Cybersecurity Lab

CONSULTING CASE OF SECURITY TEST ON AD SECURITY POLICY

There was a consulting request from the client company for the AD security policy. AD security policy can be seen from various points of view from design of AD to account management, but since the total number of accounts is over 100,000, this consulting focused on identifying the latest issue, abnormal account, and suggesting improvement

CONSULTING CASE OF SECURITY TEST ON AD SECURITY POLICY 더 읽기"

NATIONAL CYBER SECURITY STRATEGY PLANNING CONSULTING

CLIENT The Ministry of Information and Communication of Moldova NATIONAL ICT STATUS The Republic of Moldova, which is a developing country in Eastern Europe, is centered on the Ministry of Information and Communication (MITC), the Ministry of Information Technology and Communication (MITC), which establishes a national e-government plan called e-Moldova and invests about 8% Digital

NATIONAL CYBER SECURITY STRATEGY PLANNING CONSULTING 더 읽기"

A REFINERY PROCESS CONTROL SYSTEM CONSULTING CASE

CLIENT A refinery (refinery) PROJECT BACKGROUND AND TOPIC As a representative company in the petroleum industry, the customer is a representative company of the oil industry. In order to secure the security of the process control system of the large refinery owned by the province, based on the objective related standards at the international level,

A REFINERY PROCESS CONTROL SYSTEM CONSULTING CASE 더 읽기"

USEFUL TOOLS FOR APPLICATION SOURCE CODE REVIEW

Most of the application source vulnerability diagnoses will receive a large number of source files and perform vulnerability diagnostics. Most of them are static diagnosis using a tool for diagnosing source vulnerabilities such as Fortify and dynamic manual diagnosis of a professional consultant. In this situation, it is common to utilize some useful tools because

USEFUL TOOLS FOR APPLICATION SOURCE CODE REVIEW 더 읽기"