Security Testing

Category

IT

Price

$40.00

Completed orders

0

Sub-Category

Audits of computer software and hardware

Delivery Cost

$4800.00

Location

Calea Dorobanților Nr. 27-29, Cluj-Napoca, Cluj County, Romania

Minimum Order

120 pieces


Hight level overview
  • Collect information about the targeted assets
  • Map identified risk to business and generate a risk rating matrix according to vulnerabilities that can be expoited by threat agents
  • Help identify the vulnerabilities that can lure during developing process or when provisioning the infrastructure
  • Proof of the existence of vulnerabilities that impose a risk to business
  • Put together all information found during assessment
Web application security assessment(pentesting)

During this type of assessment we'll comprehensively assess the following: Authentication, Authorisation, Session Management, Data Validation, Transport Security and the Presentation layer.

Goal of this assessment is to identify vulnerabilities that could be present during the security check process and to determine the actual impact and the likelihood of exploitation.

The same methods and tools are used as the ones present in actual online attacks. The target systems of the assessment are typically web servers and web-based business applications, mail servers and other supporting services, security systems in place (firewalls, IPS, etc.), and other publicly accessible services of the organisation.
Vulnerability Assessment

During this assessment the application under test will be checked by exposure to malicious code and most common threats which are caused by vulnerabilities or misconfigurations. Automated tools will be used to carry out the activity which uses predefined crafted requests to verify known vulnerabilities.

Infrastructure Security Assessment

The scope of this assessment type is to identify all security weaknesses in the target environment. This will include:

  • Passive information gathering of publicly available data such as SNA and WHOIS registries
  • Active vulnerability scanning of identified services
  • Active testing of firewalls, routers, internet services like DNS or other filtering devices included in the target range
Company Rating
Img
AskYourQa

Overall Rating

Description Rating

Delivery time

Contact

Professionalism

You may like this