Skip to main content

What is a Compromised Assessment Test?


 

A Compromise Assessment Test is a hunting test for suspicious activities on every layer of the suspected network to detect unknown security breaches, malware, and signs of unauthorized access. More specifically, the assessment seeks to find attackers currently in the environment or who have been active in the recent past.

Over the years, compromise assessments only existed in limited forms as specialized services.

Due to the rapid growth of disclosed breaches that reached a fevered pitch, organizations need to adopt an “assumption of breach” mentality to intensify their efforts in maintaining the effectiveness of their cyber defenses.

HOW DOES IT WORK?

To be universally applicable, the compromise assessment should be:

  • Practical — Detecting all known variants of malware, remote access tools, and indications of unauthorized access using advanced offerings and solutions should have the ability to go deeper into the detection of unknown (zero-day) malware variants as well.
  • Fast — Assess network within hours/days.
  • Affordable — The average organization should be able to conduct it proactively and regularly

For solid protection, the executed compromise assessment test should be efficient enough to run at least once a month for the average-sized organization and seek to optimize time, cost, and effectiveness.

Ultimately, the goal of the assessment is to rapidly identify hostile activity or malicious logic — not to perform a complete forensic examination. After completing and assessing the collected evidence, recommendations should be made for a proper response, and collected evidence should be packaged for the organization to allow the testers to investigate the root cause or actors behind the attack.

It is worth noting that the cyber compromise assessment test goes beyond discovering hostile activities; it has a broader scope in general. It also identifies the existing gaps, vulnerabilities, misconfigurations, excessive privileges, and other security issues. It can be used in combination with a penetration test, but it is not a substitute. The pen test reveals vulnerabilities that could lead to a potential compromise, encouraging you to implement protective measures; meanwhile, the cybersecurity compromise assessment reveals active threat vectors present in your environment.

To know more about Compromise Assessment Test, request a meeting with our experts for a free demo assessment: https://teknologiia.com/request-a-meeting/.



Originally published at Mazen N. Daccache | LinkedIn

Comments

Popular posts from this blog

Ex-Twitter employees accused of spying for Saudi Arabia

Two former employees of Twitter have been charged in the US with spying for Saudi Arabia. The charges, unsealed on Wednesday in San Francisco, allege that Saudi agents sought personal information about Twitter users including known critics of the Saudi government. Court documents  named the two as Ahmad Abouammo, a US citizen, and Ali Alzabarah, from Saudi Arabia. A third person, Saudi citizen Ahmed Almutairi, is also accused of spying. The New York Times says it is the first time that Saudi citizens have been charged with spying inside the United States. What are the charges? The charges allege Mr Almutairi acted as an intermediary between the two Twitter employees and Saudi officials. Ahmad Abouammo appeared in a Seattle court on Wednesday and was remanded in custody pending another hearing due on Friday. He is also charged with falsifying documents and making false statements to the FBI. Mr Abouammo is said to have left his job as a media partnership manager for

Mega Comparison: Zoom vs Skype vs Microsoft Teams vs Google Meet vs Google Duo vs Messenger Rooms

Video calling tools have lately been topping the download charts due to the sudden surge in work from home culture. However, with the number of options available in the market, it gets quite confusing for people to settle with one. So, we tried some of the most popular services such as Zoom, Skype, Microsoft Teams, Google Meet, Duo, and Messenger Rooms for you to decide which one’s a better choice. Read on. Zoom vs Skype vs Microsoft Teams vs Google Meet vs Google Duo vs Messenger Rooms: Which one’s better? Zoom Video Call Being the current most popular video call service in the market, Zoom has got all the features and quirks one would demand. Everything works fine except for the virtual background feature, which needs you to have uniform lighting and an easily distinguishable background. Usage:  Zoom can be used by anyone, ranging from friends and family to small office meetings and large enterprise conferences. Cost:  Zoom is free to use, with the basic plan having certain limitatio

Google teams up with security companies to catch bad apps before they hit the Play Store

It’s calling the partnership the ‘App Defense Alliance’ Google announced  today that it’s teaming up with three security companies to help identify malicious apps before they’re published on the Play Store and can potentially do harm to Android users. The company is calling this partnership the App Defense Alliance. Android is on over 2.5 billion devices, according to Google, and the company says that makes the platform “an attractive target” for abuse. That abuse can take the form of hidden malware or secret code designed to spy and siphon away sensitive user data. This seems to be particularly true of the Play Store — over the past year or so, Google has had to take  action   against   multiple   developers  for releasing apps on the Play Store using scammy ad practices. By forming the App Defense Alliance, Google is enlisting security companies ESET, Lookout, and Zimperium to help scan for bad apps before they hit the Play Store in the first place. Google already builds