Network Security Assessment
- CQIMC uses scanning and reconnaissance methods, as well as other publicly available tools, to assess the security of networks and systems accessible on client networks.
- Network security assessments usually produce very varying results for internal versus external assessment. At a network level, internal networks are often open and vulnerable services are widely exposed.
- Common problems often found on internal systems include inadequate protection of sensitive information due to lack of encryption or authentication controls.
- CQIMC looks for these problems by examining network traffic, probing systems for exposed services, and examining device and control configurations.
- CQIMC conducts full ICMP, TCP and UDP network scans on external networks to test appropriate firewall configurations. Systems are also reviewed for inadequate encryption and/or authentication.
- CQIMC often combines a network security assessment with application vulnerability analysis in a penetration test.
We provide vulnerability assessment services.
Vulnerability Assessment is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use.
Vulnerability analysis consists of several steps:
- Defining and classifying network or system resources
- Assigning relative levels of importance to the resources
- Identifying potential threats to each resource
- Developing a strategy to deal with the most serious potential problems first
- Defining and implementing ways to minimize the consequences if an attack occurs.
Penetration testing is much more than just running automated vulnerability scans. At CQIMC, professional ethical hackers perform real world attack scenarios. We protect your data, privacy, and reputation.