides full visibility into all database activity and allows enterprises to
enforce security policy, comply with regulatory requirements such as PCI DSS,enforce security policy, comply with regulatory requirements such as PCI DSS,
SOX, and HIPAA
Features:
• Virtual Patching
• Prevents unauthorized sessions
Features:
• Scalable and able to centrally configure and monitor hundreds of databases
• Ability to send alerts via e-mail, and integrate with 3rd party network and
security management systems via Syslog or SNMP
• Flexible, sophisticated reporting to facilitate regulatory compliance and
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
forensics for PCI DSS, Sarbanes Oxley, HIPAA, and privacy notification
laws such as CA SB 1386
Sentrigo Hedgehog: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Symantec Database Security
Symantec Database Security (SDS) provides real-time detection of
anomalous SQL activity auditing and Intruder Identification to helpanomalous SQL activity, auditing, and Intruder Identification to help
manage and control database security risks
SDS prevents fraud and leakage of sensitive data due to faulty practices and
oversights while addressing growing auditing compliance and regulatoryoversights, while addressing growing auditing, compliance, and regulatory
requirements for secure data access
Features:
• Analyzes all data accessed from database and performs data leakage
detection for unauthorized access to sensitive data
• Generates an audit trail of SQL activity on the database without anyGenerates an audit trail of SQL activity on the database without any
database overhead
• Analyzes all network SQL activity being sent to the database in order to
detect anomalous SQL from authorized and unauthorized users alike
• Identifies end-user credentials and IP addresses that initiated a specific
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Identifies end user credentials and IP addresses that initiated a specific
database transaction
Varonis: DataPrivilege
Varonis DataPrivilege makes transition possible without infrastructure
h b i di ichanges or business disruption
DataPrivilege brings together data owners and users in a forum for
i i h i i d i i i lcommunicating, authorizing, and activating entitlements
Varonis DataPrivilege allows to implement a cohesive data entitlement
i h b i i bili d d i i kenvironment thereby raising accountability and reducing risk
Features:Features:
• Automated business rule to authorization policy conversion
• Multi-level permission management (i.e. authorizers, reviewers)
D i i h i i hi & di il
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Data permission authorization history & audit trail
• Synchronization with file systems and user repository
Varonis DataPrivilege:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Verdasys: Digital Guardian
Verdasys' Digital Guardian is a data security solution for protecting and
tracking the flow of critical data
Digital Guardian logs user data transactions and applies pre-defined
rules to ensure that end-users are using applications and data properlyrules to ensure that end users are using applications and data properly
It also assures that data is being used in accordance with establishedIt also assures that data is being used in accordance with established
company best practices and government regulations (such as HIPAA
and GLBA) for handling confidential and private information
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Verdasys Digital Guardian:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
VolumeShield AntiCopy
VolumeShield AntiCopy controls and audits the use of portable
storage devices across a corporate network
AntiCopy protects against data theft and malware injection by
enabling organizations to enforce a granular policy governing the use
of devices such as USB drives, CD/DVD burners, iPods, and PDAs
d l b i d f bl d iRead-only access can be permitted for Removable storage devices,
floppy drives, and CD/DVD writers
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
VolumeShield AntiCopy:
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
VolumeShield AntiCopy:
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
VolumeShield AntiCopy:
Screenshot 3Screenshot 3
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Websense Content Protection
SuiteSuite
Websense Content Protection Suite is a comprehensive solution top
address the growing need for robust information leak prevention
It provides superior protection to secure content and manage "Who,
What, Where, and How"
Features:
• Prevents internal and external data loss
• Network and Data Recovery
• Content and Context Awareness
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Content and Context Awareness
•Data Monitoring
Websense Content Protection
Suite: ScreenshotSuite: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Elcomsoft Distributed Password
RecoveryRecovery
Elcomsoft Distributed Password Recovery is a password recovery tool
It is used to crack complex passwords, recover strong encryption keys, and
unlock documents in a production environment
It is a high-end solution for forensic and government agencies, data recovery,
and password recovery services
• Distributed password recovery over LAN, Internet, or both
• Console management for flexible control from any networked PC
Features:
• Console management for flexible control from any networked PC
• Plug-in architecture allows additional file formats
• Schedule support for flexible load balancing
• Encrypts all network communications between password recovery clients
and the server
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
and the server
• Installs and removes password recovery clients remotely
Elcomsoft Distributed Password
Recovery: ScreenshotRecovery: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Internet Password
Recovery ToolboxRecovery Toolbox
Internet Password Recovery Toolbox is a password recovery toolInternet Password Recovery Toolbox is a password recovery tool
It i t i b i d d l ti d f t t d it dIt maintains browsing and deleting passwords for protected sites and
user passwords for HTML forms
• Internet Explorer
It recovers the following passwords:
p
• Outlook Express
• Outlook
• Network and dial-up passwords
• ISDN lines
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• ISDN lines
• Virtual Private Networks
Internet Password Recovery
Toolbox: ScreenshotToolbox: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Data loss refers to the unexpected loss of data or information
Backup and recovery schemes must be developed to restore lost datap y b p
Using CDs or even an external USB hard drive for data storage can potentially save from
hiring a data recovery service to perform hard drive data recovery on hard drive or RAIDhiring a data recovery service to perform hard drive data recovery on hard drive or RAID
server
The Code Green Networks line of Content Inspection Appliances is a solution forp pp
protecting customer data and safeguarding intellectual property
Symantec Database Security (SDS) provides real-time detection of anomalous SQL
i i di i d d d ifi i h l d l d b
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
activity, auditing, and Intruder Identification to help manage and control database
security risks
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Más contenido relacionado

