Security Assessment

Overview

A Security Assessment is the measurement of a company’s security posture and aims to reveal any possible flaws in the systems, in order to define the correct countermeasures.

Security Assessments rely on:
   • Vulnerability Assessment, which is mainly conducted automatically with the objective to find out all the vulnerabilities in the systems
   • Penetration Testing, a process whereby someone manually proves that the vulnerabilities actually exist in those systems and are exploitable

Approach & Methodology

NBSecurity favours a hybrid manner approach: not only automated scans but more than anything manual verification and testing.
We believe, in fact, that human intelligence is unlikely replaced and is still the source of high quality results.
Our qualified ethical hackers and experts will actively test the effectiveness of your cyber defences through internal and/or external attempts to find, track and prioritize your actual vulnerabilities.

NetSA

Network Security Assessment (NetSA) reveals real-world opportunities for attackers to be able to compromise systems and networks in such a way that it allows unauthorized access to sensitive data or even take-over systems for malicious/non-business purposes.
This type of assessment is an attack simulation carried out by our highly trained security consultants in an effort to:
   • Identify security flaws present in the environment
   • Understand the level of risk for your organization
   • Help address and fix identified network security flaws

WebSA

Web Applications Security Assessment (WebSA) allows you to identify security vulnerabilities that are present in both your commercial and in-house developed web-based applications.
By testing the security of your web-based applications, NBSecurity helps you to:
   • Identify security vulnerabilities and security design flaws affecting your web applications
   • Understand the contextualized risk posed by issues found and the impact of security violations
   • Reveal your exposure to internal (e.g.: malicious employees) and external attackers (e.g. malicious users and anonymous attackers)
   • Learn your applications’ overall security posture and how the latter can affect your business
   • Receive detailed recommendations on how to solve issues found, mitigate identified risks and improve the overall security stance of your web-based applications

MobSA

Mobile applications are becoming more dominant than ever, this evolution has created a full range of new attacks that are not relevant in the classic web applications world.
During Mobile Security Assessment (MobSA) testing, NBSecurity simulates a multitude of attacks, both general application attacks and mobile dedicated attacks.
At the end of this assessment you will be aware of how a real hacker penetrates the different applications and retrieves confidential data.
In that respect, NBSecurity has created a research-driven mobile testing methodology that incorporates guidance from the OWASP Application Security Verification Standard.
Using a combination of manual and dynamic analyses, along with custom harnesses for automated fuzzing, NBSecurity’s mobile security testing provides verification and validation across all major control categories, including authentication, session management, access control, malicious input handling, cryptography at rest, and much more.

IoTSA

According to Gartner, the number of Internet-connected devices is expected to reach 50 billion by 2020. While (Internet of Things) IoT is going to improve life for many, the number of security risks that consumers and businesses are prone to face will increase exponentially.
IoT security ecosystem gathers embedded software, data, mobile application and cloud security.
In that sense, NBSecurity has created a research-driven IoT testing methodology that incorporates guidance from the OWASP IoT Security Verification Standard.
Our Internet of Things Security Assessment (IoTSA) covers the entire IoT ecosystem:
   • Authentication/Authorization process
   • Network Services analysis
   • Encryption strength
   • Mobile Interface
   • Software/Firmware security analysis

ScadaSA

Traditionally, SCADA environments were completely closed systems that used their own isolated equipment and networking protocols.
More recently, however, SCADA environments have become IP enabled and interfaced to IP gateways.
As a consequence, the risks to SCADA environments are growing and organizations are actively looking at vulnerability assessment and penetration testing against these resources.
The first stage of any SCADA Security Assessment (ScadaSA) test performed by NBSecurity is to understand the technologies in use, which can vary significantly, from old proprietary solutions to more modern web-based interfaces, with or without additional authentication solutions.
Once the solution is understood, NBSecurity’s consultants evaluate the potential attack vectors, develop an appropriate test plan and proceed testing.
As we understand the sensitive nature of testing Process Control and Industrial Automation systems, especially within live production environments, our team have developed a proven methodology to test systems with no interference to the availability and integrity of the process.

 


In carrying out the activities, NBSecurity incorporates guidance from the following methodologies:


Red Team Testing

Overview

"An independent, focused threat-based effort by an interdisciplinary, simulated adversary to expose and exploit vulnerabilities to improve IS security posture."
(DoDD 8570.1)

The term originated during the Cold War, within the military environment, to describe a team whose purpose is to penetrate security of “friendly” installations, and thus test their security measures.
Within the Information Security Industry, the term is used to indicate an external and specialized team (Red Team) whose core function is to simulate a fully motivated and funded adversarial attack against the specific company. This provides the company’s defending department (Blue Team) the ability to test its capability of Incident Response in real time and it gives a comprehensive assessment of the company’s security program.

Approach & Methodology

NBSecurity works with the customer security team to define threat scenarios that will test effectiveness of company technology, policies and people and subsequently it combines a number of test strategies and techniques in order to gain access to pre-defined information assets.
NBSecurity organizes the activities in four actions, called rounds:
   • information gathering
   • privilege escalation
   • lateral movement
   • target acquisition

For each of the above-mentioned round, a score will be given to both the Red Team and Blue Team according to their ability in attacking and defending respectively.

