Download Are you looking for an easier way to initiate and

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Next-Generation Secure Computing Base wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Malware wikipedia , lookup

Unix security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Deep packet inspection wikipedia , lookup

Network tap wikipedia , lookup

Wireless security wikipedia , lookup

Distributed firewall wikipedia , lookup

Security-focused operating system wikipedia , lookup

3-D Secure wikipedia , lookup

Mobile security wikipedia , lookup

Computer security wikipedia , lookup

Secure multi-party computation wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
HAVE YOU EVER BEEN HACKED?
90%
of companies have been hacked
70%
of attacks go undetected
60%
of all small/med size businesses go out of business
within 6 months of a data security breach
32%
of computers around the world are infected
with viruses and malware
HOW WOULD YOU KNOW?
CYBERASSIST IS HOW YOU KNOW
205
days
on average before an attack is detected
Prevent
Protect
The Federal Bureau of Investigation reports an
Threat actors only have to get it right once!
average of $560 million in personal losses,
Prevention can only take you so far. We can provide
while McAfee reports an average of $1 trillion
the tools needed to harden your network using
in business losses per year.
a layered, defense-in-depth strategy.
Preventative services include:
Protection Solutions & Services include:
• Risk Assessments
• Firewall and Perimeter Security Appliances
• Vulnerability Assessments
• Signature, Behavioral and Anomaly-Based Intrusion
• Penetration Testing
• Detection and Prevention Based Anti-Virus/Anti-Malware
• Policy and Procedures Drafting and Review
• Network Encryption (Data in Transit)
• Security Awareness Training
• Server Encryption (Data at Rest)
Monitor
Respond
Our CyberAssist program not only provides you
No network, no matter how robust the security, is
with the tools needed to secure your environment,
ever 100% secure. CyberAssist’s response packages
we take it one step further by providing the resources
provide you with efficient response and remediation
needed to actively monitor the performance and
capabilities.
security of your network.
Response services include:
Monitoring services include:
• 24/7 Incident Response Teams
• Secure Cloud Monitoring Service which also allows
• Comprehensive Incident/Breach Response
for Cloud Storage of Monitoring Logs
• Behavioral Intelligence & Anomaly Detection
• 24/7 Monitoring and Notification Support
Procedures
• Incident/Breach Response Training for your internal
team
• Security Event Analysis
• Response Analysis and Reporting
• Network Performance Analysis
• Remediation Support and Preventative Analysis
CYBERASSIST
Security Platform as a Service
CYBERASSIST
Glossary
./."
"$+ An Internet borne attack usually perpetrated by a group of individuals with
master boot record (MBR): Information contained in the first sector of a storage device that identifies how and where
significant resources, such as organized crime or a rogue nation state.
an operating system is located so that it can be loaded into memory.
.
A firewall beyond traditional port based controls that enforces policy based on
application, user, and content regardless of port or protocol.
0. Malware that enables an attacker to bypass normal authentication to gain access to a compromised system.
A security scanner used to discover network hosts and services.
1
+
"
original distributor incurring the costs of hardware, hosting, and bandwidth resources.
An API for capturing network packets.
0
A kernel mode variant of a rootkit, commonly used to attack computers that are protected by full disk encryption.
!"! A proprietary Microsoft protocol that provides remote access to a computer.
bot:
""#'"
botnet: A broad network of bots working together.
##$##% A set of standards and an associated network protocol that establishes a secure channel between
Box: A SaaS based online storage application that employs SSL encryption. It’s frequently used by corporate
organizations so that users can upload, download, and share files publicly and privately.
##"&'##& A transport layer protocol that provides session based encryption and authentication for
secure communication between clients and servers.
.
"
0..
"/
!!# A large scale attack that typically uses bots in a botnet to crash a targeted
network or server.
#
*
+"#*+An Internet standard for email transmission that uses TCP port 25.
.'
!#!!#*
+389#
"$
"$
A targeted phishing attempt that seems more credible to its victims and thus has a higher probability
of success. For example, a spear phishing email may spoof an organization or individual that the recipient actually knows.
2'$2An application layer protocol that facilitates near real time communication in a client server
networking model.
+"
""
+A connection oriented protocol responsible for establishing a connection between
two hosts and guaranteeing the delivery of data and packets in the correct order.
2" An open standard protocol used for secure VPN communications over public IP based networks.
+,$" A program designed to breach the security of a computer system while ostensibly performing some
00 A set of instructions secretly incorporated into a program so that if a particular condition is satisfied,
innocuous function.
the instructions will be carried out, usually with harmful effects.
-"!-! A connectionless oriented protocol often used for time sensitive, low latency
Malicious software or code that typically damages or disables, takes control of, or steals information from
a computer system. Broadly includes viruses, worms, Trojan horses, logic bombs, rootkits, bootkits, backdoors,
spyware, and adware.
communications that don’t require guaranteed delivery.
CYBERASSIST
Security Platform as a Service
www.bluestarcs.com | 1-800-471-8571