La actualidad más candente (20)

File000136
File000136File000136
File000136
 
File000119
File000119File000119
File000119
 
Ce hv6 module 49 creating security policies
Ce hv6 module 49 creating security policiesCe hv6 module 49 creating security policies
Ce hv6 module 49 creating security policies
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internet
 
File000114
File000114File000114
File000114
 
File000115
File000115File000115
File000115
 
File000120
File000120File000120
File000120
 
File000117
File000117File000117
File000117
 
File000139
File000139File000139
File000139
 
Ceh v5 module 08 denial of service
Ceh v5 module 08 denial of serviceCeh v5 module 08 denial of service
Ceh v5 module 08 denial of service
 
File000173
File000173File000173
File000173
 
File000113
File000113File000113
File000113
 
File000118
File000118File000118
File000118
 
File000170
File000170File000170
File000170
 
File000171
File000171File000171
File000171
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
Ceh v5 module 22 penetration testing
Ceh v5 module 22 penetration testingCeh v5 module 22 penetration testing
Ceh v5 module 22 penetration testing
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security Chapter 10 Mobile and Embedded Device Security
Chapter 10 Mobile and Embedded Device Security
 
Ceh v5 module 16 virus and worms
Ceh v5 module 16 virus and wormsCeh v5 module 16 virus and worms
Ceh v5 module 16 virus and worms
 

Similar a Ce hv6 module 55 preventing data loss

ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfShahidMehmood285010
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxmahaliacaraan
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?Jose L. Quiñones-Borrero
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 

Similar a Ce hv6 module 55 preventing data loss (20)

ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdf
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Week 12
Week 12Week 12
Week 12
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
File000169
File000169File000169
File000169
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Mis
MisMis
Mis
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 

Más de Vi Tính Hoàng Nam

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesVi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangVi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQVi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EVi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhVi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhVi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhVi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhVi Tính Hoàng Nam
 

Más de Vi Tính Hoàng Nam (20)

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Ce hv6 module 55 preventing data loss

