Security Services

Tool scanning

  • ▪ The tool evaluation section will be conducted using network-based, host based, and database based scanning software.

Manual baseline assessment

  • ▪ The manual baseline assessment is mainly conducted by experienced security experts. Upon obtaining authorization from relevant personnel and under their supervision, conduct the following checks on the server system:
Confirm whether the system has been hacked before
Check for possible backdoors
System patch
System account
File system
Network and services
System configuration file
NFS or other file system sharing
Audit and Log
System backup and recovery
Application system

Penetration test

  • ▪ To understand the security status of the host system, penetration testing will be conducted within the scope of permission and control.

Management Audit

  • ▪ The strategy evaluation work will identify and analyze the weaknesses and deficiencies of the client in the strategy document, provide the current status of the security strategy, as part of the entire security evaluation work.

Application Audit

  • ▪ Includes business processes, application software security features, application software security assurance, and other related content.

Risk assessment results

  • List and analysis results of information assets: Clearly define the enterprise's system and network information assets, clarify their security goals for confidentiality, integrity, and availability, and determine the important categories of assets; If necessary, an internal information asset database can be established within the enterprise;
  • System and Network Vulnerability Report: Identify potential vulnerabilities in server systems, network devices, network structures, and security equipment;
  • System and Network Vulnerability Report: dentify potential vulnerabilities in server systems, network devices, network structures, and security equipment;
  • System and Network Threat Report: Analyze the current potential threats based on existing weaknesses, and the impact on business, systems, and networks after the threat occurs;
  • Security Status Report: A comprehensive analysis report based on risk, clarifying the current network security risks;
  • Suggested security measures: From a technical and management perspective, propose security controls throughout the entire lifecycle of the system (planning, design, construction, implementation, operation, and improvement).