Threat Hunting & Compromise Assessment

Mengidentifikasi ancaman keamanan yang tidak terdeteksi dan memberikan solusi untuk mencegah serangan siber di masa depan

Description

TH & CA Area Network & Endpoint
Area Network
• Instalasi deployment tools seperti Arkime, Suricata dan Zeek.
• Integrasi dan Korelasi dengan Threat Intelligence Platform.
• Hunting via Network melalui Indicators of attack (IOA) / Indicator of Compromise (IOC) terhadap
kemungkinan callback atau Lateral Movement.
Area Endpoint
• Instalasi deployment tools Velociraptor.
• Hunting TTPs melalui Query Hunt yang di eksekusi melalui velociraptor.
• Hunting TTPs melalui endpoint detection and response (EDR) (jika ada).
• Threat Intelligence Sweeping.
• Analisa serangan melalui SIEM.

Reviews

There are no reviews yet.

Be the first to review “Threat Hunting & Compromise Assessment”

Your email address will not be published. Required fields are marked *