  • 1. Ethical Hacking and C tCountermeasures Version 6 Module LVModule LV Preventing Data Loss
  • 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://ap.google.com/
  • 3. Module Objective • Data Loss This module will familiarize you with: Data Loss • Causes of Data Loss • How to Prevent Data Loss • Impact Assessment for Data Loss Prevention • Tools to Prevent Data Loss EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. Module Flow Data Loss Causes of Data LossCauses of Data Loss How to Prevent Data Loss Impact Assessment for Data How to Prevent Data Loss Loss Prevention EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Tools to Prevent Data Loss
  • 5. Introduction: Data Loss Data loss refers to the unexpected loss ofData loss refers to the unexpected loss of data or information Backup and recovery schemes must be developed to restore lost data EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 6. Causes of Data Loss Intentional Action • Intentional deletion of a file or program Unintentional Action • Accidental deletion of a file or program • Misplacement of CDs or floppies • Administration errors P f il lti i d t t b i d t t Failure • Power failure, resulting in data not being saved to permanent memory • Hardware failure, such as a head crash in a hard disk • A software crash or freeze, resulting in data not being saved • Software bugs or poor usability, such as not confirming a file delete d EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited command • Data corruption, such as filesystem corruption or database corruption
  • 7. Causes of Data Loss (cont’d) Disaster Crime • Natural disaster, earthquake, flood, tornado, etc. • Fire • Theft, hacking, sabotage, etc. • A malicious act, such as a worm, virus, hacker, or theft of physical mediap y EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 8. How to Prevent Data Loss Tips to prevent Data loss: • Back-up critical files: Backup regularly using windows in-built backup tiliti b k t l Tips to prevent Data loss: utilities or use any backup tool • Run Anti-Virus Program: Install Anti-Virus Software and run them regularly to cleanup your Computer System from Viruses & Trojans • Use power surge protectors: A power surge, is one of the most common occurrences that can damage data and potentially cause a hardcommon occurrences that can damage data and potentially cause a hard drive failure • Experience required: Never attempt any operation, like hard drive installations or hard drive repairs, if you do not have such skills • Shut down your computer: Always quit programs before shutting down the computer • Never shake or remove the covers on hard drives or tapes • Store your backup data offsite: Use Tape Drives, Compact Disk(CD),and Floppy Drives to Store your backups B f di K t d i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Be aware of your surroundings: Keep your computers and servers in safest and secure locations
  • 9. Impact Assessment for Data Loss PreventionPrevention EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 10. T l t P t D t LTools to Prevent Data Loss EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 11. Security Platform BorderWare Security Platform removes the need to deploy a new device to protect against new messaging applications by integrating Email, IM, and Webprotect against new messaging applications by integrating Email, IM, and Web security with a single policy and single security platform It is a content monitoring and filtering tool which prevents data leakage • Consolidated content monitoring and filtering to prevent data leakage Benefits: • Comprehensive, stronger security for Email, IM, and Web • Reduced time, effort, and costs with a set-and-forget policy management approach • On-demand scalability and flexible deployment M d l h bl i b h h d d dd EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Modular approach enables enterprises to buy what they need now and add on later
  • 12. Security Platform: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 13. Check Point Software: Pointsec Data SecurityData Security Pointsec data encryption solutions by Check Point provide dataPointsec data encryption solutions by Check Point provide data protection on laptops, PCs, mobile devices, and removable media By leveraging a strong and efficient blend of full disk encryption, access control, port management and removable media encryption, it delivers a comprehensive data securitydelivers a comprehensive data security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 14. Pointsec Data Security: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 15. Cisco (IronPort) IronPort delivers high-performance and comprehensive data loss prevention for data in motionp e e t o o data ot o It helps organizations to prevent data leaks, enforce compliance, and protect their brand and reputation Features: W b d I t t M i P t ti• Web and Instant Messaging Protection • Email Encryption EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 16. Cisco (IronPort): Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. Content Inspection Appliance The Code Green Network’s line of Content Inspection Appliances is a solution for protecting customer data and safeguarding intellectual property It provides a complete solution for preventing the loss of personal informationIt provides a complete solution for preventing the loss of personal information across the network • Monitors, enforces, and audits all popular Internet communication Features: , , p p channels including email, WebMail, IM, FTP, and online collaboration tools (such as Blogs and Wikis) • Automatically encrypts sensitive email messages according to policy • Deploys quickly with pre-defined policy templates D d li i li d i id EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Demonstrates and manages compliance using policy and incident management capabilities
