SlideShare a Scribd company logo
1 of 5
Download to read offline
www.wavecrest.net
Wavecrest®
TechBrief
Forensic Investigation of
Employee Internet Activity
Wavecrest Computing Forensic Investigation of Employee Internet Activity page 2
Introduction
Computer or digital forensics involve forensic investigations that recover data from computers and other
technological devices, such as servers, to solve a crime or find evidence of misconduct. Depending upon
the employer and the investigation, forensic investigators may have to examine a single computer hard
drive, a corporate e-mail server, a large network, or terabytes of data. Some common situations that call
for forensic investigations are intellectual property theft, employment disputes, fraud, inappropriate e-mail
and Internet use in the workplace, and violations of regulatory compliance laws. These situations pose
greater risks for any company. Losses are more than financial in nature and can potentially damage the
company’s reputation.
Increased dependence on the Internet and computers among corporate organizations and government
institutions have extensively resulted in a rise in cyber crime and fraud. As a result, computer forensic
tools are primarily used in both criminal law and private investigations to determine, examine, and recover
evidence or digital data related to computer fraud and crime, as well as civil matters. For investigations
of Internet activity, finding the right tool may be a challenge. Forensic investigators need a tool that can
read a variety of raw log files and quickly analyze them. However, many Web log file tools only read their
own specific log files and do not break down the data into elements such as visits, hits, and Web content
categories.
Some tools are limited to the examination of the user’s computer hard drive, for example, a tool that
is used to read local files containing the user’s Web browsing history and cache, or an undetectable
keylogger that captures keyboard keystrokes. Ideally, the user’s Web activity log files should reside
outside of his computer system, for example, on a server, providing a critical source of evidence versus
data that is analyzed locally and could potentially be wiped or tampered with. Forensic investigators would
want to use a server-based tool along with their user system tool. This tool would provide detailed user
Internet activity, verify any evidence investigators find locally, and identify any gaps or inconsistencies in
the local data. With a server-based tool, historical log data exists, and depending on a company’s archive
policy, investigators can quickly “go back in time” to review past patterns and searches in Internet activity.
To support your forensic investigations of Internet use, Wavecrest offers Cyfin, an advanced forensic
log file analyzer that processes a multitude of log file formats, allows you to run quick ad hoc reports,
produces categorized audit reports detailing individual user Web activity, stores log file data on a server,
and much more.
Benefits of a Cyfin Implementation
Ease of Installation
Cyfin is easily installed by starting a wizard and following the on-screen instructions. After installing the
product, a few steps will get the product up and running. The screens are intuitive, reducing your setup
time and giving you access to information as quickly as possible.
Detailed Forensic Reports
Cyfin’s employee Web-use forensic reports deliver a comprehensive analysis of user activity including
their visits, search terms, and inappropriate sites. These low-level audit reports allow forensic
investigators to get a detailed analysis of a single user’s visits including the site’s category and full URL,
view search terms that a user entered on popular search sites such as Google, view users who accessed
sites that pose a legal liability risk, and see specific URLs to which a user was denied.
Wavecrest Computing Forensic Investigation of Employee Internet Activity page 3
The forensic reports include User Audit Detail, Category Audit Detail, Search Terms Audit Detail, Legal
Liability Detail, and Denied Detail and can be quickly run as ad hoc reports saving you time in your
investigation. As shown in the figures below, report elements include user, IP address, date/time, category
name, URL, search engine, and search term. Reports also provide the number of visits by hour, category
classification, and category, as well as total visits/hits, total denied visits, and total legal liability visits/hits.
Legal Liability Detail Report
Search Terms Audit Detail Report
Wavecrest Computing Forensic Investigation of Employee Internet Activity page 4
Server-Based Evidence
Cyfin is server-based where log files are stored on the server and do not reside on the user’s system.
Since the server would be restricted to IT administrators or other authorized personnel, the log data on
the server is a critical source of Web-use evidence for the investigator, especially if the user’s system has
been tampered with.
Multiple-Log-File Analyzer
Cyfin is designed to process and analyze terabytes of log data daily. It is log file independent meaning that
it can process a multitude of log file formats regardless of proxy server, firewall, or gateway device. Cyfin’s
log file analyzer is wizard-driven providing automatic log file analysis and detection, that is, it automates
the process of importing log data from hundreds of common network devices. The data is transformed
into useful information to deliver meaningful, detailed reports.
URL Categorization
Categorization is the process of determining the types of content provided by Web sites and grouping
those sites into content categories. Typical Web content categories are Shopping, Sports, and Financial.
Those that address legal liability risks include Fantasy Sports, Gambling, Illegal Drugs, Malware, and
Pornography. The Wavecrest reporting process assigns categories to individual Web sites for use in the
report-generation process. For example, the category assigned to www.espn.com is “Sports.” When
you create reports, you can choose the specific category (or categories) whose Web activity you want
to assess. With 70-plus standard categories and an unlimited number of custom categories, Cyfin
categorizes all Web activity so that investigators can easily find the evidence they need.
Licensing Per Investigation
Wavecrest understands that forensic investigations can be sporadic assignments, and investigators are
only tasked when a user has come under suspicion from a complaint or a common situation calls for a
forensic investigation. As mentioned earlier, these situations include intellectual property theft, fraud, and
inappropriate e-mail and Internet use in the workplace. Therefore, our licensing model is flexible and
highly customizable based on investigative case or product usage.
Conclusion
Due to increasing security concerns across different industries, such as law enforcement, defense,
banking, health care, information technology, and education, the market for computer or digital forensics
is witnessing substantial growth. Wavecrest has over 20 years of proven history addressing forensic
requirements across various industries. Cyfin is a court-cited, forensic investigation solution capable of
significantly reducing case investigative times by allowing you to gather and analyze pertinent evidence in
a rapid, cost-effective manner.
Whether you are a large organization with an internal Investigations department or an independent
Forensics Investigator, you will experience a significant increase in productivity which equates to
decreased cost per investigation. In addition to identifying evidence faster with Cyfin, pinpoint supporting
relevant activity that may be of value and have more time to focus on the actual investigation.
Wavecrest Computing
904 East New Haven Avenue
Melbourne, FL 32901
toll-free: 877-442-9346
voice: 321-953-5351
fax: 321-953-5350
www.wavecrest.net
All specifications subject to change without notice.
© Copyright 2017 Wavecrest Computing
Incorporated. All rights reserved.
About Wavecrest Computing
Since 1996, Wavecrest Computing has provided business and government clients with reliable, accurate
employee Web-access security, employee Web-use monitoring and analytics, and Cloud Access Security
Broker (CASB) solutions. IT specialists, HR professionals, and business managers trust Wavecrest’s
Cyfin®
and CyBlock®
products to manage employee Internet usage with today’s distributed workforce
in mind–reducing liability risks, improving productivity, managing cloud services, saving bandwidth, and
controlling costs.
Wavecrest has over 3,000 clients worldwide, including Blue Cross Blue Shield, MillerCoors, National Grid,
Rolex, Siemens, Superior Court of California, U.S. Dept. of Veterans Affairs, and a growing list of global
enterprises and government agencies. For more information on our company, products, and partners,
visit www.wavecrest.net.

