Cybersecurity Vulnerability Assessment

  • Home
  • Cybersecurity Vulnerability Assessment
Cybersecurity Vulnerability Assessment

The Tabiri Analytics team will conduct controlled testing of the organization’s computing infrastructure. Testing simulates the tools and techniques that an attacker would use to gather unauthorized knowledge of an organization’s network, systems and applications to identify security weaknesses they can exploit. Working with the organization’s designated liaison, the Tabiri  team will identify the most appropriate systems to include in the assessment, while also minimizing impact on business operations. The selected networks and systems should constitute a representative sample of the key components of your computing infrastructure.

Key phases of the vulnerability assessment exercise include:

  1. Pre-engagement – meet with the organization to define the project scope and rules of engagement
  2. Reconnaissance – gather information about the organization’s computing infrastructure using passive and active techniques to map network boundaries and identify active systems
  3. Vulnerability Identification – use port scanning software to identify open ports or services on active systems, and test for critical software vulnerabilities
  4. Vulnerability Validation – manually confirm the existence, probability of exploitation and potential impact of identified vulnerabilities
  5. Reporting – prepare detailed documentation of identified vulnerabilities and recommendations to remediate them.

image

Related Posts

Real time Cybersecurity Continuous Monitoring

The Tabiri Analytics team will collect and analyze various network telemetry and system logs for

Read More

Cybersecurity Configuration Assessment

The Tabiri cyber security team leverages open-source software agents deployed on your Windows, Linux and

Read More

Cybersecurity Threat Hunting

This task leverages network sensors, software agents and cloud-based computing to collect and analyze system

Read More