  • 18. CrossRoads Systems: DBProtector It provides database security at a logical business policy level and stops 'authorized misuse' of database informationauthorized misuse of database information DBProtector provides policy-based intrusion detection, prevention, and compliance auditing DBProtector sits in the data path and inspects SQL statements before they reach the database • Inspects database activities Enfo ces sec it policies Features: • Enforces security policies • Alerts on suspicious activities • Captures audit trails for compliance reporting, security forensics, and electronic discovery • Provides separation of duty between security personnel and EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Provides separation of duty between security personnel and database/network administrators ensuring regulatory compliance
  • 19. Strongbox DBProtector Architecture EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 20. DeviceWall DeviceWall protects data, both on and off the network by: • Preventing the transfer of files to or from unauthorized portable devices A t ti ll ti d t i d t d d i network, by: • Automatically encrypting data copied to approved devices • Providing complete audit trails of device and file accesses DeviceWall prevents unwanted data transfer to or from portable devices such as USB flash drives, iPods, PDAs, and wireless connections by automatically enforcing security policies User access can be blocked, limited to read-only, or left unrestricted according to individual’s security privileges and device type in use EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited g y p g yp
  • 21. DeviceWall: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. DeviceWall: Reporting EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Exeros Discovery Exeros Discovery software automates discovery and maintenance of business rules transformations hidden sensitive data and data inconsistencies acrossrules, transformations, hidden sensitive data, and data inconsistencies across structured data sources I i h l f d d i i l h di i lIt uses a unique technology of data-driven mapping to replace the traditional manual process of analyzing source data and mapping it to another data set Exeros Discovery has two main components: • Discovery Studio: A graphical user interface for data analyst to view data, maps, and transformations discovered by Discovery and to edit, test, and approve any remaining data maps and business rules • Discovery Engine: Multiple, scalable, and high-performance engines that automatically discover business rules transformations sensitive data EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited automatically discover business rules, transformations, sensitive data, and data inconsistencies
  • 24. Exeros Discovery: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. GFi Software: GFiEndPointSecurityGFiEndPointSecurity GFiEndPointSecurity prevents data leakage/theft by controllingy p g / y g access to portable storage devices with minimal administrative effort It prevents introduction of malware and unauthorized software on the network It gives administrators greater control by allowing to block devices by class, file extensions, physical port or device ID It allows administrators to grant temporary device or port access for a stipulated time-frame EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited stipulated time frame
  • 26. GFi Software: GFiEndPointSecurity (cont’d)GFiEndPointSecurity (cont d) GFI EndPointSecurity allows administrators to activelyGFI EndPointSecurity allows administrators to actively manage user access and log the activity of: • Media players, including iPods, Creative Zen, and others • USB drives, Compact Flash, memory cards, CDs, floppies, and other portable storage devicesp g • PDAs, BlackBerry handhelds, mobile phones, smart phones, and similar communication devices • Network cards, laptops, and other network connections EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. GFiEndPointSecurity: Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. GFiEndPointSecurity: Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 29. GFiEndPointSecurity: Screenshot 3Screenshot 3 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 30. GFI EndPointSecurity ReportPack: ScreenshotReportPack: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. GuardianEdge Data Protection PlatformPlatform GuardianEdge Data Protection Platform consists ofg GuardianEdge applications for hard disk encryption, removable storage encryption, and device control Framework also provides a common infrastructure and common administration of services Features: Whole-disk encryption Transparent to end-users EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Enterprise-ready
  • 32. GuardianEdge Data Protection Platform: FrameworkPlatform: Framework EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. ProCurve Identity Driven Manager (IDM)Manager (IDM) ProCurve Identity Driven Manager configures security and performancey g g y p settings based on user, device, location, time, and client system state IDM provides network administrators with the ability to centrally define and apply policy-based network access rights that allow network to automatically adapt to the needs of users and devices as they connect It allows network administrators to efficiently manage the users and devices connecting to their network EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. ProCurve Identity Driven Manager (IDM): ScreenshotManager (IDM): Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. ProCurve Identity Driven Manager (IDM): ScreenshotManager (IDM): Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 36. Imperva: SecureSphere SecureSphere Database Security Gateway automates activity monitoring, auditing and protection for Oracle MS-SQL Server DB2 Sybase and Informixauditing, and protection for Oracle, MS SQL Server, DB2, Sybase, and Informix databases It automatically creates database usage profiles and security policies that areIt automatically creates database usage profiles and security policies that are granular down to the query level, for every user and application accessing the database The following are the attacks that can be prevented: • Unauthorized Access • Privilege Abuse • Data Theft D t D t ti EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Data Destruction • DB platform/software attacks
