icon_preloader

Cybersecurity

Group 2

Cybersecurity

The term “cybersecurity” is used in the context of security activities related to the combination of offensive and defensive actions concerning data and system security (Information Security / IT Security). With the adoption of new technologies such as Cloud and IoT, new types of vulnerabilities have emerged, enabling specific cyberattacks and threats. Reported cases of data or privacy breaches and DoS (Denial of Service) attacks have increased. Traditional security solutions are no longer sufficient, and companies must ensure adequate measures to protect their network infrastructures, systems, services, and data.

Intecs’ expertise
Vulnerability analysis
Framework for cybersecurity testing
Cyber attack monitoring
Vulnerability analysis

Vulnerability analysis through vulnerability detection is a strategic activity to protect corporate assets (data, systems, services) from cyberattacks. Identifying system or service vulnerabilities pertains to the design phase (security by design). Detecting critical issues allows for the adoption of the most appropriate countermeasures.

Framework for cybersecurity testing

The use of specific tools and frameworks is a valuable support in various testing phases (Information Gathering, Pentesting, Report). The testing framework must be configured based on the analysis and selection of the tools to be used. The tools must provide utilities for specific needs and particular categories or types of tests (information gathering, network traffic analysis, wireless attacks, etc.).

Monitoring of Cyber Attacks

As the technological landscape changes, hackers exploit new vulnerabilities by developing increasingly sophisticated techniques. The first “Attack Generation” dates back to the 1990s with viruses on PCs. Since then, the targets have diversified: network infrastructure, services, and applications. In this scenario, it is important to monitor vulnerabilities and cyberattacks detected globally through sources such as CVE Repositories and Cyber Attack Maps. Information on known vulnerabilities, collected since 1999, is accessible through public archives. Vulnerabilities are identified through CVE – Common Vulnerabilities and Exposures (CVE). Cyber Attack Maps are platforms that provide visibility on global threat landscape activity based on advanced threat analysis systems.