
Security Health Check
We provide companies or organizations with integrated cyber security testing services covering different levels such as network architecture, end users, servers, wire connection, we also provide suggestions for Improvement, and our services will help customers to learn their overall network status and to establish key solution for improvement earlier.
Service
Details
Service
Service benefits
- Check the overall network architecture and conduct security assessment from different levels (network, systems, terminals, log files) and for different devices (terminal computers, servers, network security devices).
- To detect vulnerability in time and fix it by taking professional advice.
Service scope
- Confirm The Scope Of Work
Process Flow
Test item details
Network Architecture Check
- Check the overall network architecture and conduct security assessment from different levels (network, systems, terminals, log files) and for different devices (terminal computers, servers, network security devices).
Check of Malicious Cyber Activities
- Analysis of network device log files: check the log files of network and information safety devices such as firewall, prevention software; in case of suspicious behavior, check the connectivity and the status of devices involved. Sniffers and analysis:
- Check the connectivity or DNS (domain name service) for malicious act, for example, check the communication with relay station (Command and Control, C&C) and the like.
Check Computers and Server Hosts of End Users
- Check personal computers and server hosts for malwares or files; check the update of operating systems, office applications, antivirus software, Adobe and other applications.
Check the Security Settings
- Directory server: check the password setting policy and the account lockout policy in the group policy of the directory server (such as MS AD).
- Firewall: check the setup of firewall according to relevant security principles, and the connection between the source IP port and the destination IP port.
