Because each attack is unique, the incident response must be tailored accordingly. Therefore, DSS selects a suitable response team for each case. Any of the following threats may materialize:
- Hacking of a server
- Theft of electronic funds
- Hacking of IP telephony
- Theft of network traffic
- Confidential data leaks
- Destruction of information
- Targeted virus attacks
- Government Insult
- Social Network Surveillance
- Online Application Interception.
- Email Interception.
Performs
- Twenty four hour consultation services
- Rapid response to fashion a suitable action plan and supervise its implementation
- On-site visit from a qualified expert if deemed necessary
- Timely removal of critical vulnerabilities
- Forensics analysis
- Analysis of malicious software (viruses)
- Data recovery
- Legal services, including compiling the paperwork required by law enforcement agencies
- Advice regarding how best to improve protection in future
- Development of an incident investigation scheme and other recommendations
Insight
This day as technology keep evolves and communication have already evolution into different aspect. We can said it from one to one phone call to SMS text messages, social media, and unlimited of internet applications available online. Many cyber crime using this new communication to commit crime online, and making law enforcement agency difficult to track down their foot print. DSS offer an intelligence system for law enforcement agency to collect and monitor all voice and IP data communications, to identify threats and target.
- Identified Location: Time/Date/Relative being at which point of location and commit crime.
- Movement Logged History: Day and time that already happened recall back.
- Ring Leaders: Main key of mastermind, partners, roles of crime associations, present in connection chart
- Mix Protocol: Support all forms of communication such as 3G/4G/Wimax/Wifi/GPRS/IPv4/IPv6
- Contact List: People they use to contact and real time monitoring call
- Website Logging: Website they visited
- Email: Email content, Password, FTP, Server and many more credential.
- Device Identified: Separate modem device, smart phone, mobile phone, tablet, laptops, pc
- Filtration: Filter unwanted application, website, downloads movie, file, emails, and more
- Keywords alert: To identified targeted keyword.
- Voice Alert: identify voices of male/female/keywords they speak, numbers and caller.
- All in one linking: Linked all protocol, application, social network, file, website, voice call, SMS test messages, multiple email account.
Results
- Evidence is collated in a manner conducive to legal compliance
- Thorough incident report
- Advice offered for improving information protection in future
- Compilation of documentation in a format that can be submitted to the relevant law enforcement agencies
- Evidence, data and paperwork readied for any further investigation