More Related Content

What's hot

Top gdpr assessment tools
Top  gdpr assessment toolsTop  gdpr assessment tools
Top gdpr assessment toolsRajivarnan R
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityEQS Group
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processingTim Gough
 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventBarry Schuman
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
ASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsPrakash Prasad ✔
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAXeniT Solutions nv
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellasGeoBellas
 
What the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhat the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhoisXML API
 
GDPR webinar for business leaders
GDPR webinar for business leadersGDPR webinar for business leaders
GDPR webinar for business leadersDeeson
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
Transaction Watchdog by Controls Force Use Study
Transaction Watchdog by Controls Force Use StudyTransaction Watchdog by Controls Force Use Study
Transaction Watchdog by Controls Force Use StudySGB Media Group
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
 
GDPR Is Coming - Get Over It Webinar
GDPR Is Coming - Get Over It WebinarGDPR Is Coming - Get Over It Webinar
GDPR Is Coming - Get Over It WebinarSagittarius
 
Website integrity
Website integrityWebsite integrity
Website integrityjeannie_wu
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingTriskele Labs
 

What's hot (20)

Top gdpr assessment tools
Top  gdpr assessment toolsTop  gdpr assessment tools
Top gdpr assessment tools
 
Impact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A SecurityImpact of GDPR on Third Party and M&A Security
Impact of GDPR on Third Party and M&A Security
 
