IT Security

Cognic diversified into network security as one of the core functional areas. Our services confine to penetration checking, network vulnerability assessments, employee Training, and security policy and products installation. As IT security consultants and active implementers, we have got an inclination to show our customers the "Art of Network Security." Our consultants and trainers are certified by all major technology vendors. At Cognic, we tend to majorly concentrate on a couple of key areas, to help you secure your vital assets: Network Security Services (Ethical Hacking) and Cyber Security Awareness Program. Network Security Services we are going to confirm your IT security risks, vulnerabilities and exposures to cyber threats like viruses, Trojans, and hackers. If you’re searching for associate external ISMS Audit, penetration check, or a security assessment, we can help! Each network Security Service is meant to examine if the protective controls of a given system or network are bypassed and exploited. Our team of IT security Professionals drives home the reality that vulnerabilities do exist that assessments ought to be compelled to be performed to create positive that your vital assets unit of measurement adequately protected. Does one need to sharpen your knowledge security skills, verify the way to assess IT network vulnerabilities, discover the creation of ethical hacking and penetration testing. The solution Firm we tend to advise government agencies, company executives, IT organizations, and different professionals on some way to secure vital knowledge assets. Our distinctive competence in varied technologies permits us. To deliver integrated, scalable, robust solutions with the optimum cost/performance quantitative relation.

Automated Penetration Testing

At times, due to specific requirements of meeting project timelines, our team uses the ARPT (Automated Rapid Penetration Testing) methodology. During this process, various tools are used. These automatic tools are developed by the skilled information security analysts and security researchers and are mostly open source tools, commercial grade toolkits and or developed in-house at Vulnerability Laboratory Research. Since automated testing may tend to produce false positives, our penetration testing team double-checks every single entry in the report manually to ensure that all highlighted bugs are valid. This improves the quality of work that we do and helps us deliver our job professionally and up to the client's satisfaction. Our team is not dependent on any specific tools and scanners. The tools used in an automated penetration test always depend on the scope of work of each project.

Manual Penetration Testing

At evolution security, our security researchers are always one step ahead of the hackers with the latest 0day vulnerabilities. Our penetration testing team members are already well known for their manual testing methodologies and acknowledged by the most popular vendors for finding and reporting 0day vulnerabilities in major products and software appliances. During the manual penetration testing process, every single probe/request is carefully analyzed and monitored to ensure that we do not miss out anything. This may increase the time duration of the project however at the same time ensures 100% successful results with zero false positives

Our Approach

Cognic Systems offers an assessment to meet your security needs for imminent security threats which can be internal and external by nature. The following section describes the set of security assessment services that Cognic Systems(Cognic) offers to the members of the campus community and provides a questionnaire that in turn enables us to gain understanding about the target environment.

Process

Cognic Systems has created a simple process around vulnerability assessments to provide clarity and consistency. The process is outlined below
1.) A questionnaire has to be completed by the concerned authorities.
2.) A scoping/kickoff meeting is held, the goal of the meeting is to try to determine which type of assessment is appropriate, the scope of the assessment, a timeline and the point of contact. The scope of the meeting is a Statement ofWork that will be agreed upon and signed by both parties.
3.) The assessment is scheduled (projected end date is noted as well)
4.) Assessment is performed during agreed upon times
5.) Cognic and the concerned authorities will be in contact throughout the process. Any findings that are deemed urgent (presenting an immediate security risk) would be communicated immediately.
6.) The assessment report is produced and reviewed by Cognic.
7.) The report is submitted to all concerned departments and a review meeting can be scheduled accordingly.
8.) The final meeting will be held wherein detailed findings are explained.
9.) Both parties sign off on the findings and provide confirmation.

Security Assessment Services

In this section, you will find the description of the most common assessment scenarios. These can be customized in many ways to meet a customer’s needs. Each type of assessment takes varying amounts of time and is impacted by the number of targets (applications, servers, networks, etc.). The exact type of assessment should be determined in the “kickoff” meeting. Network Based (Attack & Penetration) Penetration testing includes components of application vulnerability assessment, host vulnerability assessment, and security best practices. This type of test can be performed with or without detailed prior knowledge of the environment. When it is performed without prior knowledge additional steps will be taken to enumerate hosts and applications and to assess the ease with which any outsider could exploit publicly available information or social engineering to gain unauthorized access.

  • An attack and penetration test will answer questions like
  • How vulnerable is the network, host, and application(s) to attacks from the internet or intranet?
  • Can an intruder obtain unauthorized access to critical resources?
  • Are social engineering techniques effective?
  • Are operational controls effective?This would involve the Cognicacting as an attacker and looking at the system as an outsider.

The Cognic would look for

Remotely exploitable vulnerabilities Patch levels (OS and Apps) Unnecessary services are operational controls effective?This would involve the Cognic acting as an attacker and look at the system as an outsider. The weakness of encryption Weakness of authentication etc.

Host Based

This is an assessment of the health and security of given workstation or server. Automated scanning tools (e.g. Nessus) are the primary vehicle for this type of assessment. Additional hands-on inspection may also be necessary to assess conformance to security best practice. This assessment will answer questions like Is patching up to date? Are unnecessary services running? Are antivirus/antimalware signatures up to date? This would involve the Cognic Team acting as a Sys Admin and auditing the system and applications looking for locally exploitable vulnerabilities Patch levels (OS and Apps) Access rights Security best practices etc.

Application

This is an assessment of the functionality and resilience of the compiled application to known threats. This assessment focuses on the compiled and installed elements of the entire system: how the application components are deployed, communicate or otherwise interact with both the user and server environments. Application scanning tools, as well as manual testing with and without application credentials are used to perform this assessment. Typically some host, network, and general information security practices are assessed as part an application vulnerability assessment

Application scanning tools as well as manual testing with and without application credentials are used to perform this assessment. Typically some host, network, and general information security practices are assessed as part an application vulnerability assessment.

    This assessment will answer questions like

  • Does the application expose the underlying servers and software to attack?
  • Can a malicious user access, modify, or destroy data or services within the system.

This would involve the Cognic Team auditing an application (typically web-based) and looking for vulnerabilities like SQL Injection Cross Site Scripting. Cross Site Request Forgery Improper data sanitization Buffer overflows (limited) Mis-configured/weak authentication etc.

Compliance

This would involve the Cognic Team auditing (or assisting in the coordination of an audit if the Cognic is not trained to conduct the specific audit) systems for compliance with specific regulations

  • HIPAA
  • FERPA
  • GLBA
  • PCI

Physical Security Assessment

This assessment typically involves interviews with key staff, documentation review, and an on-site visit to assess appropriate physical and environmental controls for safeguarding computing resources.

    This assessment will answer questions like

  • Are there appropriate physical access controls in place for securingServers and desktop system?
  • Are appropriate environmental controls in place to sustain critical computing infrastructure?
  • Are systems left logged in, while staff members are away?

EnterpriseSecurity Assessment

This is a comprehensive study of the hosts, networks, applications, environmental controls, as well as policies and procedures. This service is currently outsourced though Cognic can serve as the engagement manager with a number of preferred Suppliers.