The Network Security Diagnostics anticipates attacks from varied network environments (including IPv4, IPv6, wireless LAN, Internet, intracompany network, server, and client) and from the perspective of the attacker to identify the strengths and vulnerabilities dormant in the server, client and network devices of the system concerned and recommend a security strategy tailored to the customer's business.
Useful for risk management, the report clarifies priority security issues and countermeasures that the customer should handle first .
This diagnostics efficiently identifies operating services and known server, network device and other system vulnerabilities through port scans and vulnerability scans in Tool Diagnostics. In Manual Diagnostics, experts manually examine the validity of problems identified by the tool diagnostics and problems that cannot be identified using tools and propose countermeasures for both.
Two types of diagnostics are available: remote diagnostics via the Internet or on-site diagnostics conducted at the customer's office (including data center and other facility sites).
The Network Security Diagnostics can identify the following examples:
- Existence of known vulnerabilities for each service (application)
- State of operating services
- Possibility of exposure of system information from banner advertising
- Check for problems caused by poor installation
- Possibility of seizure of administrator authority
- Possibility of abuse of normal operation
|Port Scan||Scanning is conducted on TCP (1- 65535)/UDP ports (optional port)|
|Obtaining banner information from open ports (provided service)||The diagnostics tool collects banner advertising information|
|Banner information is collected by connecting to the open port manually|
|Port conducts check against open port (provided service)||The diagnostics tool identifies open port service and checks for any operations problematic to security|
|Service is identified by connecting to the open port manually, and checks for any operations problematic to security|
|Vulnerability diagnostics by automatic tool||Diagnostics of host, router and other network devices for more than 10,000 items of known vulnerability.|
|Vulnerability diagnostics using proprietary SMTP service diagnostics tool||Diagnose the possibility of inappropriate relay of e-mail by a third party who could send SPAM mails|
|Vulnerability diagnostics using proprietary HTTP service diagnostics tool||Check sample files (sample CGI, etc.) with known security holes and diagnoe setting values and other content|
|Invasion diagnostics for vulnerable points and accessible ports||Portrays attack scenario given identified vulnerabilities and conducts an invasion diagnostics|
|Strength of user identification||Checks passwords that are easy to guess by use of tools (null, default passwords, etc.)|
|Checks passwords that are easy to guess by use of manuals (null, default passwords, etc.)|
The diagnostics items listed above are examples of regular service. New diagnostics items and means of collection and analysis of vulnerabilities and attack methods are found daily and added to the Infosec's proprietary diagnosis method.
Deploying the Service
Click here to view the flow of deploying this service from inquiry to deployment and report meeting.