  • 37. SecureSphere Architecture EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. Marshal EndPoint Marshal EndPoint Security solution helps to extend organization's data lossy p g prevention strategy, by managing and controlling connection of portable media devices • Prevention: Prevents the transfer of files to or from unauthorized Features: Prevention: Prevents the transfer of files to or from unauthorized portable devices • Protection: Automatically encrypts data copied to approved devices • Visibility: Provides complete visibility of device and file accesses on the networknetwork • Flexibility: Provides granular control over who has access to what devices and for how long EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. Novell ZENworks Endpoint Security ManagementSecurity Management ZENworks Endpoint Security Management allows administrators to protect corporate data and assets both inside and outside the corporate securitycorporate data and assets both inside and outside the corporate security perimeter It enforces highly customizable storage device security policies that are t ll d d t ti ll di t ib t d t hicentrally managed, and automatically distributed to users or machines With ZENworks Endpoint Security Management you can: • Control usage of internal optical media and all types of removable storage devices • Permit or block access completely or limit the device to read-only access you can: • Enforce permissions based on the user's location • Control the file system, so devices that pose no security threat (such as a USB mouse) are not disabled • Provide granular control of specific devices based on serial number G d l h ll bl i h h ld h b EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Generate reports and alerts when allowable size thresholds have been exceeded
  • 40. Novell ZENworks Endpoint Security Management (cont’d)Security Management (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. Novell ZENworks Endpoint Security Management (cont’d)Security Management (cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 42. Prism EventTracker EventTracker is a solution that features real time collection of all the logs,g secure, tamper-proof and encrypted log storage, and real-time log analysis, and reporting EventTracker’s built-in knowledge base enables to gather business intelligence providing increased security, performance, availability, and reliability of systems C ll ti Features: • Collection • Consolidation • Storage • Correlation Analysis & Reporting EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Analysis & Reporting • Config Control & Change Management
  • 43. Prism EventTracker: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. Proofpoint Messaging Security GatewayGateway Proofpoint Messaging Security Gateway provides email security andp g g y y p y data loss prevention Data loss prevention platform provides comprehensive protection against both inbound threats and outbound content security risks Features: • Anti-spam, anti-virus, multi-protocol content security, policy-based encryption, and reporting features • Integrated email firewall protection EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Virus protection and zero-hour anti-virus defenses • Prevent leaks of information across multiple protocols
  • 45. Proofpoint Platform Architecture EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 46. Summary Dashboard EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 47. End-user Safe/Block List EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 48. Defiance Data Protection System Defiance Data Protection System (DPS) continuously safeguards sensitive information th h t it lif l ith t t d ti d k tthroughout its lifecycle with patented encryption and key management Incorporation of strong encryption algorithms like 3DES and AES ensures support of widely accepted industry standards Patented key management delivers centralized, secure key creation, distribution, andPatented key management delivers centralized, secure key creation, distribution, and storage Features: • Databases are protected by patented column-level encryption to ensure granular control over security EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited y • File level encryption protects both structured and unstructured data wherever it may reside • Storage of encrypted data remains protected and is easily restored when needed
  • 49. Defiance Data Protection System: ScreenshotSystem: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 50. Sentrigo: Hedgehog Hedgehog Enterprise is a database monitoring and intrusion prevention solutionsolution It provides full visibility into all database activity and allows enterprises to enforce security policy, comply with regulatory requirements such as PCI DSS,enforce security policy, comply with regulatory requirements such as PCI DSS, SOX, and HIPAA Features: • Virtual Patching • Prevents unauthorized sessions Features: • Scalable and able to centrally configure and monitor hundreds of databases • Ability to send alerts via e-mail, and integrate with 3rd party network and security management systems via Syslog or SNMP • Flexible, sophisticated reporting to facilitate regulatory compliance and EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited forensics for PCI DSS, Sarbanes Oxley, HIPAA, and privacy notification laws such as CA SB 1386
  • 51. Sentrigo Hedgehog: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 52. Symantec Database Security Symantec Database Security (SDS) provides real-time detection of anomalous SQL activity auditing and Intruder Identification to helpanomalous SQL activity, auditing, and Intruder Identification to help manage and control database security risks SDS prevents fraud and leakage of sensitive data due to faulty practices and oversights while addressing growing auditing compliance and regulatoryoversights, while addressing growing auditing, compliance, and regulatory requirements for secure data access Features: • Analyzes all data accessed from database and performs data leakage detection for unauthorized access to sensitive data • Generates an audit trail of SQL activity on the database without anyGenerates an audit trail of SQL activity on the database without any database overhead • Analyzes all network SQL activity being sent to the database in order to detect anomalous SQL from authorized and unauthorized users alike • Identifies end-user credentials and IP addresses that initiated a specific EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Identifies end user credentials and IP addresses that initiated a specific database transaction