Building a register of data processing
Building a register of data processingBuilding a register of data processing
Building a register of data processing
 
Information gatherimg
Information gatherimgInformation gatherimg
Information gatherimg
 
Smart grid
Smart gridSmart grid
Smart grid
 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
ASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report Details
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATAGDPR READY SOLUTION FOR UNSTRUCTURED DATA
GDPR READY SOLUTION FOR UNSTRUCTURED DATA
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellas
 
What the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhat the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for Cybersecurity
 
GDPR webinar for business leaders
GDPR webinar for business leadersGDPR webinar for business leaders
GDPR webinar for business leaders
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Transaction Watchdog by Controls Force Use Study
Transaction Watchdog by Controls Force Use StudyTransaction Watchdog by Controls Force Use Study
Transaction Watchdog by Controls Force Use Study
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
GDPR Is Coming - Get Over It Webinar
GDPR Is Coming - Get Over It WebinarGDPR Is Coming - Get Over It Webinar
GDPR Is Coming - Get Over It Webinar
 
Website integrity
Website integrityWebsite integrity
Website integrity
 
Access data
Access dataAccess data
Access data
 
Improve Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness TrainingImprove Cybersecurity Education Or Awareness Training
Improve Cybersecurity Education Or Awareness Training
 

Similar to Forensic Investigation of Employee Internet Activity

Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Anton Chuvakin
 
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdfSecond Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdfELIJAH
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 ltsmchatoramhuru
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...EMC
 
Computer Forensics in the Age of Compliance
Computer Forensics in the Age of ComplianceComputer Forensics in the Age of Compliance
Computer Forensics in the Age of ComplianceAnton Chuvakin
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital Worldrahulmonikasharma
 
Empire Consulting Background Check 2016
Empire Consulting Background Check 2016Empire Consulting Background Check 2016
Empire Consulting Background Check 2016Michael Kennedy
 
Empire Background Check Info 2016
Empire Background Check Info 2016Empire Background Check Info 2016
Empire Background Check Info 2016Michael Kennedy
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customerEMC
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013Martin Jordan
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoringProxies Rent
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 

Similar to Forensic Investigation of Employee Internet Activity (20)

Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
 
SafeGuard Background Screening
SafeGuard Background ScreeningSafeGuard Background Screening
SafeGuard Background Screening
 
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdfSecond Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
Second Step to Forensic Readiness_ Types and Sources of Digital Evidence.pdf
 
Proxy
ProxyProxy
Proxy
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 lts
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
Proxy
ProxyProxy
Proxy
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
Computer Forensics in the Age of Compliance
Computer Forensics in the Age of ComplianceComputer Forensics in the Age of Compliance
Computer Forensics in the Age of Compliance
 
Computer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital WorldComputer Forensics-An Introduction of New Face to the Digital World
Computer Forensics-An Introduction of New Face to the Digital World
 
Empire Consulting Background Check 2016
Empire Consulting Background Check 2016Empire Consulting Background Check 2016
Empire Consulting Background Check 2016
 
Empire Background Check Info 2016
Empire Background Check Info 2016Empire Background Check Info 2016
Empire Background Check Info 2016
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013UK Cyber Vulnerability Index 2013
UK Cyber Vulnerability Index 2013
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 

More from Wavecrest Computing

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetWavecrest Computing
 
Reporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsReporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsWavecrest Computing
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseWavecrest Computing
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsWavecrest Computing
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive PortalWavecrest Computing
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Wavecrest Computing
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Wavecrest Computing
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseWavecrest Computing
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefWavecrest Computing
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Wavecrest Computing
 

More from Wavecrest Computing (20)

Cyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities DatasheetCyfin Reporting Capabilities Datasheet
Cyfin Reporting Capabilities Datasheet
 
Reporting Types and Smart Engine Analytics
Reporting Types and Smart Engine AnalyticsReporting Types and Smart Engine Analytics
Reporting Types and Smart Engine Analytics
 
Why Wavecrest
Why WavecrestWhy Wavecrest
Why Wavecrest
 
Why CyBlock Software
Why CyBlock SoftwareWhy CyBlock Software
Why CyBlock Software
 
Why CyBlock Appliance
Why CyBlock ApplianceWhy CyBlock Appliance
Why CyBlock Appliance
 
Why CyBlock Hybrid
Why CyBlock HybridWhy CyBlock Hybrid
Why CyBlock Hybrid
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
 
MSP Partner Program
MSP Partner ProgramMSP Partner Program
MSP Partner Program
 
Interpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable MetricsInterpreting Behavioral Analytics With Reliable Metrics
Interpreting Behavioral Analytics With Reliable Metrics
 
Authentication With Captive Portal
Authentication With Captive  PortalAuthentication With Captive  Portal
Authentication With Captive Portal
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity Morning Tech Talk Cybersecurity
Morning Tech Talk Cybersecurity
 
About wavecrest Computing
About wavecrest ComputingAbout wavecrest Computing
About wavecrest Computing
 
Cyfin Solution Brief
Cyfin Solution BriefCyfin Solution Brief
Cyfin Solution Brief
 
Detect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the EnterpriseDetect, Analyze, and Manage Cloud Services in the Enterprise
Detect, Analyze, and Manage Cloud Services in the Enterprise
 
Cyblock IOS App Datasheet
Cyblock IOS App DatasheetCyblock IOS App Datasheet
Cyblock IOS App Datasheet
 
Cloud syncwith active Directory
Cloud syncwith active DirectoryCloud syncwith active Directory
Cloud syncwith active Directory
 
CyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech BriefCyBlock SSL Inspection Tech Brief
CyBlock SSL Inspection Tech Brief
 
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
Prioritize network traffic and increase network QoS with CyBlock Bandwidth Ma...
 
CyBlock Hybrid deployment
CyBlock Hybrid deploymentCyBlock Hybrid deployment
CyBlock Hybrid deployment
 

Recently uploaded

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Forensic Investigation of Employee Internet Activity

  • 2. Wavecrest Computing Forensic Investigation of Employee Internet Activity page 2 Introduction Computer or digital forensics involve forensic investigations that recover data from computers and other technological devices, such as servers, to solve a crime or find evidence of misconduct. Depending upon the employer and the investigation, forensic investigators may have to examine a single computer hard drive, a corporate e-mail server, a large network, or terabytes of data. Some common situations that call for forensic investigations are intellectual property theft, employment disputes, fraud, inappropriate e-mail and Internet use in the workplace, and violations of regulatory compliance laws. These situations pose greater risks for any company. Losses are more than financial in nature and can potentially damage the company’s reputation. Increased dependence on the Internet and computers among corporate organizations and government institutions have extensively resulted in a rise in cyber crime and fraud. As a result, computer forensic tools are primarily used in both criminal law and private investigations to determine, examine, and recover evidence or digital data related to computer fraud and crime, as well as civil matters. For investigations of Internet activity, finding the right tool may be a challenge. Forensic investigators need a tool that can read a variety of raw log files and quickly analyze them. However, many Web log file tools only read their own specific log files and do not break down the data into elements such as visits, hits, and Web content categories. Some tools are limited to the examination of the user’s computer hard drive, for example, a tool that is used to read local files containing the user’s Web browsing history and cache, or an undetectable keylogger that captures keyboard keystrokes. Ideally, the user’s Web activity log files should reside outside of his computer system, for example, on a server, providing a critical source of evidence versus data that is analyzed locally and could potentially be wiped or tampered with. Forensic investigators would want to use a server-based tool along with their user system tool. This tool would provide detailed user Internet activity, verify any evidence investigators find locally, and identify any gaps or inconsistencies in the local data. With a server-based tool, historical log data exists, and depending on a company’s archive policy, investigators can quickly “go back in time” to review past patterns and searches in Internet activity. To support your forensic investigations of Internet use, Wavecrest offers Cyfin, an advanced forensic log file analyzer that processes a multitude of log file formats, allows you to run quick ad hoc reports, produces categorized audit reports detailing individual user Web activity, stores log file data on a server, and much more. Benefits of a Cyfin Implementation Ease of Installation Cyfin is easily installed by starting a wizard and following the on-screen instructions. After installing the product, a few steps will get the product up and running. The screens are intuitive, reducing your setup time and giving you access to information as quickly as possible. Detailed Forensic Reports Cyfin’s employee Web-use forensic reports deliver a comprehensive analysis of user activity including their visits, search terms, and inappropriate sites. These low-level audit reports allow forensic investigators to get a detailed analysis of a single user’s visits including the site’s category and full URL, view search terms that a user entered on popular search sites such as Google, view users who accessed sites that pose a legal liability risk, and see specific URLs to which a user was denied.
  • 3. Wavecrest Computing Forensic Investigation of Employee Internet Activity page 3 The forensic reports include User Audit Detail, Category Audit Detail, Search Terms Audit Detail, Legal Liability Detail, and Denied Detail and can be quickly run as ad hoc reports saving you time in your investigation. As shown in the figures below, report elements include user, IP address, date/time, category name, URL, search engine, and search term. Reports also provide the number of visits by hour, category classification, and category, as well as total visits/hits, total denied visits, and total legal liability visits/hits. Legal Liability Detail Report Search Terms Audit Detail Report
  • 4. Wavecrest Computing Forensic Investigation of Employee Internet Activity page 4 Server-Based Evidence Cyfin is server-based where log files are stored on the server and do not reside on the user’s system. Since the server would be restricted to IT administrators or other authorized personnel, the log data on the server is a critical source of Web-use evidence for the investigator, especially if the user’s system has been tampered with. Multiple-Log-File Analyzer Cyfin is designed to process and analyze terabytes of log data daily. It is log file independent meaning that it can process a multitude of log file formats regardless of proxy server, firewall, or gateway device. Cyfin’s log file analyzer is wizard-driven providing automatic log file analysis and detection, that is, it automates the process of importing log data from hundreds of common network devices. The data is transformed into useful information to deliver meaningful, detailed reports. URL Categorization Categorization is the process of determining the types of content provided by Web sites and grouping those sites into content categories. Typical Web content categories are Shopping, Sports, and Financial. Those that address legal liability risks include Fantasy Sports, Gambling, Illegal Drugs, Malware, and Pornography. The Wavecrest reporting process assigns categories to individual Web sites for use in the report-generation process. For example, the category assigned to www.espn.com is “Sports.” When you create reports, you can choose the specific category (or categories) whose Web activity you want to assess. With 70-plus standard categories and an unlimited number of custom categories, Cyfin categorizes all Web activity so that investigators can easily find the evidence they need. Licensing Per Investigation Wavecrest understands that forensic investigations can be sporadic assignments, and investigators are only tasked when a user has come under suspicion from a complaint or a common situation calls for a forensic investigation. As mentioned earlier, these situations include intellectual property theft, fraud, and inappropriate e-mail and Internet use in the workplace. Therefore, our licensing model is flexible and highly customizable based on investigative case or product usage. Conclusion Due to increasing security concerns across different industries, such as law enforcement, defense, banking, health care, information technology, and education, the market for computer or digital forensics is witnessing substantial growth. Wavecrest has over 20 years of proven history addressing forensic requirements across various industries. Cyfin is a court-cited, forensic investigation solution capable of significantly reducing case investigative times by allowing you to gather and analyze pertinent evidence in a rapid, cost-effective manner. Whether you are a large organization with an internal Investigations department or an independent Forensics Investigator, you will experience a significant increase in productivity which equates to decreased cost per investigation. In addition to identifying evidence faster with Cyfin, pinpoint supporting relevant activity that may be of value and have more time to focus on the actual investigation.
  • 5. Wavecrest Computing 904 East New Haven Avenue Melbourne, FL 32901 toll-free: 877-442-9346 voice: 321-953-5351 fax: 321-953-5350 www.wavecrest.net All specifications subject to change without notice. © Copyright 2017 Wavecrest Computing Incorporated. All rights reserved. About Wavecrest Computing Since 1996, Wavecrest Computing has provided business and government clients with reliable, accurate employee Web-access security, employee Web-use monitoring and analytics, and Cloud Access Security Broker (CASB) solutions. IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin® and CyBlock® products to manage employee Internet usage with today’s distributed workforce in mind–reducing liability risks, improving productivity, managing cloud services, saving bandwidth, and controlling costs. Wavecrest has over 3,000 clients worldwide, including Blue Cross Blue Shield, MillerCoors, National Grid, Rolex, Siemens, Superior Court of California, U.S. Dept. of Veterans Affairs, and a growing list of global enterprises and government agencies. For more information on our company, products, and partners, visit www.wavecrest.net.