Cyber Security Works
 
 
   
Home   About Us   Technology   Solutions   Research   Company  
 
 
 
Technology
 
Research
Technical papers in the field of Information Security
 
FREE Quote & Consultation
Security Posture Assessment Framework and Methodology

Cyber Force’s assessments are based on proven and patent pending methodologies and are the most comprehensive in the industry.  Cyber Force experts will use proprietary tools and redundant benchmark assessment tools to ensure cross validation and uniformity of process and consistency of results. The assessment effort will be divided into three major categories, internal, external and remote assessment.

Assessments include the operations, processes and technologies associated with directly defending against interruption, interception, modification, and fabrication to an enterprise’s network, information systems and operations.  To ensure a complete security posture assessment our process includes analysis and review of policies, information systems, network peripherals, information security devices (firewalls, intrusion prevention and detection systems), remote access services, wireless access points, printers, back-up systems, log management systems, voice over IP systems, disaster recovery techniques and physical security.  The figure below illustrates the process developed by Cyber Security Works to perform security assessments.

Security Assessments

 

Penetration Testing

Cyber security works penetration testing mimics an attacker with an adversarial intent to gain unauthorized access to client information, financial records, intellectual property, and sensitive portions of enterprise’s network from the perspective of a trusted user and an adversary from inside, remote, and outside. Upon initial penetration, we exploit internal trust relationships between systems in an effort to perform possible secondary exploits.  This is all done in a red teaming environment in an effort to provide an adversarial perspective to identify your information infrastructure’s weakest links or “low hanging fruits” that might be visible to your employees, service providers, competitors, adversaries, and hackers.

Cyber security works Dynamic Penetration Test (DPT) provides an in-depth and comprehensive testing of information systems (desktops and servers), network peripherals (routers, switches, and gateways), information security devices (firewalls and intrusion detection and prevention systems), and web applications (authentication systems and databases) by intelligently launching interruption, interception, modification, and fabrication attacks with minimal disruption to the client’s enterprise operations. DPT uses industry best practices for performing penetration testing in order to ensure cross validation, uniformity of processes, and consistency of results.

DPT automates common hacker attack technique (CHAT) for performing penetration testing through a multistage process. Figure below illustrates key DPT steps.

DPT Steps Illustration

DPT provides real-time testing capabilities against core information assurance building blocks (Network, Client, and Application). DPT’s attack modules consist of payloads that belong to one or more of the four major attack taxonomies (interruption, interception, modification, and fabrication). Testing is divided into three major categories internal, external and remote testing.

 

DPT’s major attack taxonomies are illustrated below:

1. Availability Attacks or Denial of Service Attacks

Information, information systems, and network becomes unavailable or unusable 

Illustration: Availability Attacks or Denial of Service Attacks
 
2. Interception or Confidentiality Attacks

Unauthorized access to information, information systems and network

Illustrations: Interception or Confidentiality Attacks
 
3. Interception or Confidentiality Attacks

Unauthorized tampering of information, information systems and network

Illustrations: Modification or Integrity Attacks
 
4. Fabrication or Accountability Attacks

Unauthorized creation, modification, and deletion of information, information systems and network elements

Illustrations: Fabrication or Accountability Attacks

Network Penetration Test replicates actions of an attacker with an adversarial intent to gain unauthorized access to portions of enterprise’s network i.e., any device that has a network address or is accessible to any other device from the perspective of a trusted user and adversary from inside, remote and outside.

Client Penetration Test replicates actions of an attacker with an adversarial intent to gain unauthorized access using persuasion and/or deception to gain access to, or information about, information systems.

Application Penetration Test replicates actions of an attacker to gain unauthorized access and/or gain greater level of access to web applications, e-commerce, ERP, and databases.  Main goal of this test is to gain unauthorized access through privilege escalation using SQL injection, code injection, remote file inclusion, and cross site scripting.

 

 
Home
Careers
Contact Us
Sitemap
 
About Us
|  Overview
Technology
 
Solutions
|  Network Penetration Testing |  Application Penetration Testing
|  Digital Forensics |  Data Mining
|  Training & Education
 
|  Published Papers