  • 53. Varonis: DataPrivilege Varonis DataPrivilege makes transition possible without infrastructure h b i di ichanges or business disruption DataPrivilege brings together data owners and users in a forum for i i h i i d i i i lcommunicating, authorizing, and activating entitlements Varonis DataPrivilege allows to implement a cohesive data entitlement i h b i i bili d d i i kenvironment thereby raising accountability and reducing risk Features:Features: • Automated business rule to authorization policy conversion • Multi-level permission management (i.e. authorizers, reviewers) D i i h i i hi & di il EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Data permission authorization history & audit trail • Synchronization with file systems and user repository
  • 54. Varonis DataPrivilege: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 55. Verdasys: Digital Guardian Verdasys' Digital Guardian is a data security solution for protecting and tracking the flow of critical data Digital Guardian logs user data transactions and applies pre-defined rules to ensure that end-users are using applications and data properlyrules to ensure that end users are using applications and data properly It also assures that data is being used in accordance with establishedIt also assures that data is being used in accordance with established company best practices and government regulations (such as HIPAA and GLBA) for handling confidential and private information EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 56. Verdasys Digital Guardian: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 57. VolumeShield AntiCopy VolumeShield AntiCopy controls and audits the use of portable storage devices across a corporate network AntiCopy protects against data theft and malware injection by enabling organizations to enforce a granular policy governing the use of devices such as USB drives, CD/DVD burners, iPods, and PDAs d l b i d f bl d iRead-only access can be permitted for Removable storage devices, floppy drives, and CD/DVD writers EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 58. VolumeShield AntiCopy: Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 59. VolumeShield AntiCopy: Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 60. VolumeShield AntiCopy: Screenshot 3Screenshot 3 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 61. Websense Content Protection SuiteSuite Websense Content Protection Suite is a comprehensive solution top address the growing need for robust information leak prevention It provides superior protection to secure content and manage "Who, What, Where, and How" Features: • Prevents internal and external data loss • Network and Data Recovery • Content and Context Awareness EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Content and Context Awareness •Data Monitoring
  • 62. Websense Content Protection Suite: ScreenshotSuite: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 63. Elcomsoft Distributed Password RecoveryRecovery Elcomsoft Distributed Password Recovery is a password recovery tool It is used to crack complex passwords, recover strong encryption keys, and unlock documents in a production environment It is a high-end solution for forensic and government agencies, data recovery, and password recovery services • Distributed password recovery over LAN, Internet, or both • Console management for flexible control from any networked PC Features: • Console management for flexible control from any networked PC • Plug-in architecture allows additional file formats • Schedule support for flexible load balancing • Encrypts all network communications between password recovery clients and the server EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited and the server • Installs and removes password recovery clients remotely
  • 64. Elcomsoft Distributed Password Recovery: ScreenshotRecovery: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 65. Tool: Internet Password Recovery ToolboxRecovery Toolbox Internet Password Recovery Toolbox is a password recovery toolInternet Password Recovery Toolbox is a password recovery tool It i t i b i d d l ti d f t t d it dIt maintains browsing and deleting passwords for protected sites and user passwords for HTML forms • Internet Explorer It recovers the following passwords: p • Outlook Express • Outlook • Network and dial-up passwords • ISDN lines EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • ISDN lines • Virtual Private Networks
  • 66. Internet Password Recovery Toolbox: ScreenshotToolbox: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 67. Summary Data loss refers to the unexpected loss of data or information Backup and recovery schemes must be developed to restore lost datap y b p Using CDs or even an external USB hard drive for data storage can potentially save from hiring a data recovery service to perform hard drive data recovery on hard drive or RAIDhiring a data recovery service to perform hard drive data recovery on hard drive or RAID server The Code Green Networks line of Content Inspection Appliances is a solution forp pp protecting customer data and safeguarding intellectual property Symantec Database Security (SDS) provides real-time detection of anomalous SQL i i di i d d d ifi i h l d l d b EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited activity, auditing, and Intruder Identification to help manage and control database security risks
  • 68. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 69. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited