Skip to main content

What is a Compromised Assessment Test?


 

A Compromise Assessment Test is a hunting test for suspicious activities on every layer of the suspected network to detect unknown security breaches, malware, and signs of unauthorized access. More specifically, the assessment seeks to find attackers currently in the environment or who have been active in the recent past.

Over the years, compromise assessments only existed in limited forms as specialized services.

Due to the rapid growth of disclosed breaches that reached a fevered pitch, organizations need to adopt an “assumption of breach” mentality to intensify their efforts in maintaining the effectiveness of their cyber defenses.

HOW DOES IT WORK?

To be universally applicable, the compromise assessment should be:

  • Practical — Detecting all known variants of malware, remote access tools, and indications of unauthorized access using advanced offerings and solutions should have the ability to go deeper into the detection of unknown (zero-day) malware variants as well.
  • Fast — Assess network within hours/days.
  • Affordable — The average organization should be able to conduct it proactively and regularly

For solid protection, the executed compromise assessment test should be efficient enough to run at least once a month for the average-sized organization and seek to optimize time, cost, and effectiveness.

Ultimately, the goal of the assessment is to rapidly identify hostile activity or malicious logic — not to perform a complete forensic examination. After completing and assessing the collected evidence, recommendations should be made for a proper response, and collected evidence should be packaged for the organization to allow the testers to investigate the root cause or actors behind the attack.

It is worth noting that the cyber compromise assessment test goes beyond discovering hostile activities; it has a broader scope in general. It also identifies the existing gaps, vulnerabilities, misconfigurations, excessive privileges, and other security issues. It can be used in combination with a penetration test, but it is not a substitute. The pen test reveals vulnerabilities that could lead to a potential compromise, encouraging you to implement protective measures; meanwhile, the cybersecurity compromise assessment reveals active threat vectors present in your environment.

To know more about Compromise Assessment Test, request a meeting with our experts for a free demo assessment: https://teknologiia.com/request-a-meeting/.



Originally published at Mazen N. Daccache | LinkedIn

Comments

Popular posts from this blog

Facebook updates iOS app to fix issues that let the camera open in the background

The issues were first reported this month This month, some users of Facebook’s iOS app  found that  that, in at least two situations, the app appeared to be activating the camera in the background without a user’s knowledge. Facebook said yesterday that it was submitting fixes for the issues to Apple, and the company tells us that, as of this morning, the updated app is now available for download on the App Store. I’ve downloaded the update to my iPhone 11 Pro, and I can’t get the camera to accidentally activate in either of the scenarios that were reported — but I also couldn’t get it to activate yesterday, so I can’t personally confirm that the issues are fixed. But if we take Facebook at its word that everything is resolved, it’s nice to see that the company acted quickly. Article reference:  https://www.theverge.com/2019/11/13/20963791/facebook-issue-fix-camera-open-background-update-ios-app-store

Lebanese Protesters Are Using This ‘Bridgefy’ Messaging App - What is it?

Bridgefy is an offline messaging app that lets you communicate with friends and family when you don't have access to the Internet, by simply turning on your Bluetooth antenna. Due to WhatsApp outage and the poor internet services, a new offline messaging app known as Bridgefy has started to gain traction among Lebanese protesters. The people are recommending using this app in case there is a shutdown of internet services. Did you know that: 1 billion people aren’t covered by 3G or 4G networks. 3.3 billion people live in areas where the mobile Internet can be accessed but remain without a mobile Internet subscription. 1 billion people own a smartphone but don’t own a data plan. 40% of the world population is forecast to remain unconnected by 2025. These numbers represent huge amounts of potential users that aren’t being reached by mobile apps. Bridgefy keeps your app working even when people do not have access to the Internet. T...

Scraped data of 500 million LinkedIn users being sold online, 2 million records leaked as proof | CyberNews

  Updated on 07/04: We updated our personal data leak checker database with more than 780,000 email addresses associated with this leak . Use it to find out if your LinkedIn profile has been scraped by the threat actors. Days after a massive Facebook data leak made the headlines, it seems like we’re in for another one, this time involving LinkedIn. An archive containing data purportedly scraped from 500 million LinkedIn profiles has been put for sale on a popular hacker forum, with another 2 million records leaked as a proof-of-concept sample by the post author. The four leaked files contain information about the LinkedIn users whose data has been allegedly scraped by the threat actor, including their full names, email addresses, phone numbers, workplace information, and more. To see if your email address has been exposed in this data leak or other security breaches, use our personal data leak checker with a library of 15+ billion breached records . While users on the hacker foru...