Our Red Team Testing provides three different approaches based on the amount of information the tester knows about the targets, what the target knows about the tester or expects from the test, and the legitimacy of the test.

Blind

The tester engages the target with no prior knowledge of its defences, assets, or channels. The target is prepared for the audit, knowing in advance all the details of it.

Double Blind

The tester engages the target with no prior knowledge of its defences, assets, or channels. The target is not notified in advance of the scope of the audit, the channels tested, or the test vectors.

Reversal

The tester engages the target with full knowledge of its processes and operational security, but the target knows nothing of what, how, or when the tester will be testing.

APT Simulation

Overview

Advanced Persistent Threats (APT) represent the simulation of real-world advanced threats with the purpose to assess an organization's intrusion prevention, detection, and response capabilities.

Advanced

The techniques used are 0-Day exploits, targeted social engineering campaigns, and custom attacks designed to bypass traditional controls.

Persistent

The attacker is willing to plan, learn and move covertly to avoid detection, even if it takes months or years.

Threat

Actors are skilled, motivated, organized and well-funded and have specific objects (IP compromise, information disclosure, credibility damage, service disruption, etc.).

Approach & Methodology

In preparation for the initial compromise, NBSecurity gathers information about the target organization's employees, through publically available tools: the human element is in fact one of the weakest links in security. For this reason, social engineering is often used to break into the organization, in the form of a spear phishing attack. Other popular infection methods include web application attacks, zero-day exploits, custom malware designed to evade signature-based detection, and other proprietary hacking tools.
The object is to establish a foothold in the target environment, and this can be reached through well-crafted, effective phishing emails that contain malicious attachment or embedded link. Once opened, the infected email initiates a call home across the Internet to systems controlled by NBSecurity, and deliver access to the target's internal network.
At this point the attacker can move laterally across client infrastructure and acquire administrator privileges over victim's computer until control is gained on other workstations, servers and infrastructure elements, and proprietary data are finally stolen.

Advanced Threat Intelligence

Overview

We want to make sure your organization is prepared to defend against the most advanced existing threats. That’s why we are here to help you design the security architecture and find the most effective security solution for your enterprise.
Our goal is to reinforce your network evaluating together an integrated security strategy that uses multiple technologies applied across different possible points of attack.
Among the most current and innovative technologies available that we recommend, let’s mention next generation firewalls, sandboxing, and network access controls.
The approach used by NBSecurity is multi-vendor, in order to enable you to choose from a wider range of options and make sure to deploy the best solution for your company needs.

Adapt your security architecture by bringing together innovative security capabilities to prevent, detect and respond to advanced threats: our skilled and certified IT security experts are here for you!

Social Media Security

Overview

Once the role of security team was to minimize the potential attack surface, protecting network perimeter and securing the endpoint. Today hardening walls is not sufficient anymore.

As recruiters, salespeople, and advertisers increasingly turn to social media for their ease of use, low cost, scale and accessibility, also cybercriminals find them appealing.
Social networks have in fact broaden companies’ borders, boosting connectivity, mobility and engagement across organizations, departments and people.
But, if on one side they facilitate positively companies’ presence and visibility, on the other they become a massive new attack vector, which exposes organizations to additional business risks, such as account hijacking, corporate impersonations, customer fraud, etc.

It’s here that security team comes into play: on one hand it must facilitate the digital expansion and collaboration, as something inevitable for conducting business in the modern world, on the other it’s responsible for ensuring it is done safely and securely.

For this reason, NBSecurity has engaged with two market leaders in the field of Social Media Security and Cyber Situational Awareness, giving its customers the possibility to discover how exposed are they and what is their digital footprint. By continuously monitoring across social media, dark social media and even dark web, security risks and business threats targeting the brand, the company’s employees and the customers come to light. Eventually scammers and fraudulent actors can be taken down.

Are you ready to discover how #sociallysecure are you?

Security Operations Center

Overview

In today’s cyber world, every organization should have good security incident detection and response capability, in order to defend against latest advanced threats. However, many companies lack a fully functional Security Operations Center (SOC), which is the heart of a good Security Incident Management process, mainly because of a shortage of trained security professionals, cost constraints, appropriate security tools and/or prudent incident management process. NBSecurity can provide skilled resources either you want to outsource this function to a Managed Security Services Provider (MSSP) or you decide to build your own integrated SOC. Our resources, in fact, in addition to security device monitoring and alerting, have extended capabilities for advanced threat detection and real-time incident response, containment and remediation. Moreover, we cover the entire lifecycle of a security incident--from initial detection through returning a network back to steady state operation. So, entrust NBSecurity to optimize your security resources and maximize your security investment: our experts will work closely to your security team in order to reduce your security risk, enhance your detection capabilities and protect your most valuable assets.

Build a SOC

You have the possibility to build your own SOC? NBSecurity helps you to
assess requirements and provide necessary support during the decision-making
process, as well as supply analysts to manage the SOC internally.

SOC aaS

If you choose to operate a SOC as-a-Service, NBSecurity can be an experienced partner to efficiently manage your SOC directly from our internal lab and grant the highest level of professionalism.