DIGITAL FORENSICS We Place Digital Evidence at Your Fingertips Cyanre is South Africa's leading provider of computer and digital forensic services
Cyber Crime taking a Byte out of corporate SA Total Legal and Remedial Cost Feb 2009 IT firm with 400 Blue-chip clients Illegal access to confidential info Interdict Dec 2009 Feb 2010 mail data to clients Full audit on billing process Digital Forensic Investigation Anton Piller Witness Protection Jan 2014 Court Hearing - Nov Verdict
According to MobiForge Report (2014) there is 6,915million (mil) mobile phone users worldwide with 5,400mil in developing nations and 629mil in Africa. - That is 95,5% of the global population, 69,3% of the African population In 2014 276,7mil pc/lpt was sold, 270,7mil tablets, 1895mil mobile phones According to Webopedia, (2014) there was 2,8 zettabytes (2.8 trillion GB) of data created in 2012. It is foretasted that this grows by 46% yearly. It is estimated that we will create 40 trillion GB of data in 2020.
Everyday we send 108,7 billion (bil) e-mails, 2.8 bil Google searches, 144 mil tweets The Radicati Group reported there is 4.1 bil e-mail accounts in 2014, The average person receives and send 121 e-mails per day, 3,6 bil social media accounts in 2014 The FBI already ranks SA 6/7th in its top 10 cyber crime perpetrators list. Cyber Crime Costs SA over R5 Billion in 2014
2015 Breach Statistics 17% Business & Professional Services 10% Financial Services 5% 3% 8% 17% 14% Retail 8% Media & Entertainment 6% 8% Consulting & Engineering 7% 10% 7 % Legal Services 7% High-Tech & IT 7% 7% 8% 8% 14% 7% Government and International Organizations 6% Healthcare 5% Transportation Mandiant 2015 M-Trends Report 3% Aerospace & Defence
Mandiant 2015 M-Trends Report Notification Statistics 100 % Of victims had up to date Anti Virus 69% of Companies hear they have been breached from a 3rd Party Attackers are active and undetected in the environment for 205 Days on average 100% of breaches involve stolen Credentials
Threat Landscape Deposit Scams Accommodation scams Puppy Scams 419 Scam Red Hat Black Hat Smishing Phishing Grey Hat Phone Phishing Spearing Code Injection Session Hijacking Whaling Spyware Man in the Middle Trojan G-mail Hack BYOD/BOYN Cyber Bullying ID Theft Cyber Harassment
The Face of Cyber Crime
RSA - 2011 cybercrime trends report
Prevention ICT & Security Program Assessment & GAP Analysis Detect Incident Response Assessment & Develop IR Plan Prevent Respond Fraud Readiness Assessment over Risk Divisions & Threat Mapping Litigation Support Assesment of and drafting of Policy, Governance & standards (SOP) ito Intelligence Platform, Forensics & Risk Management, DFL, SOC
Original 14) Where law requires information to be presented or retained in its original form, that requirement is met by a data message if: the integrity of the information from the time when it was first generated in its final form as a data message or otherwise has passed assessment in terms of subsection (2);
For the purposes of subsection 1(a), the integrity must be assessed: by considering whether the information has remained complete and unaltered, except for the addition of any endorsement and any change which arises in the normal course of communication, storage and display;
Admissibility and evidential weight of data messages 15. (1) In any legal proceedings, the rules of evidence must not be applied so as to deny the admissibility of a data message, in evidencea.on the mere grounds that it is constituted by a data message; (2) Information in the form of a data message must be given due evidential weight. (3) In assessing the evidential weight of a data message, regard must be had to- 1.the reliability of the manner in which the data message was generated, stored or communicated; 2.the reliability of the manner in which the integrity of the data message was maintained;
The Role of Digital Forensics Digital forensics is the process of uncovering and interpreting electronic data for use in a judicial matter. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events.
Digital Forensics Mobile Forensics Social Media Forensics Fraud Trend Analysis Incident Response and CIRT E-discovery Insolvency and Business Rescue
Danny Myburgh 082 7812078 www.cyanre.co.za Cyanre is South Africa's leading provider of computer and digital forensic services