Hacker Intrusion Rescue Service
7x24 Rapid Response Service Determine the Type of Security Incident Suppress the Development of the Situation Exclude and Identify Backdoor Programs Restore Normal Operation of the Information System Summary and Analysis of Security Incidents Internal Network Penetration Testing Security Reinforcement of Customer Information System Internal Network Penetration Testing Retest Re-evaluate the Security Performance of Customer Information Systems
Safety guarantee during special periods

Explanation of Safety Inspection Work during Special Period

  • ▪ Review of the correctness and effectiveness of security policies

  • ▪ CPU utilization rate.
  • ▪ Memory utilization rate.
  • ▪ Network interface usage rate.
  • ▪ Buffer usage

  • ▪ The current operational status of the system kernel
  • ▪ Availability of any new kernel upgrade programs that may be applicable

  • ▪ Whether the log reception is normal.
  • ▪ Does the log need to be fully processed.
  • ▪ Log collection and analysis.

  • ▪ Check the upgrade status of virus definitions such as antivirus walls.
  • ▪ Check the upgrade status of IDS/IPS rule library.

  • 1. Status of operating system software versions.
  • 2. Windows series patch installation status.
  • 3. Installation status of Linux series patches.

  • ▪ 1. Status of operating system software versions.
  • ▪ 2. Windows series patch installation status.
  • ▪ 3. Installation status of Linux series patches.

  • ▪ CPU utilization rate.
  • ▪ Memory utilization rate.
  • ▪ Exchange area utilization rate.
  • ▪ Disk space occupation.
  • ▪ I/O operation status.